À propos de ce cours
4.5
1,146 notes
299 avis
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system....
Stacks

Cours 1 sur 5 dans la

Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Calendar

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Clock

Approx. 13 hours to complete

Recommandé : 7 weeks of study, 5-8 hours/week...
Comment Dots

English

Sous-titres : English...

Compétences que vous acquerrez

CybersecurityUsabilityPrivacyUser Interface
Stacks

Cours 1 sur 5 dans la

Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Calendar

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Clock

Approx. 13 hours to complete

Recommandé : 7 weeks of study, 5-8 hours/week...
Comment Dots

English

Sous-titres : English...

Programme du cours : ce que vous apprendrez dans ce cours

Week
1
Clock
4 heures pour terminer

Week 1

Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models...
Reading
6 vidéos (Total 56 min), 4 lectures, 2 quiz
Video6 vidéos
What is Human Computer Interaction?3 min
Usability9 min
Tasks 310 min
Chunking Information16 min
Mental Models9 min
Reading4 lectures
Privacy Policy10 min
Syllabus10 min
Grading and Logistics10 min
Week 1 - HCI Basics10 min
Quiz1 exercice pour s'entraîner
Week 1 Quiz - HCI Basics20 min
Week
2
Clock
1 heure pour terminer

Week 2

Design: design methodology, prototyping, cybersecurity case study...
Reading
5 vidéos (Total 55 min), 1 lecture, 1 quiz
Video5 vidéos
Design Methodologies15 min
Case Study: SSL Warnings - example user7 min
Case Study: SSL Warnings - paper discussion15 min
Interview: SSL Warnings4 min
Reading1 lecture
Week 2 Introduction10 min
Quiz1 exercice pour s'entraîner
Week 2 Quiz - Design20 min
Week
3
Clock
2 heures pour terminer

Week 3

Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study...
Reading
6 vidéos (Total 72 min), 1 lecture, 1 quiz
Video6 vidéos
Running Controlled Experiments11 min
Usability Studies16 min
A/B Testing15 min
Case Study: Phishing Email - paper discussion8 min
Interview: Phishing3 min
Reading1 lecture
Week 3 - Evaluation10 min
Quiz1 exercice pour s'entraîner
Week 3 Quiz - Evaluation 20 min
Week
4
Clock
1 heure pour terminer

Week 4

Strategies for Secure Interaction Design: authority, guidelines for interface design...
Reading
5 vidéos (Total 57 min), 1 lecture, 1 quiz
Video5 vidéos
Authority Guidelines 18 min
Authorization and Communication Guidelines13 min
Interface Guidelines for Usable Security11 min
Case Study: Phishing Warnings5 min
Reading1 lecture
Week 4 - Guidelines for Usable Security10 min
Quiz1 exercice pour s'entraîner
Week 4 Quiz - Guidelines for Usable Security20 min
4.5
Direction Signs

20%

a commencé une nouvelle carrière après avoir terminé ces cours
Briefcase

83%

a bénéficié d'un avantage concret dans sa carrière grâce à ce cours

Meilleurs avis

par IRJun 21st 2016

I like how in depth this gets. it explains it very well an in ways for people who are starting off in this field to get a basic understanding in exactly what we are learning. very well put together!

par DGJun 29th 2016

Despite not being very fond of areas such as human-computer interaction, I found this course to be well-presented and useful. Definitely a necessity for anyone planning on building secure software.

Enseignant

Jennifer Golbeck

Director
Human-Computer Interaction Lab

À propos de University of Maryland, College Park

The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign. ...

À propos de la Spécialisation Cybersecurity

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them....
Cybersecurity

Foire Aux Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.