This is branch of security system that emphasizes on both human nature and security threats in a workplace. Security system should be designed in such a manner that it does not interfere with the works of people working there.
You will learn to make sure that human workflows, capabilities and tasks are incorporated into the security site to make things work in this course. This will ensure security in an office without interfering the workers.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Credit: University of Maryland
Course Curriculum
Module 01 | |||
Usable security Course Intro | 00:06:00 | ||
Usable security – What is Human Computer Interaction | 00:03:00 | ||
Usable security – Usability | 00:09:00 | ||
Usable security – Usable security Tasks | 00:10:00 | ||
Usable security – Chunking Information | 00:17:00 | ||
Usable security – Mental Models | 00:10:00 | ||
Usable security – Intro to Design | 00:12:00 | ||
Usable security – Design Methodologies | 00:16:00 | ||
Usable security – Case Study SSL Warnings example user | 00:08:00 | ||
Usable security – Case Study SSL Warnings paper discussion | 00:15:00 | ||
Module 02 | |||
Usable security – Interview SSL Warnings | 00:05:00 | ||
Usable security – Qualitative Evaluation | 00:16:00 | ||
Usable security – Running Controlled Experiments | 00:12:00 | ||
Usable security – Usability Studies | 00:17:00 | ||
Usable security – A B Testing | 00:16:00 | ||
Usable security – Case Study Phishing Email paper discussion | 00:08:00 | ||
Usable security – Interview Phishing | 00:04:00 | ||
Module 03 | |||
Usable security – Intro to Usable Security Guidelines | 00:08:00 | ||
Usable security – Authority Guidelines | 00:18:00 | ||
Usable security – Authorization and Communication Guidelines | 00:13:00 | ||
Usable security – Interface Guidelines for Usable Security | 00:12:00 | ||
Usable security – Case Study Phishing Warnings | 00:05:00 | ||
Usable security – Biometric Authentication | 00:10:00 | ||
Usable security – Usable Authentication and Passwords | 00:16:00 | ||
Module 04 | |||
Usable security – Gesture based Authentication | 00:06:00 | ||
Usable security – Interview Dr Adam Aviv | 00:06:00 | ||
Usable security – Two Factor Authentication | 00:06:00 | ||
Usable security – Case Study Smudge Attacks | 00:05:00 | ||
Usable security – Usable Privacy Basics | 00:09:00 | ||
Usable security – Privacy Policies and User Understanding | 00:10:00 | ||
Usable security – Informed Consent for Privacy | 00:14:00 | ||
Usable security – 5 Pitfalls of Privacy | 00:10:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.