Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Security and Privacy for Big Data - Part 2
by Enrique Barra , Fabian Garcia Pastor- 4.7
Approx. 1 hour to complete
This course sensitizes regarding privacy and data protection in Big Data environments. You will discover privacy preserving methodologies, as well as data protection regulations and concepts in your Big Data system. SECURITY AND PRIVACY FOR BIG DATA - PART 2 Know privacy risks arising from Big Data applications and methods which reduce or prevent privacy risks of data processing activities....
IBM Data Privacy for Information Architecture
by Christopher Giardina , Aaron Ritchie- 4.7
Approx. 10 hours to complete
Data privacy controls how information is collected, used, shared, and disposed of, in accordance with policies or external laws and regulations. The student will gain a background in multiple data privacy mechanisms and practices, and learn how to grow their data protection toolkit. Data protection, privacy and regulations overview The difference between data privacy and security...
Privacy Law and HIPAA
by Lauren SteinfeldTop Instructor- 4.4
Approx. 12 hours to complete
Better understanding privacy laws and data protection will enable you to protect your organization and the constituents that depend on your organization to safeguard their personal information. We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. The Right to Privacy in Europe and the United States...
Cloud Data Security
by Rick Smith- 0.0
Approx. 11 hours to complete
* Dive into the data services offered by cloud providers and compare their security features. * Follow the life cycle of a data item and its relationship to privacy and integrity. SQL and Data Breaches Data Privacy and the Cloud How data security and privacy requirements arise from legal obligations and industry standards....
Privacy Law and Data Protection
by Lauren SteinfeldTop Instructor- 4.8
Approx. 12 hours to complete
Better understanding privacy laws and data protection will enable you to protect your organization and the constituents that depend on your organization to safeguard their personal information. We’ll explore the notion that one cannot have privacy without strong security and examine various models that promote the security of personal information. The Right to Privacy in Europe and the United States...
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
This course sensitizes regarding security in Big Data environments. SECURITY AND PRIVACY FOR BIG DATA - PART 1 Implementing security for Big Data Recognize all security related issues in big data systems and projects. Define cryptographic principles and mechanisms to manage access controls in your Big Data system. Explain security risks and challenges for Big Data system....
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system. Grading and Logistics Intro to Usable Security Guidelines Privacy Policies and User Understanding Inferring Personal Data and Policy...
Related searches
Artificial Intelligence Privacy and Convenience
by Brent Summers- 4.6
Approx. 6 hours to complete
In this course, we will explore fundamental concepts involved in security and privacy of machine learning projects. We will also ask big questions about how businesses implement algorithms and how that affects user privacy and transparency now and in the future. Privacy and convenience vs big data Protecting Privacy: Theories and Methods...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Secure Big Data Systems & Operate and Secure Virtual Environments Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security...
Healthcare Data Security, Privacy, and Compliance
by Paul Nagy, PhD, FSIIM- 4.7
Approx. 6 hours to complete
In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. Healthcare Data Data in Healthcare: Diagnoses and Medications Healthcare Data Security and Privacy...