Data Visualization in Security - Still Home of the WOPR?
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore data visualization techniques in cybersecurity through this conference talk that challenges traditional approaches. Delve into the evolution of security data representation, from the iconic WOPR (War Operation Plan Response) computer to modern methodologies. Learn about the comprehensive process of creating effective visualizations, including discovery, research, user persona development, and design requirements. Gain insights into the concept and prototype phases, understanding how to craft visual representations that enhance security analysis and decision-making. Discover how to leverage user perspectives and design principles to create impactful security visualizations that go beyond conventional methods.
Syllabus
Intro
The WOPR
Raphael Marty
Discovery Phase
Research Phase
User Personas
User Perspectives
Design Requirements
Concept Phase
Prototype Phase
Taught by
BSidesLV
Related Courses
Design: Creation of Artifacts in SocietyUniversity of Pennsylvania via Coursera Design Thinking Action Lab
Stanford University via NovoEd Blended Learning: Personalizing Education for Students
New Teacher Center via Coursera Mobile Application Experiences Part 1: From a Domain to an App Idea
Massachusetts Institute of Technology via edX Usable Security
University of Maryland, College Park via Coursera