Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Data Management, Data Security and Robot Operating System as a Common Tool for IoT
by Aleksandr Kapitonov , Salvatore Distefano , Karlis Berkolds , Agris Nikitenko- 0.0
5 Weeks
Data management and its security and privacy is an important topic for IoT. IoT security and privacy come as a big challenge with an increasing number of connected devices. And direct routing between devices became reasonable in a sense of sustainability and economy of IoT solutions. Security and privacy guideline. Several cases of how to find and fix vulnerabilities....
$149
Introduction to Meteor.js Development
by Dr Matthew Yee-King- 4.6
Approx. 26 hours to complete
You will implement user authentication, security features, reactive templates and routing using iron router. You will carry out key database operations such as inserting, removing and updating data as well as sorting and filtering. Write MongoDB data filters to search for and sort data Security and routing Security and routing summary Security and routing summary quiz...
AZ-900: Microsoft Certified Azure Fundamentals
by Lawrence Manickam- 0.0
2.5 hours on-demand video
Learn Public Cloud, Azure Solutions, Azure Services, Pricing, and Infrastructure concepts (Bonus). Azure AD, Big Data, SQL Services and AI/ML will continue to lead the USD 350 billion market. Azure core products and services Azure networking and security Azure privacy, compliance and data protection standards Azure cloud planning and management of costs Azure SLA's and Product features...
$12.99
Genomics for Law
by Dr. Gene E. Robinson , Dr. Jennifer K. Robbennolt- 4.8
Approx. 12 hours to complete
Throughout this course you will explore the implications of genomics research on law, as well as law's influence and implications on genomics research, as it pertains to the following topics: • Genomics and Privacy Law Speculating on Abandonment and Reasonable Expectations of Privacy Genomics and Privacy Law Introduction to Privacy and Genomics Legal and Ethical Issues in Genomics: Privacy Concerns...
Cryptography I
by Dan Boneh- 4.8
Approx. 23 hours to complete
In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. In a second course (Crypto II) we will cover more advanced cryptographic tasks such as zero-knowledge, privacy mechanisms, and other forms of encryption. Information Theoretic Security and The One Time Pad Definitions and Security...
Blockchain, Cryptoassets, and Decentralized Finance
by Don Tapscott , Alex Tapscott- 4.6
Approx. 19 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. Security Tokens, and Natural Asset & Commodity Tokens Describe seven types of cryptoassets, and explain what it means to “tokenize” an asset Describe eight core functions of the financial services industry and explain how blockchain will disrupt each of these functions...
CS50 for Lawyers
by Doug Lloyd , David J. Malan- 0.0
10 Weeks
Through a mix of technical instruction and discussion of case studies, this course empowers students to be informed contributors to technology-driven conversations. Along the way, it equips students with hands-on experience with Python and SQL, languages via which they can mine data for answers themselves. Algorithms, Data Structures Challenges at the Intersection of Law and Technology...
$199
Related searches
CS50's Computer Science for Lawyers
by Doug Lloyd , David J. Malan- 0.0
10 Weeks
Through a mix of technical instruction and discussion of case studies, this course empowers students to be informed contributors to technology-driven conversations. Along the way, it equips students with hands-on experience with Python and SQL, languages via which they can mine data for answers themselves. Algorithms, Data Structures Challenges at the Intersection of Law and Technology...
$199
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)
by Total Seminars • 750,000+ Enrollments- 4.6
11.5 hours on-demand video
Ethical Hacking and CompTIA Cyber Security Analyst CySA+ (CS0-002) Exam Prep Analyze and interpret data Security Operations and Monitoring (25% of the exam) Threat data and intelligence Security solutions for your network and in the cloud Analyzing data using heuristics, trend analysis, and log review Controls, policies, frameworks, and procedures to protect data and secure networks...
$20.99
Big Data Modeling and Management Systems
by Ilkay Altintas , Amarnath Gupta- 4.4
Approx. 13 hours to complete
Once you’ve identified a big data issue to analyze, how do you collect, store and organize your data using Big Data solutions? In this course, you will experience various data genres and management tools appropriate for each. Data Scalability and Security Data Formats and Streaming Data Quiz DBMS-based and non-DBMS-based Approaches to Big Data...