Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
Fundamentals of Network Security
by Harish Kumar Maheshwari- 3.8
31 mins on-demand video
Here we will discuss on Network Security, OSI model, Network Attack and Protection Network security is the practices and technology a business puts in place to protect its IT infrastructure. A solid network security system helps reduce the risk of data loss and theft. Sign up now and take this Course....
$14.99
Violence Against Healthcare
by Beat Stoll , Esperanza Martinez , Alexander Breitegger , Frederik Siem , Luigi Fratini , Bruce Eshaya-Chauvin- 4.6
Approx. 15 hours to complete
Key terms - Glossary and Acronyms 1 Main concerns regarding the protection of healthcare personnel and facilities - Jamie Williamson, (Head of Unit, Relations with Arms Carriers, ICRC) 2 Encouraging Community to advocate on the respect and the protection of health care - Marta Pawlak, (Advisor on Community Based Protection & Sexual Violence, ICRC)...
Clear and Simple VMware vSphere 6.5 VCP-DCV (VCP 2019)
by Rick Crisci- 0.0
10.5 hours on-demand video
Learn all about how to administer and design vSphere 6. Non-virtualized datacenters are a thing of the past, and in order to stay relevant you must understand vSphere. This course builds off my "Clear and Simple vSphere 6. 5 Foundations" videos, and gives you a deeper understanding of vSphere. vSphere Data Protection...
$12.99
Hacking in Practice: Intensive Ethical Hacking MEGA Course
by IT Security Academy- 4.2
21 hours on-demand video
It's one of the most comprehensive ITsec and ethical hacking courses on Udemy. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. You’re welcome to join us and start your training now. Network and IT security is no joke....
$23.99
Bitcoin and Cryptocurrency Technologies
by Arvind Narayanan- 4.7
Approx. 23 hours to complete
And you’ll be able to integrate ideas from Bitcoin in your own projects. Introduction to Crypto and Cryptocurrencies Hash Pointers and Data Structures Incentives and Proof of Work How to Store and Use Bitcoins How to Store and Use Bitcoins Hot and Cold Storage Splitting and Sharing Keys Online Wallets and Exchanges...
Blockchain, Cryptoassets, and Decentralized Finance
by Don Tapscott , Alex Tapscott- 4.6
Approx. 19 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. Describe seven types of cryptoassets, and explain what it means to “tokenize” an asset Describe eight core functions of the financial services industry and explain how blockchain will disrupt each of these functions...
Microsoft SCCM Training
by Kashif Akhter- 4.6
10.5 hours on-demand video
How Data Flows and Replicates in a SCCM Site Hierarchy Configure and manage hardware and software inventory, monitor inventory data flow Overview to SQL Management Studio tables and view data Viewing Log files, Monitoring and Troubleshooting Software Updates Overview And Configuring System Center Endpoint Protection using Configuration Manager (SCCM) Overview And Configuring System Center Endpoint Protection using Configuration Manager (SCCM)...
$18.99
Related searches
AI in Practice: Preparing for AI
by Marcel Worring , Frank van Harmelen , Arie van Deursen , Maarten de Rijke- 0.0
5 Weeks
Learn to recognize and understand the implications of Artificial Intelligence for organizations, and the importance of compliance and ethics when AI is applied in practice. AI helps in handling and processing large amounts of data, improves intake processes and investigation workflows and eases communication within the police and also deals with wider potential transparency and privacy issues....
$249
AI in Practice: Preparing for AI
by Marcel Worring , Frank van Harmelen , Arie van Deursen , Maarten de Rijke- 0.0
5 Weeks
Learn to recognize and understand the implications of Artificial Intelligence for organizations, and the importance of compliance and ethics when AI is applied in practice. AI helps in handling and processing large amounts of data, improves intake processes and investigation workflows and eases communication within the police and also deals with wider potential transparency and privacy issues....
$249
Cyber Security - Python and Web Applications
by Mashrur Hossain- 0.0
10.5 hours on-demand video
Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more! Building and Publishing Security Tools - Dynamic web app security scanner, Password hashing and encrypt tool among many others! Phishing Protection Wireless Access Point Protection Sensitive Data Exposure and many more!...
$16.99