Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Cyber-Physical Systems Security
by Raheem Beyah , David Joyner- 0.0
Approx. 16 weeks
lesson 1 Foundations of Cyber-Physical System Security Computer Networking Information Security Industrial Networks lesson 2 Industrial Networks Industrial Cyber Security History Industrial Control Systems and Operations Industrial Network Design Architecture & Protocols lesson 3 Control System Security Hacking & Securing Industrial Control Systems Privacy in Cyber-Physical Systems Threats to Cyber-Physical Systems in Other Domains...
Free
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
• Discuss data loss prevention and endpoint protection concepts and tools. • Explore a data loss prevention tool and learn how to classify data in your database environment. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. What is Data Security and Protection Data Security and Protection Knowledge Check...
Health IT Security Proficiency
by Wendy Whitmore- 4.4
2.5 hours on-demand video
Detailed lessons describe every aspect of federal privacy compliance, including the HIPAA Privacy and Security rules, regulatory changes brought by the HITECH Act and Omnibus Final Rule of 2013, requirements for Business Associates, and more. Describe the requirements of the HIPAA Privacy Rule and Security Rule, the HITECH Act and the Omnibus Final Rule...
$44.99
Cybersecurity and the Internet of Things
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Andy Green, Ph.D. , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.6
Approx. 11 hours to complete
You will explore current security and privacy related concerns in each of these areas. Welcome to Cybersecurity and the Internet of Things! Internet of Things – New security and privacy challenges IoT and the Industrial Sector A Survey on Internet of Things: Security and Privacy Issues Internet of Things in healthcare: Interoperability and security issues...
GDPR Privacy Data Protection CASE STUDIES (CIPT,CIPM, CIPP)
by Roland Costea- 4.5
6 hours on-demand video
Examples of how a GDPR privacy professional should approach GDPR data protection compliance (CIPT, CIPM, CIPP/E) Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM) I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH....
$17.99
MasterClass: ISO 27701 vs. NIST Privacy Framework
by GetGlobal International - USA- 0.0
1 hour on-demand video
Learn about 2 of most known security and privacy standards - ISO 2770 and NIST Privacy Framework In this Master Class we compare the new ISO 27701 and NIST Privacy Framework. Learn from the best data protection professionals. Buy it now and boost your security information and privacy career....
$12.99
Related searches
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
The Security Exam Preparation Course is a series of online courses covering topics including Linux and Windows OS basics and operations, network fundamentals, host security, application security, network security, and data security. Cloud Platform Security Overview: https://edu. Data Security Data Security Overview Data Security Best Practice Data Security Recap Security ACA and ACP Introduction...
Understanding Google Cloud Security and Operations
by Google Cloud Training- 4.6
Approx. 2 hours to complete
This course examines cost management, security, and operations in the cloud. Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud. Module 2: Security in the Cloud Fundamental terms: Privacy, security, compliance and availability...
Promote the Ethical Use of Data-Driven Technologies
by Renée Cummings , Aaron Hui , Megan Smith Branch , Eleanor 'Nell' Watson , Tania De Gasperis- 4.7
Approx. 21 hours to complete
You will learn types of bias and common ethical theories and how they can be applied to emerging technology, and examine legal and ethical privacy concepts as they relate to technologies such as artificial intelligence, machine learning and data science fields. Distinguish between artificial intelligence and data science concepts. Protect data privacy with ethical and legal standards....