This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
About this Course
Skills you will gain
University of Maryland, College Park
The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.
- 5 stars69.43%
- 4 stars23.78%
- 3 stars4.25%
- 2 stars1.12%
- 1 star1.40%
TOP REVIEWS FROM USABLE SECURITY
This course gave me an understanding of Usable Security which I did not have before. The work that it takes or should take into creating systems for users is more intricate than I ever thought.
I think the most interesting part is how the readings, while not the most recent research, are still 100% applicable today. The industry hasn't moved very much in terms of usable security practices.
This course has much detailed information about the topic. The instructor went to a large extent to make us learn the topic well. Overall the course is recommended. It is good course.
Great course with enriching materials to support. It has given me a headstart to understand more concepts. Thank you Professor Jennifer for your structured, easy to understand course structure.
About the Cybersecurity Specialization
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.