Search result for Data security Online Courses & Certifications
Get Course Alerts by Email
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
This course sensitizes regarding security in Big Data environments. By the end of the course, you will be ready to plan your next Big Data project successfully, ensuring that all security related issues are under control. Implementing security for Big Data Recognize all security related issues in big data systems and projects....
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
The Security Exam Preparation Course is a series of online courses covering topics including Linux and Windows OS basics and operations, network fundamentals, host security, application security, network security, and data security. Cloud Platform Security Overview: https://edu. Secure Your Data on Alibaba Cloud: https://edu. Data Security Data Security Overview Data Security Best Practice Data Security Recap...
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. • Discuss data loss prevention and endpoint protection concepts and tools. What is Data Security and Protection Data Security Top Challenges Data Security Common Pitfalls Industry Specific Data Security Challenges Data Security and Protection Knowledge Check...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Secure Big Data Systems & Operate and Secure Virtual Environments Secure Big data Systems: Big Data Secure Big Data Systems: Interpreting Big Data...
Security Awareness Training
by (ISC)² Education & Training- 4.6
Approx. 2 hours to complete
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. • Data and Account Security • Networking and Mobile Security Importance of Security Importance of Security Data and Account Security Data and Account Security Networking and Mobile Security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Security Concepts: Risk Assessment Data Security Concepts: Risk Assessment Data Participate in Physical Security Operations & Security Awareness Training Physical Security Operations: Physical Security...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. Introduction to Digital Manufacturing Security Digital Manufacturing Security Part 1 Digital Manufacturing Security - Part 2 Cyber Security in Manufacturing- Week 4 Quiz...
Related searches
Security and Privacy for Big Data - Part 2
by Enrique Barra , Fabian Garcia Pastor- 4.7
Approx. 1 hour to complete
This course sensitizes regarding privacy and data protection in Big Data environments. You will discover privacy preserving methodologies, as well as data protection regulations and concepts in your Big Data system. SECURITY AND PRIVACY FOR BIG DATA - PART 2 Anonymizing and pseudonymizing data Data Protection Law for Big Data General Data Protection Regulation (GDPR)...
IBM Data Privacy for Information Architecture
by Christopher Giardina , Aaron Ritchie- 4.7
Approx. 10 hours to complete
Data privacy controls how information is collected, used, shared, and disposed of, in accordance with policies or external laws and regulations. IBM DataFirst Data Privacy introduction Data governance and organizational structures Data privacy vs security Data privacy vs security introduction The difference between data privacy and security Data privacy vs security...
Cloud Data Security
by Rick Smith- 0.0
Approx. 11 hours to complete
This course gives learners an opportunity to explore data security in the cloud. * Dive into the data services offered by cloud providers and compare their security features. Introduction to Cloud Data Security Protecting Company Data Data Cycle How data security and privacy requirements arise from legal obligations and industry standards....