This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
About this Course
Skills you will gain
University of Maryland, College Park
The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.
- 5 stars69.44%
- 4 stars23.77%
- 3 stars4.24%
- 2 stars1.12%
- 1 star1.40%
TOP REVIEWS FROM USABLE SECURITY
it was really amazing class lecture and extraordinary learning mam from you looking aspioiusly to intern from you mam glad to be your student and hearty congratulations to you on being the top.
It gave me a broader scope in terms of developing a process or a system. It taught me that designing usability and security must come during the early stages of design instead of an after thought.
This course gave me an understanding of Usable Security which I did not have before. The work that it takes or should take into creating systems for users is more intricate than I ever thought.
très bon cours et assez intéressant car il m'a permis de pouvoir faire la différence entre la facilité d'utilisation d'un système et sa sécurité et comment allier les deux dans un système .
About the Cybersecurity Specialization
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.