Search result for Privacy and anonymity Online Courses & Certifications
Get Course Alerts by Email
Cyberhacker Series: Cyber Anonymity
by Chad Russell- 4.1
2 hours on-demand video
Cyberhacker Series: Cyber Anonymity Cyberhacker Series: Cyber Anonymity You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains. Private VPNs are one of the better anonymity options available. In this course I will break down Data Privacy into it's various components and share with you the current state of digital privacy....
$12.99
The Complete Cyber Security Course : Anonymous Browsing!
by Nathan House- 4.6
13.5 hours on-demand video
skill-set in staying anonymous online and maintaining total privacy against even all the best anonymising and privacy methods. look at the techniques used to attack these anonymity services and what you can This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity. We cover how to use cellular networks for privacy and anonymity....
$19.99
Intro to Information Security
by Wenke Lee , Mustaque Ahamad , Catherine Gamboa- 0.0
Approx. 0
) lesson 2 Software security Vulnerabilities and protections Malware Program analysis lesson 3 Practical cryptography Encryption Authentication Hashing Symmetric and asymmetric crypto lesson 4 Networks Wired and wireless networks Protocols Attacks and countermeasures lesson 5 Applications and special topics Databases Web apps Privacy and anonymity Voting Public policy...
Free
Artificial Intelligence Privacy and Convenience
by Brent Summers- 4.6
Approx. 6 hours to complete
In this course, we will explore fundamental concepts involved in security and privacy of machine learning projects. We will also ask big questions about how businesses implement algorithms and how that affects user privacy and transparency now and in the future. Privacy and convenience vs big data Protecting Privacy: Theories and Methods...
The Ultimate Dark Web, Anonymity, Privacy & Security Course
by Zaid Sabih- 4.7
10.5 hours on-demand video
Learn how to access & use the dark net and the clear net privately, anonymously and securely Welcome to the ultimate dark net, privacy, anonymity and security course. Dark Net - This is the portion on the internet that is not indexed by search engines and require special configuration to access....
$26.99
Data Science Ethics
by H Jagadish- 0.0
4
Explore the ethics of big data collection and sharing, and consider the importance of data privacy in our society today....
Free
Information Security - Advanced topics
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of information security, including Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. Among the topics covered are Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. We follow up with a look at the privacy and different methods users can obtain anonymity....
$166
Related searches
Security and Privacy for Big Data - Part 2
by Enrique Barra , Fabian Garcia Pastor- 4.7
Approx. 1 hour to complete
This course sensitizes regarding privacy and data protection in Big Data environments. You will discover privacy preserving methodologies, as well as data protection regulations and concepts in your Big Data system. Know privacy risks arising from Big Data applications and methods which reduce or prevent privacy risks of data processing activities....
Apply Generative Adversarial Networks (GANs)
by Sharon Zhou , Eda Zhou , Eric Zelikman- 4.8
Approx. 27 hours to complete
- Explore the applications of GANs and examine them wrt data augmentation, privacy, and anonymity It also covers social implications, including bias in ML and the ways to detect it, privacy preservation, and more. Train your own model using PyTorch, use it to create images, and evaluate a variety of advanced GANs. Week 1: GANs for Data Augmentation and Privacy...
Security and Privacy in TOR Network
by Edward Chow , Greg Williams , Richard White- 4.3
Approx. 22 hours to complete
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. Realize Anonymity in TOR The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network...