We may earn an affiliate commission when you visit our partners.
Course image
Jennifer Golbeck

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Enroll now

What's inside

Syllabus

Week 1
Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
Week 2
Design: design methodology, prototyping, cybersecurity case study
Read more
Week 3
Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study
Week 4
Strategies for Secure Interaction Design: authority, guidelines for interface design
Week 5
Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
Week 6
Usable Privacy: privacy settings, personal data sharing, data inference
Final Exam

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for beginners to understand the fundamentals of human-computer interaction and cybersecurity
Teaches strategies for designing secure systems with a focus on usability, privacy, and authentication
Provides insights into human performance and how to design systems that respect human goals
Examines ethical considerations in the design of secure systems, promoting responsible and user-centric approaches
Provides practical guidance on using design methodologies and conducting usability evaluations

Save this course

Save Usable Security to your list so you can find it easily later:
Save

Reviews summary

Human-centered security considerations

Learners say Usable Security offers fresh security perspectives. While the course primarily deals with the human factors of security and may seem out of place in a technology specialization, it is easy to follow and highly relevant for non-programmers. Students should note that this course is not highly technical, but those who take it will be able to better think about the human factor that affects security decisions and perceive things from the user perspective.
Relevant for non-programmers
"I understand that taking it as a part of Cybersec Specialization can seem like a wrong idea if you are into technology, but you actually need to understand user psychology to effectively defend the user."
"While some students complained if this was really a security related course because it dealt primarily with the "human factors", I think it offered me a fresh perspective on security as not just about threats and malicious behavior, but also how legitimate users themselves compromise security (e.g. phishing) if the software developers do not consider the security requirements early in their design."
"Its fairly easy and highly relevant even for non-programmers such as UI designers and testers."
Emphasizes human factors in security
"This course looks into Security from a different perspective, one that many times developers or the people enforcing security polices on companies fail to see many times. It is not a technical course but will help you think more about the human factor that can break the same security policies you are trying to enforce and perceive things from the user perspective."
"I understand that taking it as a part of Cybersec Specialization can seem like a wrong idea if you are into technology, but you actually need to understand user psychology to effectively defend the user."
"While some students complained if this was really a security related course because it dealt primarily with the "human factors", I think it offered me a fresh perspective on security as not just about threats and malicious behavior, but also how legitimate users themselves compromise security (e.g. phishing) if the software developers do not consider the security requirements early in their design."
Instructor focuses on psychology
"The instructor is a really bad teacher, and she doesn't seem to know anything about computer science, she is just a psychologist."
"The videos a poorly made (most of the course are not even prepared and they are just 3 people openly discussing about something)."
"The slides are useless (just some photos and 2-3 words per slide, and there are a lot of courses which don't even have any slides)."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Usable Security with these activities:
Volunteer at a Cybersecurity Non-Profit Organization
Provide opportunities to apply your knowledge and skills in a real-world setting while contributing to the cybersecurity community.
Show steps
  • Find cybersecurity non-profit organizations in your area
  • Contact the organizations and inquire about volunteer opportunities
  • Volunteer your time and skills to support the organization's mission
Read Human-Computer Interaction by Alan Dix
Provide a background on the theory of HCI that will complement the course materials on designing secure systems with a focus on human-centricity.
Show steps
  • Read through chapters 1-3 of the book
  • Write a summary of the key concepts from each chapter
Follow Tutorials on Secure Coding Practices
Provide hands-on experience in implementing security measures in code.
Browse courses on Secure Coding Practices
Show steps
  • Find tutorials on secure coding practices for your programming language
  • Follow the tutorials and complete the exercises
  • Apply the secure coding practices in your own projects
Three other activities
Expand to see all activities and additional details
Show all six activities
Participate in Cybersecurity Workshops
Provide opportunities to develop new skills and learn about specific cybersecurity topics in depth.
Show steps
  • Find cybersecurity workshops that align with your interests and career goals
  • Attend the workshops and actively participate in the activities
  • Apply the knowledge and skills you learn in your work
Design a Secure Authentication System
Provide practical experience in designing a key aspect of secure systems.
Show steps
  • Choose a specific application or use case for your authentication system
  • Identify the security requirements and threat model for your system
  • Design the architecture and implementation of your system
  • Implement and test your system
Develop a Cybersecurity Policy for a Small Business
Provide practical experience in implementing security measures in a real-world context.
Browse courses on Cybersecurity Policy
Show steps
  • Identify the specific risks and threats that the business faces
  • Develop policies and procedures to address these risks and threats
  • Implement and enforce the cybersecurity policy

Career center

Learners who complete Usable Security will develop knowledge and skills that may be useful to these careers:
Interaction Designer
Interaction Designers create the visual and interactive elements of products and services. They need to have a strong understanding of human-computer interaction and usability. This course can help Interaction Designers build a foundation in usable security, which is essential for designing interfaces that are both secure and user-friendly.
Human Factors Engineer
Human Factors Engineers design and evaluate systems to make them more compatible with human needs and capabilities. They have a deep understanding of human-computer interaction and usability. This course can help Human Factors Engineers build a foundation in usable security, which is essential for designing systems that are both secure and user-friendly.
Usability Engineer
Usability Engineers focus on making products and services easier to use. They use their knowledge of human-computer interaction to design interfaces that are intuitive and user-friendly. With the growing importance of user experience in the tech industry, there is a growing demand for Usability Engineers. This course can help you develop the skills you need to enter this field by providing you with a strong foundation in human-computer interaction and usable security.
Cybersecurity Engineer
Cybersecurity Engineers design and implement security measures to protect networks and systems from cyber threats. They need to have a strong understanding of both security principles and human behavior. This course can help Cybersecurity Engineers build a foundation in usable security, which is essential for designing security measures that are effective and user-friendly.
Security Architect
Security Architects design and implement security measures to protect networks and systems from cyber threats. They need to have a deep understanding of both security principles and human behavior. This course can help Security Architects build a foundation in usable security, which is essential for designing security measures that are effective and user-friendly.
Chief Information Security Officer (CISO)
CISOs are responsible for the overall security of an organization. They need to have a strong understanding of both security principles and human behavior. This course can help CISOs build a foundation in usable security, which is essential for managing security risks that stem from human error.
IT Security Manager
IT Security Managers are responsible for the security of an organization's IT systems and data. They need to have a strong understanding of both security principles and human behavior. This course can help IT Security Managers build a foundation in usable security, which is essential for managing security risks that stem from human error.
Software Security Engineer
Software Security Engineers design and implement security measures into software applications. They need to have a strong understanding of both security principles and human behavior. This course can help Software Security Engineers build a foundation in usable security, which is essential for designing security measures that are effective and user-friendly.
Security Operations Manager
Security Operations Managers are responsible for the day-to-day operations of an organization's security program. They need to have a strong understanding of both security principles and human behavior. This course can help Security Operations Managers build a foundation in usable security, which is essential for understanding the human element of security incidents.
Enterprise Security Architect
Enterprise Security Architects design and implement security measures for large organizations. They need to have a strong understanding of both security principles and human behavior. This course can help Enterprise Security Architects build a foundation in usable security, which is essential for designing security measures that are effective and scalable.
Cybersecurity Analyst
Cybersecurity Analysts protect organizations from cyber threats by monitoring and analyzing security data. They need to have a strong understanding of both security principles and human behavior. This course can help Cybersecurity Analysts build a foundation in usable security, which is essential for understanding the human element of cyber threats.
Security Consultant
Security Consultants help organizations identify and mitigate security risks. They need to have a strong understanding of both security principles and human behavior. This course can help Security Consultants build a foundation in usable security, which is essential for understanding the human element of security risks.
Information Security Analyst
Information Security Analysts protect organizations from cyber threats by identifying and mitigating risks. They need to have a strong understanding of both security principles and human behavior. This course can help Information Security Analysts build a foundation in usable security, which is essential for identifying and mitigating risks that stem from human error.
Privacy Manager
A Privacy Manager helps companies and organizations comply with privacy laws while managing their privacy programs. In today's data-driven society, professionals with expertise in handling sensitive data are in high demand across industries. This course can help you build your expertise in usable security, which is essential for protecting user privacy and ensuring compliance with privacy regulations.
Cybersecurity Researcher
Cybersecurity Researchers study cyber threats and develop new ways to protect against them. They need to have a strong understanding of both security principles and human behavior. This course may help Cybersecurity Researchers build a foundation in usable security, which is essential for understanding the human element of cyber threats.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Usable Security.
The Design of Everyday Things foundational book in the field of human-computer interaction. It provides a detailed look at the principles of good design and how they can be applied to the design of secure systems.
Classic in the field of usability engineering. It provides a practical guide to designing and evaluating usable systems.
Provides a comprehensive overview of the field of security engineering. It covers a wide range of topics, including the principles of secure design, the threats to security, and the techniques for mitigating those threats.
Explores the psychology of security and how people make decisions about security. It fascinating read for anyone who is interested in the human side of security.
Provides a comprehensive overview of penetration testing. It covers a wide range of topics, including the different types of penetration testing, the tools and techniques used for penetration testing, and the reporting of penetration testing results.
Provides a comprehensive overview of network security. It covers a wide range of topics, including network security threats, network security controls, and network security standards.
Provides a comprehensive overview of the field of human-computer interaction. It covers a wide range of topics, including the design of user interfaces, the evaluation of usability, and the social and ethical implications of HCI.
Provides a fascinating look at the world of social engineering. It explains how attackers use social engineering techniques to gain access to sensitive information and systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser