Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
eHealth: More than just an electronic record
by Tim Shaw- 4.6
Approx. 12 hours to complete
- What kind of health data we are currently collecting and how it will transform healthcare in the future Assessable components: Assignment 1 in Module 2 (40%) and Assignment 2 in Module 5 (60%). Module 3 - Data and the "Quantified Self" Data and the quantified self Data and digital health records Privacy and security - should we be worried?...
Data Privacy Awareness
by James Hallam- 0.0
2 Weeks
This course provides an understanding of data privacy compliance in Rolls-Royce: what data privacy means; why handling personal data correctly and in accordance with legislation is so important. And as we all know, Facebook announced a data breach in 2018, where 87 million user accounts were compromised Do's and Don'ts GDPR and You...
$49
GDPR Certification & Preparation to CIPP Certification Test
by ICAN Consultancy- 4.2
2 hours on-demand video
NEW: We have added an article to explain the differences and similarities of GDPR and California Consumer Privacy Act (CCPA) Our GDPR training course offer a structured learning path to equip professionals with the specialist knowledge and skills needed to deliver GDPR compliance and also fulfil the role of data protection officer. There is a dedicated lecture which includes example questions and answers....
$13.99
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
You will also be able to discuss the three pillars of the CIA triad and how they apply to enterprise systems. Don't I just trust what Apple, Microsoft, and the other guys tell me? Personal and Enterprise Computing Network Addressing and Subnetting Explained from Cisco Addressing and Sub-netting Practice Confidentiality and data breaches...
Understanding and Complying with HIPAA
by Scott Koller- 4.5
37 mins on-demand video
This program will train you on the HIPAA and provide an overview on the rules governing protected health information. This presentation describes the statutory and regulatory background and purpose of HIPAA and provides a general summary of the principles and key provisions of the Privacy and Security Rule....
$17.99
INTERNET OF THINGS & LAW - DR. PAVAN DUGGAL - CYBERLAW UNIV.
by Dr. Pavan Duggal- 3.5
1 hour on-demand video
A course to discover the law and legalities concerning Internet of Things It takes you through a journey to discover the various complex legal issues that Internet of Things is beginning to throw up, including protection of privacy and cyber security and how different legal approaches are evolving to deal with these legalities and related nuances raised by IoT....
$12.99
Combining and Analyzing Complex Data
by Richard Valliant, Ph.D.- 4.2
Approx. 10 hours to complete
The course will also cover the basics of record linkage and statistical matching—both of which are becoming more important as ways of combining data from different sources. Informed consent may have to be obtained from persons to allow their data to be linked. Improving Federal Statistics Using Multiple Data Sources Privacy and Confidentiality...
Related searches
Cybersecurity Compliance and System Administration
by Coreen Ryskamp- 0.0
4 Weeks
You will learn the concepts of endpoint security and patch management. Describe the key privacy and data protection requirements for GDPR. Describe the Payment Card Industry Data Security Standard (PCI DSS). Describe the differences between basic, foundational and organizational Center for Internet Security (CIS) controls. Describe Windows and Linux security management considerations....
$149
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. Information Flow Models and Hook-Up Theorem - Part 1 Information Flow Models and Hook-Up Theorem - Part 2 Required: “Password Security: A Case History,” Morris and Thompson Video: “The Security Mirage,” Bruce Schneier, TED Talk...
GDPR - A 3-Step Process for applying GDPR +Tools +Templates™
by Dr. Chris Mall • 25,000+ Students Worldwide- 4.5
2 hours on-demand video
GDPR Methodology, GDPR Templates & Automated Software: Scanners for checking compliance & Auto-generator Privacy Policy The EU General Data Protection Regulation GDPR replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy....
$9.99