Search result for Courses on data protection Online Courses & Certifications
Get Course Alerts by Email
Foundations of Public Health Practice: The Public Health Approach
by Dr Richard J Pinder- 4.8
Approx. 13 hours to complete
The scope and content of this course has been developed from the ground up by a combined team of academics and practitioners drawing on decades of real-world public health experience as well as deep academic knowledge. An introduction to health protection (domain 2) Examples of health protection activities...
Cisco SD-WAN (Viptela) with Lab Access
by Zach Zang- 4.1
5 hours on-demand video
· Data Plane · Controller Protection · vEdge Protection...
$13.99
Cyber Security - Python and Web Applications
by Mashrur Hossain- 0.0
10.5 hours on-demand video
Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php. Phishing Protection Wireless Access Point Protection Sensitive Data Exposure...
$16.99
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Private Data Third-Party Data Secondary Use of Data Combined Data Sources Track Customer Data Minimize Private Data Sharing Minimize Private Data Collection Data Protection Policies Overfitting to Training Data Radioactive Data Tracing Evaluate Training Data and Models Protect the Security of Data in Storage Protect the Security of Data in Transit...
KYC SPECIALIST - CLIENT ON-BOARDING EXPERT
by CAMS COACH- 4.2
1 hour on-demand video
It is important to keep in mind the stakeholders of the KYC information at the time of designing the on-boarding forms & manuals to ensure the protection of the organization's reputation. We emphasis mainly on the completeness of the data collection here, and not on the mode of data collection (through ID microchip or Computer-readable passports)....
$12.99
Getting Started with HashiCorp Vault (Updated for 2021)
by Bryan Krausen- 4.5
9.5 hours on-demand video
How to get started on your journey to becoming an expert in HashiCorp Vault Data Protection in Vault He has several courses on HashiCorp Vault and has co-authored the book Running HashiCorp Vault in Production....
$29.99
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. - Restrict access to a Google service to trusted applications only to prevent malicious attacks on that service....
Related searches
Google Workspace Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. - Restrict access to a Google service to trusted applications only to prevent malicious attacks on that service....
The Economics of Agro-Food Value Chains
by Hannes Lang , Luisa Menapace , Faical Akaichi , Francesco Bimbo , Montserrat Costa-Font , Carlo Russo , Chenguang Li- 4.5
Approx. 44 hours to complete
Data Types and Data Collection Part 1: Data Analysis Part 2: Data Analysis Part 3: Data Analysis Part 4: Data Analysis Data Types and Data Collection Part 1: Data Analysis Part 2: Data Analysis Part 3: Data Analysis Part 4: Data Analysis Part 1: Geographical Indications (GI): concept, relevance and protection...
Business Analytics Capstone
by Wharton Teaching Staff- 4.5
Approx. 13 hours to complete
At the end of this Capstone, you'll be able to ask the right questions of the data, and know how to use data effectively to address business challenges of your own. Descriptive Data Collection (Customer Analytics) Passive Data Collection (Customer Analytics) Causal Data Collection and Summary (Customer Analytics) Performance Evaluation: the Challenge of Noisy Data (People Analytics)...