In this exercise, students use Situation Awareness (SA), Gestalt Principles, design affordances, and CIA-for-HMI to design the Human-Machine Interface (HMI) for a cyber-physical system (one that will brew and serve pots of coffee).

This lab exercise explores Fitts Law, which states that response time will be the smallest when the distance to a target is small, and the size of the target is large.

This lab exercise introduces the concept of quality costs and shows you how to analyze and interpret quality cost data for a hypothetical organization that uses the NIST Cybersecurity Framework for risk management, and has designed its cost accounting system around the structure of the Framework Core.  It applies concepts learned during Lesson 3H in Module 3: Managing Security, Safety,

How a Computer Works

Computer use is required of almost all professions in today’s technological world and yet how they work is mysterious.  This module starts from electrons and transistors and builds up to the major components of a computer.  It spends a significant portion of the time describing binary logic since that is fundamental to understanding a computer.  With the knowledge gained in this course a student will be able to describe how a computer works and will be able to understand the importance of various characteristics of the computer. 

5 Lessons

This module focuses on cybersecurity concepts and principles. It lays the knowledge foundation for students who don’t have much experience in the subject matter. It aims to provide an overview of major factors that have distinct impacts on cybersecurity, including software, hardware, network, and people. As a high-level introduction, this module prepares students for hands-on work that illustrates the applications of malicious software and techniques (e.g., Keylogger), as well as defense (e.g., encryption).

6 Lessons

This module on digital forensics will familiarize you with forensics terminology and approaches, along with hands-on experience with a variety of forensic tools used by investigators to conduct incident response, find evidence of criminal behavior, and examine the effects of malware infection. The module will focus on Windows forensics and will use a Linux-based forensic workstation for hands-on analysis. Tools for conducting forensic examinations using a Windows system will also be introduced.

7 Lessons