Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Blockchain, Anonymity, and Critical Infrastructure Protection...
Interprofessional Healthcare Informatics
by Karen Monsen, Ph.D., RN, FAAN- 4.4
Approx. 11 hours to complete
Interprofessional Healthcare Informatics is a graduate-level, hands-on interactive exploration of real informatics tools and techniques offered by the University of Minnesota and the University of Minnesota's National Center for Interprofessional Practice and Education. Data, Information, and Knowledge Data, Information, and Knowledge Data, Information, Knowledge, and the Omaha System Data Exchange and Interoperability Data Exchange and Interoperability...
Human Rights for Open Societies
by Janneke Gerards , Antoine Buyse , Claire Loven- 4.8
Approx. 14 hours to complete
A solid protection of human rights is needed for an open society to exist and to flourish. We will look, amongst other things, at the freedom of expression and demonstration, the right to vote, and the prohibition of discrimination. You will even encounter watchdogs and ice cream in this course. The ECHR and the universal protection of human rights...
MS-900:Microsoft 365& Office 365 Administration Fundamentals
by Satish Reddy | Over 30,000 Students | Microsoft Certified Trainer- 4.2
2.5 hours on-demand video
The course is for business owners, IT consultants, end-users, and even for developers who are working on the Microsoft ecosystem. This course provides a practical approach to learning Microsoft 365 and its components. OneDrive and SharePoint Data Migration Section 5: Service Life Cycle and Support Data Loss Prevention (DLP) Understand identity protection and management...
$19.99
1z0-082 1z0-083 1z0-066 1z0-447 DBA, Data Guard, Goldengate
by Abdellatif Abugharbieh- 0.0
The Oracle Certified Expert, Oracle Database 12c: Data Guard Administrator certification is for Database Administrators who have experience in creating a physical and a logical standby database, managing Oracle Net Services in a data guard environment, using Oracle active data guard, creating and monitoring a data guard broker configuration, and configuring data protection modes among others....
$12.99
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 1...
AZ-500 - Microsoft Azure Security Engineer - Practice Tests
by Practice Makes Perfect- 0.0
Candidates for this exam should have subject matter expertise implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. The exam will test a total of 4 key areas and they are as follows: Secure Data and Applications (25-30%)...
$12.99
Related searches
Learning Analytics Fundamentals
by George Siemens , Charles Lang , Justin Dellinger- 0.0
4 Weeks
Learn about the growing field of learning analytics and how to analyze basic data sets to generate insights. The demand for data science and learning science skills has continued to increase as classrooms, labs, and organizations look to optimize their data and improve learning environments for students and employees. Ethics and privacy considerations...
$99
Social Science Approaches to the Study of Chinese Society Part 2
by Cameron Campbell- 0.0
Approx. 16 hours to complete
It is organized as an introduction to the design and execution of a research study. It reviews the major types of qualitative and quantitative data used in social science research, and then introduces some of the most important sources of existing data available freely or by application, worldwide and for China....
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....