Smart Interface Design Patterns
13h 18m 5s
English
Paid
Course description
Guidelines & best practices for common components in modern interfaces.
Inventing a new solution for every problem takes time, and too often it’s just unnecessary. We can rely on bulletproof design patterns to avoid issues down the line. This course helps with just that.
We’ll study 100s of hand-picked examples — from complex navigation to filters, tables and forms. We’ll dive into actual real-life challenges. And: we’ll design and review each other’s work, together, live.
Read more about the course
A full course with delicious design recipes, exquisite samples and reliable examples. Carefully hand-picked over 15 years:
Watch Online
Join premium to watch
Go to premium
# | Title | Duration |
---|---|---|
1 | Introduction | 06:09 |
2 | Designing For Touch | 17:51 |
3 | Accordions | 15:19 |
4 | Navigation | 20:37 |
5 | Hamburger | 10:09 |
6 | Filters | 10:05 |
7 | Mega-Dropdowns | 43:53 |
8 | Breadcrumbs | 28:58 |
9 | Carousels | 15:44 |
10 | Modals | 17:53 |
11 | Footnotes | 06:37 |
12 | Summary | 07:51 |
13 | Design KPIs | 35:37 |
14 | Configurators | 32:35 |
15 | Tables | 19:21 |
16 | Data Tables | 49:22 |
17 | Feature Comparison | 22:45 |
18 | Pricing Plans | 53:03 |
19 | Date Pickers | 16:33 |
20 | Schedule & Calendars | 21:51 |
21 | Sliders | 20:10 |
22 | Timelines | 13:58 |
23 | Infinite Scroll | 16:22 |
24 | Maps | 20:32 |
25 | Seat Selection | 15:19 |
26 | Language Selector | 35:12 |
27 | Privacy UX | 17:44 |
28 | Bringing Personality Back To The Web | 26:14 |
29 | Usability vs. Security | 12:18 |
30 | Landscape of Authentication | 20:22 |
31 | Social Sign-In, 2FA, SSO | 21:03 |
32 | Access Recovery | 09:01 |
33 | Passwordless Authentication | 07:48 |
34 | Search UX | 19:20 |
35 | Search Design Patterns | 25:59 |
36 | Autocomplete UX | 27:08 |
37 | Filtering UX | 37:22 |
Books
Read Book Smart Interface Design Patterns
# | Title |
---|---|
1 | 01. Designing For Touch |
2 | 02. Accordions |
3 | 03. Navigation |
4 | 04. Hamburger |
5 | 05. Filters |
6 | 06. Mega-Dropdowns |
7 | 07. Breadcrumbs |
8 | 08. Carousels |
9 | 09. Modals |
10 | 10. Footnotes |
11 | 11. Design KPIs |
12 | 12. Configurators |
13 | 13. Tables |
14 | 14. Data Tables |
15 | 15. Feature Comparison |
16 | 16. Pricing Plans |
17 | 17. Date Pickers |
18 | 18. Schedule & Calendars |
19 | 19. Sliders |
20 | 20. Timelines |
21 | 21. Infinite Scroll |
22 | 22. Maps |
23 | 23. Seat Selection |
24 | 24. Language Selector |
25 | 25. Privacy UX |
26 | 26. Bringing Personality Back To The Web |
27 | 27. Usability vs. Security |
28 | 28. Landscape of Authentication |
29 | 29. Social Sign-In, 2FA, SSO |
30 | 30. Access Recovery |
31 | 31. Passwordless Authentication |
32 | 32. Search UX |
33 | 33. Search Design Patterns |
34 | 34. Autocomplete UX |
35 | 35. Filtering UX |
Comments
0 commentsSimilar courses

Your training programs | MR ANATOLY (MEN PRO WORKOUT)
Sources: Vladimir Shmondenko aka Mr Anatoly
8 Week Training program for gym. An advanced program for training in the gym, on average 4-5 workouts per week. Home workout program for 8 weeks: You can train
32 minutes 2 seconds

CQRS in Practice
Sources: pluralsight
There are a lot of misconceptions around the CQRS pattern, especially when it comes to applying it in real-world software projects. In this course, CQRS in Prac
4 hours 22 minutes 58 seconds

The Many Hidden Worlds of Quantum Mechanics
Sources: Wondrium by The Great Courses, Sean Carroll
One universe is not enough. Learn about the Many-Worlds Interpretation of quantum mechanics in this exciting course taught by a renowned expert. Taught by Profe
11 hours 56 minutes 32 seconds

Build Viral Telegram Apps Course
Sources: Nikandr Surkov
Learn to develop Telegram Mini Apps from scratch to completion: game mechanics, payment integration (TON and Telegram Stars), built-in viral elements...
37 minutes 59 seconds

Web Security & Bug Bounty Learn Penetration Testing in 2023
Sources: zerotomastery.io
Start a career or earn a side income by becoming a Bug Bounty Hunter. No experience needed. Hack websites, fix vulnerabilities, improve web security and much mo
10 hours 28 minutes 11 seconds
Want to join the conversation?
Sign in to comment