Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Financial Engineering and Risk Management Part II
by Martin Haugh , Garud Iyengar- 4.7
Approx. 17 hours to complete
Financial Engineering is a multidisciplinary field involving finance and economics, mathematics, statistics, engineering and computational methods. Mean-Variance Analysis and CAPM Problem Set Negative Exposures and Leveraged ETFs Survivorship Bias and Data Snooping The Greeks: Delta and Gamma The Greeks: Vega and Theta Beyond the Volatility Surface and Black-Scholes Credit Derivatives and Structured Products...
Creating Reports with SQL Server 2012 Reporting Services
by Packt Publishing- 4.2
1.5 hours on-demand video
in Integrated Computing and M. Before joining UWF, he worked as a Data Warehouse Developer for Northrop Grumman Information Systems, and prior to that as a Database Application Developer for Acxiom and Euronet. Snider's research and teaching interests include data mining, data warehousing, software development, and security....
$12.99
Encryption in SQL Server 2019
by Mike West- 4.4
1 hour on-demand video
Encryption is the process of obfuscating data by the use of a key or password. However, it enhances security by limiting data loss even if access controls are bypassed. Data protection is critical for ensuring that your organization is compliant with regulatory compliance standards like the GDPR and for meeting the expectations of your clients and business partners....
$9.99
Administering Tableau Server 10 with Real Time Scenarios
by Snehasis Pradhan- 4.2
3 hours on-demand video
Learn and Understand the concepts on how Tableau Server works with Real practical demo In this data Visualization world, its equally important to have better knowledge of platforms which supports the visualization workbooks and populate the data faster for users worldwide. - Understanding Permission for better data security...
$12.99
Training Exam AZ-303 Microsoft Azure Architect Technologies
by Pavan Kumar- 0.0
36 hours on-demand video
Implement and Manage Data Platforms (10-15%) Monitor security and Monitor performance Implement Network Security Groups and Application Security Groups Implement and Manage Data Platforms Implement Workloads and Security Implement Authentication and Secure Data Implement management and security solutions (25-30%) Implement and manage data platforms (10-15%) Monitor security and Monitor performance Implement and manage hybrid identities Implement Management and Security Solutions...
$12.99
Data Center Essentials: General Introduction
by John Peterson- 4.6
2.5 hours on-demand video
Learn the basics to enter into the world of data centers, the fastest growing sector in the design and construction industry. By the end you will know the lingo and more about data centers than 90% of those in the industry. History, types, and sizes - what are the data centers you may see & walk into...
$16.99
AWS Fundamentals: Migrating to the Cloud
by Seph Robinson , Sean Rinn- 4.6
Approx. 9 hours to complete
Migration Preparation and Business Planning (Phase 1) Portfolio Discovery and Planning (Phase 2) Design, Migration and Application Validation (Phase 3 & 4) Lab (not a lab) Intro and Rehost VM Import and VM on AWS (Server Migration Service) Multi-environment Security and Communications Data Considerations When Migrating AWS Storage Gateway and AWS DataSync...
Related searches
Data Programming with F#
by Packt Publishing- 4.5
2.5 hours on-demand video
Explore practical techniques to handle real-world data programming challenges This video course presents practical techniques for handling real-world data programming challenges. We'll first see how to build efficient, extensible engines to parse and process documents and data streams. Then we'll study how to process large sets of data with maximal performance and efficiency using asynchronous workflows, agents, and ....
$12.99
International Cyber Conflicts
by Sanjay Goel , Kevin Williams- 4.5
Approx. 9 hours to complete
• Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies....
Understanding HIPAA Compliance
by Learnsector LLP- 4.3
1 hour on-demand video
This course helps you understand the various rules under HIPAA and how to be compliant with that. The training provides a broader view of the legal and governing background of HIPAA along with the various rules and standards associated with it. While cyberattacks and ransomware attacks add to the agonies of health insurers and providers, HIPAA assures security and protection....
$9.99