Price: $1,699.00

Length: 2 Days
Print Friendly, PDF & Email

Usable Security Fundamental Training By TONEX

Usable Security Fundamental Training Course Description

The usable security fundamental training course introduces you to a variety of usability and user interface problems related to system privacy and security. Furthermore, it gives you the experience needed in design studies aimed to prevent usability issues in security and privacy systems.

In applications where humans are the critical part of the security process for example by creating passwords, following security protocols, or even sharing the vital part of information which may endanger the entire security of the system, usable security plays a key role in preserving the security of the system.

TONEX as a leader in security industry for more than 15 years is glad to announce the new course on Usable Security Fundamentals which helps you to design a secure system with human-centric focus.

TONEX has served the industry and academia with high quality conferences, seminars, workshops, and exclusively designed courses in cyber security area and is pleased to inform professional fellows about the recent comprehensive training on usable security fundamentals.

By taking the usable security fundamentals training, you will learn the basics of human computer interaction (HCI), design considerations for secure system, and human communication protocol. Moreover, you will be introduced to the basics of computer security, privacy policies, security safeguard principles, and concept of usability in computer security.

Learn about user studies to minimize the dame caused by worms, viruses, and other types of malware. This course gives you the sufficient knowledge to prevent the threat, detect the threat, and action regarding the threats based on usability guidelines for usable security.

Learn about the usable privacy and security topics such as principles of usable security, user educational studies, centered design of usable system, risk analysis, or AEGIS process.

Learn how a secure interaction design can mitigate the problems of security such as cookies, phishing, or distrust. Moreover, learn how to design a trustworthy secure system knowing the fact about different layers of trust in a system.

This course teaches you the design considerations for privacy and introduces the privacy issues regarding the human computer interactions. Topics such as privacy analysis, peripheral privacy, GUI design and pitfalls in privacy design are considered as key components.

As the first thing that comes to our mind in a usable security network is the authentication and password issues, this course helps you to understand the compliance defects and improve the user interface security by encryption application and password cracking prevention policy.

If you are an IT professional who specialize in system, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of usable security fundamentals training and will prepare yourself for your career.

Finally, the usable security fundamentals training will help you to secure the communications by introducing the concept of public key infrastructure. Hierarchy of PKI, encrypting using PKI and different PKI algorithms will help you to build a secured communication in your network.

Audience

The usable security fundamentals training is a 2-day course designed for:

  • All individuals who need to understand the concept of usable security and human computer interaction.
  • IT professionals in the areas of usable security, windows security and system administration
  • Cyber security professionals, network engineers, security analysts, policy analysts
  • Security operation personnel, network administrators, system integrators and security consultants
  • IT professionals interested in the field of usable security and authentication
  • Security traders to understand the human based security of a network.
  • Investors and contractors who plan to make investments in security system industry.
  • Technicians, operators, and maintenance personnel who are or will be working on cyber security projects
  • Managers, accountants, and executives of cyber security industry.

Training Objectives

Upon completion of the usable security fundamentals training course, the attendees are able to:

  • Understand the basics of human computer interaction
  • Describe the concept of computer security and requirements of a usable secured system
  • Describe how users can improve or analyze the usable system security
  • Develop the usable privacy concepts and differentiate them with usable security
  • Design the secure interaction usable system free of threats or malwares
  • Understand the trust layers in usable security and design a trustworthy secured system
  • Describe the authentication and password related issues in usable security and manage to control the problems
  • Explain the concept of public key infrastructure (PKI) and secure communication principles and analysis methods

Training Outline

The fundamental of usable security training course consists of the following lessons, which can be revised and tailored to the client’s need:

Basics of HCI Methods, Usable Security and Design

  • Usability
  • What is human computer interaction (HCI)?
  • Security bugs
  • Software wizard
  • HCI bibliography
  • Interaction design for secure systems
  • Usable security blog
  • Human communication
  • Mental and psychological models
  • Design methodology
  • Introduction to HCI method

Basics of Computer Security

  • What is privacy?
  • Privacy regulations
  • Privacy policies
  • Privacy preferences
  • Privacy risks
  • The unconcerned
  • Pragmatist
  • Security safeguard principle
  • Concept of security
  • Preventative
  • Detective security
  • Corrective security
  • Cryptography
  • Symmetric cryptography
  • Usability
  • Access control
  • Authentication
  • Trustworthiness

User Studies for Usable Security

  • Chameleon
  • Minimizing the damage by worms, viruses
  • Interactive prototype
  • Prevention, detection, action rule
  • Low Fidelity Prototyping (Li-Fi)
  • Role based access control (RBAC)
  • Vault
  • Communications
  • Default
  • Testing
  • System
  • Application of anti-spyware
  • Toolkits with user interface
  • P2P software
  • Usability troubles
  • Design methods
  • Design tools
  • Cognitive walkthrough
  • File sharing study
  • Usability guidelines for P2P

Usable Privacy and Security

  • Psychological acceptability
  • Unstable security
  • Usability design
  • Differentiation of users and enemies
  • Security chain
  • Principles of security
  • Security ineffective products
  • Educating the users
  • Good password
  • Password security
  • Cracked password
  • Motivation of protection
  • Designing a usable system
  • Centered design
  • Regime changing
  • Password mechanism
  • Password considerations
  • Supporting production tasks
  • Involving stakeholders
  • AEGIS process
  • Risk analysis
  • Security design
  • Modeling assets
  • Gathering participants

Secure Interaction Design

  • Designing secure interfaces
  • Problems of security
  • Viruses
  • Spyware
  • Outline tracking
  • Designing principles
  • Firefox extension
  • Cookies
  • Phishing
  • Tracking
  • Petname
  • Cookie Culler
  • Cookie Button
  • Distrust
  • Anti-paranoia

Designing Trustworthy Secure System

  • Concept of trust
  • Consumer advice site
  • E-commerce sites
  • Lost or lacking trust
  • Fundamental to security is trust
  • Trust layers
  • Granularity
  • Processing strategies
  • Credibility and computing technology
  • Presumed credibility
  • Experienced credibility
  • Trustworthiness
  • Trust models
  • Trust design guidelines
  • Defense against phishing; dynamic security skin
  • Security toolbars

 Privacy Design

  • Privacy issues and Human Computer Interaction (HCI)
  • User centric privacy space framework
  • Pitfalls in privacy design
  • Privacy guideline development
  • Location disclosure application
  • GUI design; overview, entries
  • Privacy practices of internet users
  • Visualizing privacy
  • Privacy policy and preferences
  • Privacy analysis
  • Anonymity; Usability and the network effect
  • Stopping spyware at the gate
  • Peripheral privacy
  • Informed consent by design for web browser privacy
  • Social approaches to end-user security and privacy management
  • Worry-free web design
  • Hardening browsers
  • Semantic attacks

Authentication and Passwords

  • Compliance defects
  • Improving the user interface
  • Enforcement mechanism
  • Graphical passwords
  • Security of graphical passwords
  • Encryption application
  • Reducing the trust in network
  • Server delegation
  • Reconstruction of hardened password
  • Dictionary attacks
  • Identity management
  • Mnemonic passwords
  • Human selection of text passwords
  • Password cracking
  • Randomly generated Human pronounceable passwords

 Secure Communications

  • Public Key Infrastructure (PKI)
  • Communication under PKI
  • ITU-T standard for PKI
  • V3 certificate
  • Hierarchy of PKI
  • Non-repudiation of signatures
  • Certificate revocation
  • CRLs
  • Request/response protocol
  • Encrypting email with PKI
  • Problems of PKI
  • Simple PKI (SPKI)
  • Web of trust
  • Key management issues

Hands-on and In-Class Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops Labs for Usable Security Training

  • Building Better Passwords: We’ll use a tool that shows how long it takes to compromise various passwords via a brute force attack
  • Simple Desktop Security with Chameleon
  • The Case for Usable Security
  • Creating Usable Security Products for Consumers
  • Fighting Phishing at the User Interface
  • User-Centric Privacy Space Framework
  • Firefox and the Worry-free Web
  • The Memorability and Security of Passwords
  • Graphical Password Schemes
  • Achieving Usable Security in Groove Virtual Office

Usable Security Fundamental Training

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.