• LOGIN
  • No products in the cart.

This is branch of security system that emphasizes on both human nature and security threats in a workplace. Security system should be designed in such a manner that it does not interfere with the works of people working there.

You will learn to make sure that human workflows, capabilities and tasks are incorporated into the security site to make things work in this course. This will ensure security in an office without interfering the workers.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

 

Course Credit: University of Maryland

Course Curriculum

Module 01
Usable security Course Intro 00:06:00
Usable security – What is Human Computer Interaction 00:03:00
Usable security – Usability 00:09:00
Usable security – Usable security Tasks 00:10:00
Usable security – Chunking Information 00:17:00
Usable security – Mental Models 00:10:00
Usable security – Intro to Design 00:12:00
Usable security – Design Methodologies 00:16:00
Usable security – Case Study SSL Warnings example user 00:08:00
Usable security – Case Study SSL Warnings paper discussion 00:15:00
Module 02
Usable security – Interview SSL Warnings 00:05:00
Usable security – Qualitative Evaluation 00:16:00
Usable security – Running Controlled Experiments 00:12:00
Usable security – Usability Studies 00:17:00
Usable security – A B Testing 00:16:00
Usable security – Case Study Phishing Email paper discussion 00:08:00
Usable security – Interview Phishing 00:04:00
Module 03
Usable security – Intro to Usable Security Guidelines 00:08:00
Usable security – Authority Guidelines 00:18:00
Usable security – Authorization and Communication Guidelines 00:13:00
Usable security – Interface Guidelines for Usable Security 00:12:00
Usable security – Case Study Phishing Warnings 00:05:00
Usable security – Biometric Authentication 00:10:00
Usable security – Usable Authentication and Passwords 00:16:00
Module 04
Usable security – Gesture based Authentication 00:06:00
Usable security – Interview Dr Adam Aviv 00:06:00
Usable security – Two Factor Authentication 00:06:00
Usable security – Case Study Smudge Attacks 00:05:00
Usable security – Usable Privacy Basics 00:09:00
Usable security – Privacy Policies and User Understanding 00:10:00
Usable security – Informed Consent for Privacy 00:14:00
Usable security – 5 Pitfalls of Privacy 00:10:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

580 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841