This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
이 강좌에 대하여
학습자 경력 결과
학습자 경력 결과
메릴랜드 대학교 칼리지파크 캠퍼스
The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
USABLE SECURITY의 최상위 리뷰
I think the most interesting part is how the readings, while not the most recent research, are still 100% applicable today. The industry hasn't moved very much in terms of usable security practices.
I like how in depth this gets. it explains it very well an in ways for people who are starting off in this field to get a basic understanding in exactly what we are learning. very well put together!
Despite not being very fond of areas such as human-computer interaction, I found this course to be well-presented and useful. Definitely a necessity for anyone planning on building secure software.
It gave me a broader scope in terms of developing a process or a system. It taught me that designing usability and security must come during the early stages of design instead of an after thought.
사이버 보안 특화 과정 정보
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.