Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments. Secure Big Data Systems & Operate and Secure Virtual Environments...
Microsoft 365 Fundamentals: MS-900 +Practice Questions
by Kevin Brown- 4.5
6.5 hours on-demand video
Understand cloud concepts ,core Microsoft 365 services and concepts and understand security and compliance You will understand the considerations and benefits of Microsoft 365 cloud service offerings. Hands-on demonstrations include a walk-through of Exchange online, SharePoint online, Teams, OneDrive, Data Loss Prevention, Azure Information Protection, Intune, and many other technologies....
$15.99
Australian privacy law – awareness
by David Chapman, PhD- 5
2 hours on-demand video
Australian privacy rights and key compliance obligations In Australia, like the rest of the world, privacy matters. Identifies Australian federal and state privacy legislation Your personal privacy is important. It helps you attain autonomy and maintain individuality. Federal & state legislation – outlines federal and state privacy laws Explore compliance obligations, health privacy and employee privacy...
$11.99
Data Ethics, AI and Responsible Innovation
by Ewa Luger , Michael Rovatsos , Burkhard Schafer , Morgan Currie- 0.0
7 Weeks
Our future is here and it relies on data. We will drill down into case studies, structured around core concerns being raised by society, governments and industry, such as bias, fairness, rights, data re-use, data protection and data privacy, discrimination, transparency and accountability. Understand and articulate the critical, social, legal, political and ethical issues arising throughout the data lifecycle....
$49
Digital Footprint
by Louise Connelly , Nicola Osborne- 4.6
Approx. 9 hours to complete
As we move around the online world we leave tracks and traces of our activity all the time: social media accounts, tagged images, professional presences, scraps of text, but also many artefacts we don't always realise we are leaving behind, or that others leave about us. Death and Privacy (Interview with Prof....
Cybersecurity Compliance and System Administration
by Coreen Ryskamp- 0.0
4 Weeks
Global considerations will be addressed around the General Data Protection Regulation (GDPR). Data protection regulations concerning personal data including phone number, credit card information and other sensitive data for healthcare and credit cards are reviewed. Describe the key privacy and data protection requirements for GDPR. Describe the basics of endpoint protection and response....
$149
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
We will also go through security and privacy issues and challenges in cyber physical systems (CPS). You will also be able to define security requirements for your system and choose and implement a proper security and privacy technique to protect it. CPS Security and Privacy Introduction to CPS Security and Privacy...
Related searches
AI-100 & DP 100 practice Test: Real Exam Questions
by EXAM SUCCESS- 0.0
May include but is not limited to: Design authentication architecture, design a content moderation strategy, ensure appropriate governance for data, design strategies to ensure the solution meets data privacy and industry standard regulations Validate solutions to ensure compliance with data privacy and security requirements DP-100: Designing and Implementing a Data Science Solution on Azure...
$12.99
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Infrastructure, Data Protection, Logging and Compliance Partners Content-Related Vulnerabilities: Techniques and Best Practices Misuse of Data and Content Lab Intro: Redacting Sensitive Data with Data Loss Prevention API...
International Labour Law
by Сыченко Елена Вячеславовна , Jean-Michel Servais , Bas Rombouts- 4.7
Approx. 15 hours to complete
In an interconnected world, international labour law is vital for securing workers’ rights and dealing with the negative effects of globalization. In this course, we will tell you the story of international labour law and human rights at work in an accessible, clear and comprehensive way. The Contributions of the ECtHR to Protection of Employee’s Privacy...