Search result for Privacy and data protection training Online Courses & Certifications
Get Course Alerts by Email
Managing social media in the workplace
by Skill Boosters- 4
39 mins on-demand video
While it’s true that there are huge benefits to our highly connected society, its darker sides are also starting to be felt in areas such as data protection, freedom of speech, online defamation, time theft, cyber-bullying and the invasion of privacy- all of which pose significant risks for businesses and organisations. data protection...
$9.99
Health IT Security Proficiency
by Wendy Whitmore- 4.4
2.5 hours on-demand video
This course provides comprehensive training in health IT security for IT Professionals, Security Officers, and Medical Staff Managers. Create a compliance program based on three fundamentals: the Security Risk Analysis, updated policies and procedures, and training Create a HIPAA awareness and training program Demonstrate knowledge of regulatory complexity, including other federal laws and state privacy laws...
$44.99
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments. Malicious Code and Activity: Security Awareness Training Malicious Code and Activity: Security Awareness Training Secure Big Data Systems & Operate and Secure Virtual Environments Secure Big data Systems: Big Data...
Copyright for Multimedia
by Kevin Smith, M.L.S., J.D. , Lisa A. Macklin, J.D.,M.L.S. , Anne Gilliland, JD, MLS- 4.6
Approx. 12 hours to complete
Copyright questions about different formats (data, images, music and video) can be especially difficult. Sometimes the law specifically distinguishes between these different formats, and in most cases there are media-specific considerations that impact a copyright analysis. Data Data and Copyright Data Examples Data Assessment Images in Social Media, Implied Licenses, and Privacy...
ISO 27001: Complete MasterCourse for EXIN ISF Certification
by GetGlobal International - USA- 4.5
6.5 hours on-demand video
This course prepares the student for the EXIN Information Security Foundation certification, one of the most important in the information security area, which is part of EXIN’s official career for DPO (Data Protection Officer) training, the data protection officers, required both by the LGPD (General Data Protection Law) and by the GDPR (General Data Protection Regulation) of the European Union....
$12.99
GDPR Awareness - European Accredited Level 2 Certificate
by Florin Nistor- 4.4
35 mins on-demand video
The EU General Data Protection Regulations (GDPR) added extra responsibilities to the Data Protection laws in Europe. This GDPR training course will outline your main responsibilities and help you to start making the necessary changes. The biggest changes under the GDPR are in relation to obtaining consent, the right to be forgotten and the appointment of a Data Protection Officer....
$11.99
Advanced Deployment Scenarios with TensorFlow
by Laurence Moroney- 4.7
Approx. 13 hours to complete
This Specialization will teach you how to navigate various deployment scenarios and use data more effectively to train your model. Finally, you’ll explore federated learning and how you can retrain deployed models with user data while maintaining data privacy. Explore federated learning and how to retrain deployed models while maintaining data privacy...
Related searches
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. Firewall Filters- IDS and IPS Systems The Difference between IDS and IPS Systems Ethernet and LAN - Ethernet Operations Ethernet and LAN - Network Devices Structured Data and Relational Databases A Data Protection Solution Example, IBM Security Guardium Use Cases...
Microsoft Azure Services and Lifecycles
by Microsoft- 4.8
Approx. 8 hours to complete
Understanding who is using your systems and what they have permission to do is critical to keeping your data safe from attackers. Compare authentication and authorization What are single sign-on, multifactor authentication, and conditional access? Privacy, Compliance & Data Protection Standards on Microsoft Azure Access the Microsoft Privacy Statement, the Online Services Terms, and the Data Protection Addendum...