About this Course
4.5
1,210 ratings
305 reviews
Specialization

Course 1 of 5 in the

100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 14 hours to complete

Suggested: 7 weeks of study, 5-8 hours/week...
Available languages

English

Subtitles: English

Skills you will gain

CybersecurityUsabilityPrivacyUser Interface
Specialization

Course 1 of 5 in the

100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Hours to complete

Approx. 14 hours to complete

Suggested: 7 weeks of study, 5-8 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
4 hours to complete

Week 1

Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models...
Reading
6 videos (Total 56 min), 4 readings, 2 quizzes
Video6 videos
What is Human Computer Interaction?3m
Usability9m
Tasks 310m
Chunking Information16m
Mental Models9m
Reading4 readings
Privacy Policy10m
Syllabus10m
Grading and Logistics10m
Week 1 - HCI Basics10m
Quiz1 practice exercise
Week 1 Quiz - HCI Basics20m
Week
2
Hours to complete
1 hour to complete

Week 2

Design: design methodology, prototyping, cybersecurity case study...
Reading
5 videos (Total 55 min), 1 reading, 1 quiz
Video5 videos
Design Methodologies15m
Case Study: SSL Warnings - example user7m
Case Study: SSL Warnings - paper discussion15m
Interview: SSL Warnings4m
Reading1 reading
Week 2 Introduction10m
Quiz1 practice exercise
Week 2 Quiz - Design20m
Week
3
Hours to complete
2 hours to complete

Week 3

Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study...
Reading
6 videos (Total 72 min), 1 reading, 1 quiz
Video6 videos
Running Controlled Experiments11m
Usability Studies16m
A/B Testing15m
Case Study: Phishing Email - paper discussion8m
Interview: Phishing3m
Reading1 reading
Week 3 - Evaluation10m
Quiz1 practice exercise
Week 3 Quiz - Evaluation 20m
Week
4
Hours to complete
1 hour to complete

Week 4

Strategies for Secure Interaction Design: authority, guidelines for interface design...
Reading
5 videos (Total 57 min), 1 reading, 1 quiz
Video5 videos
Authority Guidelines 18m
Authorization and Communication Guidelines13m
Interface Guidelines for Usable Security11m
Case Study: Phishing Warnings5m
Reading1 reading
Week 4 - Guidelines for Usable Security10m
Quiz1 practice exercise
Week 4 Quiz - Guidelines for Usable Security20m
4.5
305 ReviewsChevron Right
Career direction

20%

started a new career after completing these courses
Career Benefit

83%

got a tangible career benefit from this course

Top Reviews

By IRJun 21st 2016

I like how in depth this gets. it explains it very well an in ways for people who are starting off in this field to get a basic understanding in exactly what we are learning. very well put together!

By DGJun 29th 2016

Despite not being very fond of areas such as human-computer interaction, I found this course to be well-presented and useful. Definitely a necessity for anyone planning on building secure software.

Instructor

Avatar

Jennifer Golbeck

Director
Human-Computer Interaction Lab

About University of Maryland, College Park

The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign. ...

About the Cybersecurity Specialization

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them....
Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.