I like how in depth this gets. it explains it very well an in ways for people who are starting off in this field to get a basic understanding in exactly what we are learning. very well put together!
Despite not being very fond of areas such as human-computer interaction, I found this course to be well-presented and useful. Definitely a necessity for anyone planning on building secure software.
Good course, but not really what I expected.
All materials are common things and knowledge.
por Tom G•
Some good info, but the course needs to be updated to correct long known mistakes.
por Mian A J•
Content was a little boring. Secondly, Voice quality wasn't up to the mark.
por Daniel K P•
Needs more content ; present course repeats
information, too often
por Andrew A•
The content is good, It partially outdated being made in ~2013
por Giulio B•
Very little useful information
por Alberto R•
Useful concepts. Quite simple.
por KALLURI R R•
por Mitch H•
por Abner G•
This course is about "good practices" for user interface design. If this is what you are looking for it may be worth your time, just be aware that the "production" (quality) of the videos is among the worst courses I have taken in Coursera. On the other hand, if you are looking for a heavy Cybersecurity related course I suggest you to stay away from this one, unless you are taking the specialization in which case you don't have other choice.
Videos Quality: 1/5
Practice/Theory ratio: 1/5
por Ronald S•
I did this entire course in about 25 minutes without watching the videos or reading anything. I would bet a person with general common sense could pass this. I had more trouble figuring out that received input in Python is always taken in the form of a string and must by converted into a floating point number or integer than I had passing this entire course. I'm not sure why this is in a cyber security track.
por Daniel S•
Course content could have been much more compact in my opinion. The topic is not complicated to understand but the videos are very long and need a lot of time to watch. Test at the end is only multiple choice with many True/False questions -> when you select the wrong solution you will see what's correct very easily, so it's easy to pass without understanding the topic really.
por HJ B•
Needs some serious revision. Lots of errors (e.g. week 2 summary of Cranor study completely botched), audio issues (loudness variability), quizzes (e.g., week 2 asks questions from week 3, questions/answers frequently imprecise), etc.
por Tim B•
There are many parts of the lectures that are very quiet and even with my speakers turned to max, I struggled to hear, while other parts were clear. The course is interesting, but I doubt that anyone would pay to attend this course.
por Matas W•
A large amount of this really didn't seem focused on Security. A large part was UX. The Quiz for week 2 contained a lot of material that wasn't covered until the following week.
por Dimitrios D•
Very professional approach, but a bit lower level than expected. In addition the audio could be of better quality, in some presentations.
por Roger A•
I have learn small about security and some basics about design, perhaps this training should be renamed to "design" instead security....
por Vitor G•
I was expecting a technical course, and this is more about concepts of usability.
por Youssef S A M•
i think that this course doesn't have the importance that i thought i would find.
por Anurag P•
Needs an immediate update.
A significant portion of the course was unnecessary.
por Justin W•
Reasonable class about designing user interfaces, not much about cybersecurity.
por Benjamin H•
Most of the course content simply states commen sens facts
por Haochen L•
I did not learn a lot.
por Rene v h•
Good starter cource.
por Aslam K•
This was an extremely elementary and thus disappointing course. While the importance of "Usability" was rightly emphasized, the representation in terms of examples, case studies, etc. was simplistic. I appreciated having my attention drawn to the pitfalls of HCI design and the consequent failure of the corresponding systems. However, the solutions were presented as if: 1.) there are always "correct" interface/usability choices; 2.) the "correct" choice is all that's needed for the system to be optimally functional; and 3.) there is never a tension between usability and effective functioning of a system (that can't be resolved with correcting the usability).
It is irresponsible to suggest, for example, that a user selected memorable password is generally adequately secure without also covering ways that an interface can guide/nudge the user to create a secure password. Wide recognition of the importance of this may be more recent than the studies covered in the course. There is nothing wrong with studying old, seminal research, even in this age of "Internet time," but I wish I wasn't left wondering what, if any, developments had occurred in the decade or so since that research took place.
As for tension between usability and security, it absolutely exists. For instance, PGP encryption is a reliable way to secure information, yet making it usable remains a challenge. This is not even mentioned in the entire course. In fact, this course would leave an otherwise uninformed student believing that there are usability solutions waiting to be applied to every cause of info insecurity if the techies would just look. I wish the course had at least acknowledged that there are cases where a slight compromise on usability might be necessary for the sake of appropriate security.
Lastly, for those designing an HCI for security, it is important to understand threat models. This concept is also missing from the course.
I reviewed this course (above) immediately after I finished it. I am now in the 3rd week of Software Security, the 2nd course in the Cybersecurity specialization, and am realizing that 2 stars was a generous assessment. Based on the prerequisites of the Software Security course, the Usable Security course, in its current form, is too elementary to be appropriate for people who have the experience/knowledge required for the rest of the courses in this specialization. As I explained above, the course relies heavily on decade-old research but does not cover any developments since. For instance, the usability issues covered in the studies are for ancient versions of browsers with no discussion of how the browsers and our infosec vulnerabilities have changed since those studies were published. Another example is the instructor's eschewing of password managers while many knowledgeable folks in the infosec community today recommend their use. The usability challenges of password managers and a discussion of how they might be mitigated would have been more appropriate.