Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore data visualization techniques in cybersecurity through this conference talk that challenges traditional approaches. Delve into the evolution of security data representation, from the iconic WOPR (War Operation Plan Response) computer to modern methodologies. Learn about the comprehensive process of creating effective visualizations, including discovery, research, user persona development, and design requirements. Gain insights into the concept and prototype phases, understanding how to craft visual representations that enhance security analysis and decision-making. Discover how to leverage user perspectives and design principles to create impactful security visualizations that go beyond conventional methods.
Syllabus
Intro
The WOPR
Raphael Marty
Discovery Phase
Research Phase
User Personas
User Perspectives
Design Requirements
Concept Phase
Prototype Phase
Taught by
BSidesLV