Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Computer Networks Security from Scratch to Advanced
by Mohammad Adly- 3.9
8 hours on-demand video
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers You will also reach the professional level in networks security in terms of concepts, technologies, and tools. Lecture 1: Wired Equivalent Privacy WEP AttackingLecture 2: WPA and AES ProtocolsLecture 3: Wireless Security MisconceptionsLecture 4: Wireless Attacks and MitigationLecture 5: Secure Network Design with Wireless...
$17.99
Interprofessional Healthcare Informatics
by Karen Monsen, Ph.D., RN, FAAN- 4.4
Approx. 11 hours to complete
Interprofessional Healthcare Informatics is a graduate-level, hands-on interactive exploration of real informatics tools and techniques offered by the University of Minnesota and the University of Minnesota's National Center for Interprofessional Practice and Education. Data, Information, and Knowledge Data, Information, and Knowledge Data, Information, Knowledge, and the Omaha System Data Exchange and Interoperability Data Exchange and Interoperability...
Computer Basics 2021: Basic Computer Skills And Fundamentals
by Samir Imtiaz- 4.2
1.5 hours on-demand video
Basic Hardware,Software,Privacy, Security, Backup Guide And Troubleshooting Tips To Use A Computer Running On Windows 10 I have talked less and used simple short terms so that you can learn more and digest it easily. Lets keep it simple and meaningful. You'll learn Basic Hardware,Software,Privacy, Security, Backup Guide And Troubleshooting Tips To Use A Computer Running On Windows 10....
$14.99
Introduction to Applied Machine Learning
by Anna Koop- 4.7
Approx. 7 hours to complete
This course is for professionals who have heard the buzz around machine learning and want to apply machine learning to data analysis and automation. Whether finance, medicine, engineering, business or other domains, this course will introduce you to problem definition and data preparation in a machine learning project. Features and transformations of raw data...
Email Marketing: Send Unlimited Emails via Own Mail Server
by Dhiraj Rahul- 3.6
1 hour on-demand video
Learn to set up your own mail server like Gmail, Outlook and send emails/newsletters without any limit. You server will be automatically configured to follow modern mail protocols (DMARC, DKIM, and SPF) and the best security practices which includes HSTS, strong ciphers, opportunistic TLS, DNSSEC (with DANE TLSA). Do you accept that all your data (including business contract & confidential information) get collected, processed, and analyzed?...
$12.99
Quantum Cryptography
by Stephanie Wehner , Thomas Vidick , Guest Lecturers- 0.0
10 Weeks
In this course, you will learn how to use quantum effects, such as quantum entanglement and uncertainty, to implement cryptographic tasks with levels of security that are impossible to achieve classically. Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification Protocols and proofs of security for quantum key distribution Modern quantum cryptographic tasks and protocols...
$50
Understanding HIPAA for the Medical Office
by Carol Pigott, MAed, CMA, CBCS- 4.6
1.5 hours on-demand video
HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It was revised 2009 with the ARRA/HITECH Act and again in 2013 with the Omnibus Rule. This online training courses meet and exceed the requirements for HIPAA training established by the federal HIPAA Privacy and HIPAA Security regulations....
$10.99
Related searches
Information Security - Introduction to Information Security
by Aspen Olmsted , Justin Cappos- 0.0
5 Weeks
Learn the fundamentals of information security, including Security Design Principles, Threat Modeling and Security Policy. This is a self-paced course that provides an introduction to information security and cybersecurity. Among the topics covered are Security Design Principles, Threat Modeling, and Security Policy. Students gain a broad overview of Information Security and Privacy (ISP) through high-level ISP concepts....
$166
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Cryptography is the practice and study of techniques for securing communications in the presence of third parties. Operate and Implement Cryptographic System: PKI Activity Operate and Implement Cryptographic System: Standards Operate and Implement Cryptographic System: Truly Random Operate and Implement Cryptographic System: Key Storage and Destruction Operate and Implement Cryptographic System: Factors Affecting Risk...
Salesforce Basics
by Stephane Muller- 4.4
Approx. 16 hours to complete
You will learn about the basics in Lightning for Sales, Community Cloud and Marketing, and understanding how to secure your Salesforce Organization and Manage Permissions. Lightning Experience for Sales, and Accounts & Contacts Data Security Access, navigate around, and transition between Lightning and Classic Salesforce interfaces. Create customer, partner, and employee communities....