Course Summary
This course is designed to teach students the basics of usable security and how to design secure systems that are easy to use. Students will learn how to identify common security threats and vulnerabilities, and how to design and evaluate security solutions that are both effective and user-friendly.Key Learning Points
- Learn the basics of usable security
- Identify common security threats and vulnerabilities
- Design and evaluate security solutions that are effective and user-friendly
Related Topics for further study
Learning Outcomes
- Identify common security threats and vulnerabilities
- Design and evaluate security solutions that are effective and user-friendly
- Apply best practices for usable security design
Prerequisites or good to have knowledge before taking this course
- Basic understanding of computer systems and networks
- Familiarity with security concepts
Course Difficulty Level
IntermediateCourse Format
- Online self-paced course
- Approximately 17 hours to complete
Similar Courses
- Cryptography I
- Introduction to Cybersecurity
- Software Security
Related Education Paths
Related Books
Description
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
Outline
- Week 1
- Course Intro
- What is Human Computer Interaction?
- Usability
- Tasks 3
- Chunking Information
- Mental Models
- Privacy Policy
- Syllabus
- Grading and Logistics
- Week 1 - HCI Basics
- Week 1 Quiz - HCI Basics
- Week 2
- Intro to Design
- Design Methodologies
- Case Study: SSL Warnings - example user
- Case Study: SSL Warnings - paper discussion
- Interview: SSL Warnings
- Week 2 Introduction
- Week 2 Quiz - Design
- Week 3
- Qualitative Evaluation
- Running Controlled Experiments
- Usability Studies
- A/B Testing
- Case Study: Phishing Email - paper discussion
- Interview: Phishing
- Week 3 - Evaluation
- Week 3 Quiz - Evaluation
- Week 4
- Intro to Usable Security Guidelines
- Authority Guidelines
- Authorization and Communication Guidelines
- Interface Guidelines for Usable Security
- Case Study: Phishing Warnings
- Week 4 - Guidelines for Usable Security
- Week 4 Quiz - Guidelines for Usable Security
- Week 5
- Usable Authentication and Passwords
- Two-Factor Authentication
- Biometric Authentication
- Gesture-based Authentication
- Case Study: Smudge Attacks
- Interview: Dr. Adam Aviv
- Week 5 - Usable Authentication
- Week 5 Quiz - Usable Authentication
- Week 6
- Usable Privacy Basics
- Privacy Policies and User Understanding
- Informed Consent for Privacy
- 5 Pitfalls of Privacy
- Inferring Personal Data and Policy
- Week 6 - Usable Privacy
- Week 6 Quiz - Usable Privacy
- Final Exam
- Final Exam
Summary of User Reviews
Discover the importance of usable security through this course on Coursera. Users have raved about the course's engaging content and practical applications of concepts. However, some have expressed concerns about the lack of interaction with instructors and the heavy workload.Key Aspect Users Liked About This Course
engaging content and practical applications of conceptsPros from User Reviews
- Course content is engaging and relevant to real-world scenarios
- Course provides practical applications of security concepts
- Course offers a comprehensive overview of usable security
Cons from User Reviews
- Limited interaction with instructors
- Heavy workload and time commitment
- Some users found the course challenging and difficult to follow