Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
The Business of Product Management II
by Nancy Wang- 4.7
Approx. 14 hours to complete
Featuring NANCY WANG, Head of Data Protection Services, Amazon Web Services; Founder and CEO, Advancing Women in Product; VERONICA PINCHIN, Director of Product Management, Sidewalk Labs; KATE ZHANG, Product Manager, Instagram; and BARKHA SAXENA, Chief Data Officer, Poshmark. Invent and Simplify Learn and Be Curious KPIs in Theory and Practice CSAT and CES...
U.S Startup & Small Business Registration And Business Law
by Alex Genadinik- 4.3
2 hours on-demand video
Startup law course: LLC, C-Corp, S-Corp registration, incorporation, intellectual property protection, and what is legal Learn why you need to register your business with the state, how to decide on what business entity to choose (LLC, S corp, C corp or something else), how to protect your intellectual property, basic employment laws, online privacy issues and much more....
$9.99
MS-500 Microsoft 365 Security Administration Lectures & Sims
by John Christopher- 4.6
10 hours on-demand video
Get prepared for the MS-500 exam with instructor led labs and hands on tutorials available 24/7 Password expiration and management in Microsoft 365 Role Based Access Control (RBAC) and Privileged Identity Management (PIM) Azure AD Identity Protection Policies in Microsoft 365 Data Governance and Data Loss Prevention (DLP) in Microsoft 365...
$19.99
Azure Storage Security Guide
by CloudTAC -Information Systems Governance and Security- 0.0
3 hours on-demand video
Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud and hybrid environments as part of end-to-end infrastructure. Configure encryption for data at rest Configure and manage Azure Key Vault Configure and manage management and data plane security for your storage account....
$12.99
The Business of Product Management I
by Nancy Wang- 4.6
Approx. 15 hours to complete
Featuring NANCY WANG, Head of Data Protection Services, Amazon Web Services; Founder and CEO, Advancing Women in Product; WAYNE DUSO, Vice President for Edge Computing, File Services, and Data Services, Amazon Web Services; ARUM KANG, Co-Founder & CEO, Coffee Meets Bagel; and AMIR MOVAFAGHI, CEO, Mixpanel; former Global Head of Business of Operations, Twitter....
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. ● how to evaluate potential risks and recommend ways to reduce risk. Supplementary reading on HAProxy, nginx and Apache HTTP server Mobile Security and Privacy Supplemental Readings for Mobile Security and Privacy...
Advanced Deployment Scenarios with TensorFlow
by Laurence Moroney- 4.7
Approx. 13 hours to complete
This Specialization will teach you how to navigate various deployment scenarios and use data more effectively to train your model. Finally, you’ll explore federated learning and how you can retrain deployed models with user data while maintaining data privacy. Explore federated learning and how to retrain deployed models while maintaining data privacy...
Related searches
Business Considerations for Edge Computing
by Jennifer Cloer , Gary Schillinger- 0.0
7 Weeks
We’ll review the data privacy and security considerations and share examples of where we see business innovation with Edge. What Edge Computing is and what is driving its adoption What are the data and privacy considerations for deploying Edge Computing networks Know the influencers and open source projects that are defining the future of Edge and the distributed computing world...
$149
Microsoft Intune Training (Includes Self Practice LABs)
by Pavan Kumar- 4.3
12 hours on-demand video
On personal devices, Intune helps make sure your organization data stays protected and can isolate organization data from personal data. It also integrates with Azure Information Protection for data protection. Set rules and configure settings on personal and organization-owned devices to access data and networks. Create and assign an app protection policy App protection policies and work profiles...
$15.99
Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection
by Stephen B. Wicker- 0.0
6 Weeks
Explore the privacy issues of an interconnected world. The implications of different forms of surveillance and their impact on an individual's privacy in society. How to apply ethical thinking and judgment to a wide range of privacy and surveillance situations. The impact of using complex and powerful technologies to collect personal data on individuals, corporations, markets, and societies....
$49