Search result for Data access Online Courses & Certifications
Get Course Alerts by Email
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
This course sensitizes regarding security in Big Data environments. You will discover cryptographic principles, mechanisms to manage access controls in your Big Data system. Implementing security for Big Data Administrative measures for Big Data Preventive measures: Access control Define cryptographic principles and mechanisms to manage access controls in your Big Data system....
Peer-to-Peer Protocols and Local Area Networks
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
Part one in this course is to answer the question of how does a peer-to-peer protocol deliver reliable data transfer service across unreliable transmission lines or networks. We focus on several medium access control protocols and their performance analysis. Reliable Services and Data Link Controls Practice Assessment - Reliable Services and Data Link Controls...
Framework for Data Collection and Analysis
by Frauke Kreuter, Ph.D. , Mariel Leonard- 4.2
Approx. 10 hours to complete
This course will provide you with an overview over existing data products and a good understanding of the data collection landscape. With the help of various examples you will learn how to identify which data sources likely matches your research question, how to turn your research question into measurable pieces, and how to think about an analysis plan....
Achieving Advanced Insights with BigQuery
by Google Cloud Training- 4.7
Approx. 10 hours to complete
Schema Design and Nested Data Structures More Visualization with Google Data Studio Advanced Data Studio: Case Statements and Filters Sharing Dashboards and Data Access Pitfalls Advanced Google Data Studio Data Skew in your Datasets Data Access Data Access Roles, Creating Authorized Views, and Common Pitfalls Data Access...
Salesforce Integration
by Stephane Muller- 0.0
Approx. 13 hours to complete
Salesforce Integration explores why data management is so important, how Salesforce can help organize and display reported data to gain insight into trends and patterns, and how to automate manual business procedures. Learners will specifically practice creating custom automation process, building work flows, and performing data modeling. Assess data quality and create reports and visualize via dashboards....
PHP registration, login and content management system
by Michael Miller- 0.0
10 hours on-demand video
Controlling access to your web pages and data This course will teach you how to build a secure user registration and login system and a content management system that will allow you to control exactly who has access to your data and web pages ...
$12.99
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability....
Related searches
Getting Started with SAS Visual Analytics
by Nicole Ball- 4.7
Approx. 5 hours to complete
In this course, you learn more about SAS Visual Analytics and the SAS Viya platform, how to access and investigate data in SAS Visual Analytics, and how to prepare data for analysis using SAS Data Studio. Preparing Data Using SAS Data Studio Introduction to Preparing Data Visual Analytics Methodology: Access Data Types...
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. Protect Data Access and Verify Source of Trust Apply Principle of Least Privileges for Access Control Principle of Adequate Data Protection Assess How to Protect Data Access and Verify Source of Trust...
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. Ensure Data Delivery to Right Location Right Path Right Place Data Delivery...