Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
Modeling Data in the Tidyverse
by Carrie Wright, PhD , Shannon Ellis, PhD , Stephanie Hicks, PhD , Roger D. Peng, PhD- 0.0
Approx. 21 hours to complete
Developing insights about your organization, business, or research project depends on effective modeling and analysis of the data you collect. Different modeling approaches can be chosen to detect interesting patterns in the data and identify hidden relationships. Types of Data Science Questions Descriptive and Exploratory Data Analysis Data Exploration and Wrangling...
Ethics in AI and Big Data
by Jennifer Cloer , Gary Schillinger- 0.0
6 Weeks
Learn how to build and incorporate ethical frameworks in your AI and Big Data technology and business initiatives to add transparency, build trust, and drive adoption. No longer stuck in the fantasy world of science fiction, Artificial Intelligence (AI) today is a reality, and data is its fuel. Understand what ethics means and how to apply it to AI....
$149
The Ultimate Dark Web, Anonymity, Privacy & Security Course
by Zaid Sabih- 4.7
10.5 hours on-demand video
Learn how to access & use the dark net and the clear net privately, anonymously and securely Welcome to the ultimate dark net, privacy, anonymity and security course. 85+ videos (10+ hours) to take you from to advanced in anonymity, privacy & security. Secure your computer and your data by dividing it into a number of isolated domains....
$26.99
Cybersecurity in Healthcare (Hospitals & Care Centres)
by Jason H. Pridmore , Tessa A. P. Oomen- 4.6
Approx. 15 hours to complete
It explains how the rise of technologies and proliferation of (medical) data has become an attractive target to cybercriminals, which is essential in understanding why adequate cybersecurity measures are critical within the healthcare environment. How to handle health data and personnel information Data breaches, hackers, and malware in healthcare THE AMCA case: Hacking and data breaches in healthcare...
Law in the Time of COVID-19: A Northwestern Teach-Out
by Daniel B. Rodriguez- 4.6
Approx. 11 hours to complete
For example, the necessity for testing and tracing infected individuals raises difficult issues of privacy as the government engages in surveillance and continues its strategies of control. Public Health, Mitigation, and Governmental Responses: Federal, State, and Local Public Health Emergencies and the Government's Police Power COVID-19 Regulation and Civil Liberties COVID-19 Regulation and Civil Liberties, Continued...
Becoming a Hyperledger Aries Developer
by Stephen Curran , Carol Howard- 0.0
7 Weeks
Data is driving our world today. However, we hear about Data breaches and Identity thefts all the time. As such, it is imperative that we adopt a new approach to identity management, and ensure data security and user privacy through tamper-proof transactions and infrastructures. Deploy instances of Aries agents and establish a connection between two or more Aries agents....
$199
ACCA F1 (AB) External Analysis Chapter 6 to 9
by CA Bhupesh Anand- 3.8
13.5 hours on-demand video
This course is designed to develop knowledge and understanding of the principles and concepts relating to External Analysis Of Business Organization. Data Protection & Security Health And Safety Measure In The Work Place Principal Of consumer Protection Sale of Goods And Simple Contract effects of social and demographic trends...
$9.99
Related searches
Cloud Computing Fundamentals on Alibaba Cloud
by Steve Xue- 4.7
Approx. 12 hours to complete
Looking to dive into the world of Alibaba Cloud with a comprehensive introduction to the range of products and solutions offered by Alibaba Cloud? Operate and Manage Object Storage on the Cloud: https://edu. Operate and Manage a Cloud Server Operate and Manage a Relational Database on the Cloud Manage a Relational Database that can analyze large sets of data...
New Technologies for Business Leaders
by Mark Mueller-Eberstein, Dipl. Kfm.- 4.4
Approx. 19 hours to complete
Unlocking The Value Of The Industrial Internet Of Things (IIoT) And Big Data In Manufacturing ARTIFICIAL INTELLIGENCE AND BIG DATA What are we going to learn about Big Data and Artificial Intelligence? The key terms about big data and artificial intelligence The Who is Who of Big Data and AI What did we learn about Big Data and AI?...
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. LAB SETUP START HERE: Connecting to the NDG platform and performing labs. Essentials I: Module 4 - Cryptography, PKI, and Certificate Protection...