This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.



Usable Security

Instructor: Jennifer Golbeck
Access provided by Global Institute of Science & Technology
109,036 already enrolled
(3,305 reviews)
Skills you'll gain
- Human Factors
- Threat Modeling
- Information Privacy
- Multi-Factor Authentication
- User Acceptance Testing (UAT)
- User Interface (UI) Design
- Cybersecurity
- Human Computer Interaction
- Personally Identifiable Information
- Usability
- Security Engineering
- Usability Testing
- Authentications
- User Centered Design
- Design
- Interaction Design
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

There are 7 modules in this course
Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
What's included
6 videos4 readings1 assignment1 peer review
Design: design methodology, prototyping, cybersecurity case study
What's included
5 videos1 reading1 assignment
Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study
What's included
6 videos1 reading1 assignment
Strategies for Secure Interaction Design: authority, guidelines for interface design
What's included
5 videos1 reading1 assignment
Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
What's included
6 videos1 reading1 assignment
Usable Privacy: privacy settings, personal data sharing, data inference
What's included
5 videos1 reading1 assignment
What's included
1 assignment
Instructor

Offered by
Why people choose Coursera for their career




Learner reviews
3,305 reviews
- 5 stars
69.77%
- 4 stars
23.47%
- 3 stars
4.23%
- 2 stars
1.08%
- 1 star
1.42%
Showing 3 of 3305
Reviewed on Aug 12, 2019
I think the most interesting part is how the readings, while not the most recent research, are still 100% applicable today. The industry hasn't moved very much in terms of usable security practices.
Reviewed on May 23, 2019
it was really amazing class lecture and extraordinary learning mam from you looking aspioiusly to intern from you mam glad to be your student and hearty congratulations to you on being the top.
Reviewed on Jun 20, 2016
I like how in depth this gets. it explains it very well an in ways for people who are starting off in this field to get a basic understanding in exactly what we are learning. very well put together!
Explore more from Computer Science
University of Colorado System
University of Maryland, College Park
Microsoft
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.