This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.
- 5 stars69.25%
- 4 stars23.90%
- 3 stars4.28%
- 2 stars1.13%
- 1 star1.41%
It gave me a broader scope in terms of developing a process or a system. It taught me that designing usability and security must come during the early stages of design instead of an after thought.
I think the most interesting part is how the readings, while not the most recent research, are still 100% applicable today. The industry hasn't moved very much in terms of usable security practices.
This course has much detailed information about the topic. The instructor went to a large extent to make us learn the topic well. Overall the course is recommended. It is good course.
I learnt more from this than I expected. It covers a lot of practical things that I have begun to apply towards improving my own personal digital security. I totally recommend this course.
關於 网络安全 專項課程
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.