Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
ISO/IEC 27701. Privacy Information Management System
by Cristian Vlad Lupa- 0.0
4 hours on-demand video
The following sets of controls are included: Information security and privacy policies, Organization of information security and privacy, Human resources security, Asset management, Access control, Cryptography, Physical and environmental security, Operations security, Communications security, Systems acquisition, development and maintenance, Supplier relationships, Incident management, Information security and privacy aspects of business continuity and Compliance;...
$14.99
Security Awareness Training
by (ISC)² Education & Training- 4.6
Approx. 2 hours to complete
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. • Data and Account Security • Networking and Mobile Security Data and Account Security Data and Account Security Networking and Mobile Security Network and Security...
Privacy & Standardisation Capstone
by Jan Smits- 0.0
Approx. 24 hours to complete
This capstone will build on the knowledge you obtained in the courses: Standardisation & Technology, Privacy in the Western World, Privacy in the USA and Privacy in Europe. Paper: Dissolving privacy, One Merger at a Time: Competition, Data and Third Party Tracking Relate privacy and data protection to human rights and freedoms...
How to succeed in a Data Protection Officer Role (GDPR DPO)
by Roland Costea- 4.5
5 hours on-demand video
I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH. Privacy or Data Protection is the hottest topic today, so why not make a significant change in your career and EARN MORE MONEY?...
$17.99
Privacy in Europe
by Jan Smits- 4.5
Approx. 18 hours to complete
And privacy protection and regulation has become an increasingly important subject that has attracted a lot of global attention. Article: The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR Paper: The economics of personal data and the economics of privacy Create awareness for the role of privacy protection and the rule of law...
Prepare Data for Exploration
by Google Career CertificatesTop Instructor- 4.8
Approx. 22 hours to complete
- Explore how analysts use spreadsheets and SQL with databases and data sets. - Examine open data and the relationship between and importance of data ethics and data privacy. Data types and structures Test your knowledge on data ethics and privacy Balancing security and analytics Discuss the difference between biased and unbiased data...
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies. Welcome to Mitigating Security Vulnerabilities on Google Cloud Security Partner Products Infrastructure, Data Protection, Logging and Compliance Partners Content-Related Vulnerabilities: Techniques and Best Practices Misuse of Data and Content...
Related searches
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. Acquire knowledge about security needs and the application of information security systems. Software Security Flaws and Threats Network Security and Authentication - Part 1...
Privacy in the Western World
by Jan Smits- 4.5
Approx. 7 hours to complete
We hope this course will enthuse you to look further into privacy and personal data regulation. After showing you a number of interesting examples of privacy in recent events, this course continues to provide you with an historic introduction, and varying cases and court decisions. Along the banks of the Yangtze - China's privacy trade-off...