Usable Security

Description

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.



More Ways to Learn Information Security

$20 monthly
Paid add-ons

Prepare for the Certified Information Systems Security Professional (CISSP) Exam


College | Online class

This learning path helps IT security professionals prepare for and pass the challenging Certified Information Systems Security Professional (CISSP) exam from ISC. Each course in this path maps to...

$20 monthly
Paid add-ons

Become an Ethical Hacker


College | Online class

Become an Ethical Hacker Ethical hacking is the ability to identify vulnerabilities in an organization’s network or infrastructure, and then address the issues to prevent incidents or attacks....

Free

CS406: Information Security


College | Online class

This unit provides an overview of information security. First, we look at the basic concepts of confidentiality, integrity, and availability as discussed in the National Institute of Standards and...

Masters in Cyber Security


College | Online class

The University of North Dakota is dedicated to helping you successfully transition into or advance in the growing field of Cyber Security. Regardless of if you’ve been in the cyber security...

$20 monthly
Paid add-ons

Become a CompTIA Security+ Certified Security Professional


College | Online class

The CompTIA Security+ certification is the leading entry-level IT certification for those looking to break into the exciting field of cybersecurity. This learning path maps to the 6 domains that...

$20 monthly
Paid add-ons

Become an IT Security Specialist


College | Online class

Learn the core concepts needed to secure your organization’s network as an IT security specialist. In this learning path, you’ll cover all the foundations of IT security: from practical skills for...


See all resources for Information Security

Links to supporting retailers are recognized and built automatically, so we can provide you with truly unbiased listings.
We receive a small share of sales from those links to help us keep this service free for all learners. Thanks for your support!