Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Tech for Good: The Role of ICT in Achieving the SDGs
by Tech for Good Faculty , Dorothy Gordon , Guilherme Canela Godoi , José Clastornik- 0.0
10 Weeks
What opportunities and challenges do digital technologies present for the development of our society? It also addresses the new challenges that technology can introduce , such as privacy, data management, risks to cybersecurity, e-waste, and the widening of social divides. Responsible collection and use of data requires governance, security, and trust...
$49
Bats, Ducks, and Pandemics: An Introduction to One Health Policy
by Laura Kahn- 4.7
Approx. 11 hours to complete
Welcome to "Bats, Ducks, and Pandemics: An Introduction to One Health Policy". One Health is the concept that human, animal, and environmental/ecosystem health are linked. Disease outbreaks including Influenza, Q fever, and Ebola will be discussed. While the course was developed and recorded before the COVID-19 pandemic, the concepts learned very much apply to it....
Building An E-Commerce Store Using Java Spring Framework
by Le Deng- 3.9
14 hours on-demand video
We will use Spring Data to integrate with Hibernate and JPA to persist model data into database. We will see how to use Spring Security to intercept sensitive url request and how to validate its credentials from database information. We'll also add more domain models into system and use in-memory data to prototype shopping cart functionality....
$11.99
(New) Cyber Security: CISSP Certification All in One
by Thinkforty Inc.- 0.0
6 hours on-demand video
The cyber security field is still relatively new and has been evolving as technology advances. The Certified Information Systems Security Professional accreditation is one of the best quality levels in the field of data security. Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification....
$18.99
Cryptography and Hashing Overview
by Stefano M. Stefan- 0.0
Approx. 10 hours to complete
Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy. Cryptography and Hashing Round Table Discussion - Cryptography and Hashing...
Law in the Time of COVID-19: A Northwestern Teach-Out
by Daniel B. Rodriguez- 4.6
Approx. 11 hours to complete
For example, the necessity for testing and tracing infected individuals raises difficult issues of privacy as the government engages in surveillance and continues its strategies of control. Public Health, Mitigation, and Governmental Responses: Federal, State, and Local Public Health Emergencies and the Government's Police Power COVID-19 Regulation and Civil Liberties COVID-19 Regulation and Civil Liberties, Continued...
The Absolute Beginners Guide to Cyber Security and Hacking
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 0.0
17 hours on-demand video
You will understand that cyber security is about protecting systems, networks, programs, data and money. You will learn that Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information. Students who want to learn the basics of computer and cyber security...
$12.99
Related searches
CCSO - Certified Cloud Security Officer
by Mile2® Cyber Security Certifications- 4.4
24.5 hours on-demand video
Prepare for the Mile2® Certified Cloud Security Officer Exam (CCSO) with this course. We also provide practical skills regarding implementing cloud security, auditing and compliance. Upon completion, the Certified Cloud Security Officer candidate will not only be able to competently take the C)CSO exam but will also understand basic cloud security knowledge to keep companies’ IP and IT infrastructure safe....
$15.99
CISSP Certification: CISSP Domain 1 & 2 Boot Camp UPDATED 21
by Thor Pedersen | 240,000+ Enrollments Worldwide- 4.6
6 hours on-demand video
Information Security Governance: Values, vision, mission, and plans. Information Security Governance: Policies, procedures, guidelines, and frameworks. Data classification and clearance The 3 states of data (data at rest, data in motion, and data in use) Data handling, data storage, and data retention Mission, data, system owners, and data custodians Memory and data remanence...
$17.99
Data, Analytics and Learning
by George Siemens , Carolyn Rosé , Dragan Gašević , Ryan Baker- 0.0
4 Weeks
An introduction to the logic and methods of analysis of data to improve teaching and learning. Data drives increased organizational efficiency and a competitive advantage. The era of data and analytics in learning is just beginning. Additionally, we will discuss tools and methods, what skills data scientists need in education, and how to protect student privacy and other rights....