Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
Transacting on the Blockchain
by Don Tapscott , Alex Tapscott- 4.8
Approx. 16 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. In this course, we’ll address the many challenges of the status quo and discuss how cryptoassets, smart contracts, new identity systems, and new financial business models can help overcome them. Crypto-fiat Currencies and Stablecoins...
TERADATA: Data Warehousing technology
by Jigar Vora- 0.0
6 hours on-demand video
2) Space management and data protection 3) Data Distribution 4) Indexing and Explain Plan development 6) Performance turning and query optimization 7) Teradata utilities and best practices. The Final Goal of this course is to get the student acquainted to best practices in Teradata and get them capable enough to get a certification as follows:...
$12.99
Basic Recommender Systems
by Paolo Cremonesi- 3.9
Approx. 12 hours to complete
The techniques described touch both collaborative and content-based approaches and include the most important algorithms used to provide recommendations. You'll learn how they work, how to use and how to evaluate them, pointing out benefits and limits of different recommender system alternatives. Course overview and welcome by the instructor...
Email Marketing: Send Unlimited Emails via Own Mail Server
by Dhiraj Rahul- 3.6
1 hour on-demand video
Learn to set up your own mail server like Gmail, Outlook and send emails/newsletters without any limit. You server will be automatically configured to follow modern mail protocols (DMARC, DKIM, and SPF) and the best security practices which includes HSTS, strong ciphers, opportunistic TLS, DNSSEC (with DANE TLSA). Do you accept that all your data (including business contract & confidential information) get collected, processed, and analyzed?...
$12.99
Write Your First Novel
by David Wheeler- 4.3
Approx. 127 hours to complete
If you have any concerns regarding the protection of your original work, Coursera's privacy policy protects the learner's IP and you are indeed the sole owners of your work. To view the trailer, please copy and paste the link into your browser. Thank You and Congratulations You will learn how to write and complete a full-length novel of 50,000 words....
VMware ESXi and vSphere Admin Tutorial
by Infinite Skills- 4
6.5 hours on-demand video
The course shows you how to work with a Distributed Resource Scheduler (DRS), configuring for High Availability (HA) and vSphere Data Protection (VDP). Once you have completed this VMware ESXi and vSphere Administration video tutorial, you will be familiar and comfortable with the process of installing and configuring ESXi and vSphere for a development and testing lab....
$17.99
Learning Microsoft Excel 2016 for Mac
by Infinite Skills- 0.0
5.5 hours on-demand video
Learn to Manage Your Data Using Spreadsheet Functionality From there, Guy will teach you how to enter and edit data in cells. This video tutorial also covers how to use basic mathematical operators, format worksheets, and use mathematical formulas. Finally, you will cover advanced formatting and security, including activating worksheet and workbook protection and password protecting the workbook file....
$12.99
Related searches
Create contact forms with PHP, JavaScript and CSS
by Nevyan Neykov- 4.4
1.5 hours on-demand video
Learn how to build multiple fully functional contact forms and start getting users feedback. In the course you will find practical lecture on adding additional protection against Spam bot submission attacks. Next we add our PHP code to process the information received from the contact form and validate the submitted data with the help of both PHP and JavaScript....
$12.99
Ethics of Computing : Introduction to IT and Computer Ethics
by Ifactner Learning- 0.0
1.5 hours on-demand video
Ethics for computing, social media, information systems, data sciences, cyber, information and communication technology In this course, when we talk about Computer Ethics then we also talk about Computing Ethics, Social Media Ethics, Information Systems Ethics, Data Sciences Ethics, Cyber Ethics, Information Technology Ethics (IT Ethics) and Information and Communication Technology Ethics (ICT ethics)....
$12.99
Securing Windows Server 2016
by Kevin Brown- 4.6
5.5 hours on-demand video
Learn to harden and secure Windows Server 2016 for a more secure server and a more secure enterprise Types of attacks and how they can be mitigated Understand and configure privileged access management Protect data by using EFS and BitLocker encryption Deploy Dynamic Access Control to provide extra data protection And more....
$17.99