Data Visualization in Security - Still Home of the WOPR?
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore data visualization techniques in cybersecurity through this conference talk that challenges traditional approaches. Delve into the evolution of security data representation, from the iconic WOPR (War Operation Plan Response) computer to modern methodologies. Learn about the comprehensive process of creating effective visualizations, including discovery, research, user persona development, and design requirements. Gain insights into the concept and prototype phases, understanding how to craft visual representations that enhance security analysis and decision-making. Discover how to leverage user perspectives and design principles to create impactful security visualizations that go beyond conventional methods.
Syllabus
Intro
The WOPR
Raphael Marty
Discovery Phase
Research Phase
User Personas
User Perspectives
Design Requirements
Concept Phase
Prototype Phase
Taught by
BSidesLV
Related Courses
Social Network AnalysisUniversity of Michigan via Coursera Intro to Algorithms
Udacity Data Analysis
Johns Hopkins University via Coursera Computing for Data Analysis
Johns Hopkins University via Coursera Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX