Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Palo Alto Networks Cybersecurity Gateway II
by James Dalton- 4.7
Approx. 16 hours to complete
Gateway II Course Information - Textbook and Work Roles IMPORTANT: NDG LAB SETUP AND ENROLLMENT Gateway II: Module 2 - Cybersecurity Landscape and Threats Reading: Cybersecurity Landscape and Threats Gateway II: Module 3 - Cloud, Virtualization and Storage Security Video: IaaS and SaaS Reading: Cloud, Virtualization and Storage Security Data and Network Appliance Backups...
Surveillance Systems: Analysis, Dissemination, and Special Systems
by Stefan Baral, MD, MPH, MBA, FRCPC- 4.7
Approx. 6 hours to complete
We'll learn how to get the most out of surveillance data analysis, focusing specifically on interpreting time trend data to detect temporal aberrations as well as person, place, and time in the context of surveillance data. Assessing Trends with Temporal and Geographic Data Summary of Analysis and Interpretation of Surveillance Data Flow of Surveillance Data and Privacy Issues...
Google Cloud Big Data and Machine Learning Fundamentals
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Through a combination of presentations, demos, and hands-on labs, participants get an overview of Google Cloud and a detailed view of the data processing and machine learning capabilities. This course showcases the ease, flexibility, and power of big data solutions on Google Cloud. Introduction to the Data and Machine Learning on Google Cloud Course...
Microsoft Azure Management Tools and Security Solutions
by Microsoft- 4.7
Approx. 9 hours to complete
Security needs to happen at the application level, at the data level, and the network level. When you have completed this course, you will be able to identify security threats in Microsoft Azure, make security recommendations, and detect and respond to events using security and event management. Detect and respond to security threats by using Azure Sentinel...
Design and Implementation of Digital Health Interventions
by Lisa Danquah , Céire Costelloe- 0.0
Approx. 31 hours to complete
These session cover areas to include data regulations, examples of data breaches in digital health, the challenges and opportunities of technology adoption and implementation with a focus on the non-adoption, abandonment, scale-up, spread and sustainability framework (NASSS Framework). Design and Implementation of Digital Health Interventions Human Centered Design and evaluating complex health needs Regulations and data in DH...
The Beginners 2021 Cyber Security Awareness Training Course
by Reza Zaheri- 4.6
3 hours on-demand video
You will receive really engaging, memorable and effective security awareness training! You will feel confident, and empowered to protect your personal, family and company data from the bad guys It’s me in front of the camera, speaking passionately from the heart, and talking directly to you about the biggest cyber security threats facing you today....
$16.99
Introduction to Hyperledger Blockchain Technologies
by Flavia Cioanca , Alexandra Groetsema , Arianna Groetsema , Navroop Sahdev- 0.0
10 Weeks
A primer to blockchain, distributed ledgers and Hyperledger technologies. Discover the power of business blockchains and distributed ledger technologies with an overview of Hyperledger andits key frameworks. Industries today are using blockchain technologies to increase efficiency and solve business problems associated with data privacy, security, information sharing, and inclusion. Describe Business Blockchain and Distributed Ledger Technologies...
$199
Related searches
Dark Web Security Guide- Become an Online Ghost
by Dark Web Academy- 0.0
2.5 hours on-demand video
Silk Road, Alpha Bay and Hansa have all been taken down by law enforcement. This course will guide you through the complex systems of security and explain, hands on, everything you need to know to protect yourself. Tor BrowserVPNsBridgesPGPHTTPsNetwork Security Talk about the long reaching arm of government and how to avoid interrogation or scare tactics....
$13.99
Architecting Smart IoT Devices
by Martin Timmerman , Maarten Weyn- 4.3
Approx. 34 hours to complete
In order to reduce the time to market, many pre-made hardware and software components are available today. What's a web tour and what does it have to do with quizzes? IoT and big data (in the cloud) White- and black-box testing Security requirements Security coding techniques Security models How vendors deal with security issues Development Tools and Environments...
Check Point Jump Start: SMB Network Security
by Check Point Software Technologies- 0.0
Approx. 2 hours to complete
This course introduces you to Check Point's Small and Medium Business (SMB) network security appliances. You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform. Upon completion of this course, you will be prepared to deploy, configure, and administrate a Check Point Small/Medium Business Network Security appliance....