Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Apply Generative Adversarial Networks (GANs)
by Sharon Zhou , Eda Zhou , Eric Zelikman- 4.8
Approx. 27 hours to complete
- Explore the applications of GANs and examine them wrt data augmentation, privacy, and anonymity It also covers social implications, including bias in ML and the ways to detect it, privacy preservation, and more. Week 1: GANs for Data Augmentation and Privacy Data Augmentation: Methods and Uses Data Augmentation: Pros & Cons...
Introduction to WebRTC
by Infinite Skills- 4.7
3.5 hours on-demand video
This course is designed for users that already have a basic understanding of JavaScript and HTML. From there, Arin will teach you about WebRTC signaling, WebRTC for data exchange, and screen sharing in a WebRTC application. Finally, you will learn about user interaction patterns and security and privacy considerations....
$17.99
Turn Ethical Frameworks into Actionable Steps
by Eleanor 'Nell' Watson , Aaron Hui , Abhishek Gupta , Megan Smith Branch- 4.6
Approx. 15 hours to complete
Principles alone can be elusive and impractical for application. Safety and Security Big Data Generated Through Devices vs. Corporate Data Hegemony Conflict Reconciliation Between Ethics, Regulations, and Business Demands Quiz Compare ethical frameworks and select one to guide decisions to resolve an organizational issue. Analyze applicable regulations, standards, and international best practices....
Cyber Security Masterclass Course : Go From Zero to Hero
by Chinmay Kulkarni- 0.0
10.5 hours on-demand video
Other major domains are Incident Response Management, Blue team, Security Audits, IT Security Management, Security laws and many more. Entire networking related to Cyber security and Terminologies - Threat, Vulnerability, Incident, Management, Attacks, Exploits, Events Careers and job opportunities in Cyber security A brief overview of malware and its types Overview of Security Audits and Frameworks...
$13.99
Proactive Computer Security
by Greg Williams- 4.7
Approx. 11 hours to complete
I’ve heard this before – “I’m not sure my computer security practices are working”. ” This course is the fourth and final course in the Practical Computer Security specialization. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems....
Information Security - Advanced topics
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of information security, including Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. This is a self-paced course that provides a continuation of information security and cybersecurity topics. Among the topics covered are Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency....
$166
FinTech Security and Regulation (RegTech)
by Theodore Henry King CLARK- 4.6
Approx. 15 hours to complete
You will learn about how FinTech and RegTech disrupt and transform finance industry, such as challenges in protecting data and security with digital forensics, risk management and corporate governance in banking industry in terms of Know Your Customer (KYC) and Anti Money Laundering (AML), and how governments in different countries take initiatives in FinTech and RegTech....
Related searches
AI-100 & DP 100 practice Test: Real Exam Questions
by EXAM SUCCESS- 0.0
Map security requirements to tools, technologies, and processes May include but is not limited to: Design authentication architecture, design a content moderation strategy, ensure appropriate governance for data, design strategies to ensure the solution meets data privacy and industry standard regulations Validate solutions to ensure compliance with data privacy and security requirements...
$12.99
How Computers Work
by Dr Marco Gillies- 4.6
Approx. 10 hours to complete
Computers are everywhere, they aren't just the desktops and laptops we use for work but the phones in our pockets and even the watches on our wrists are also computers. You probably use a computer every day and in fact you are reading this on a computer! 3 Security and the Web...
The Complete Cyber Security Course : End Point Protection!
by Nathan House- 4.7
16.5 hours on-demand video
which is an extremely important and hot topic in cyber security right now! monitor for threats such as malware and hackers through the use of security anti-forensics to securely delete data and meta-data so that it is How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies....
$24.99