Search result for Privacy and security Online Courses & Certifications
Get Course Alerts by Email
Transacting on the Blockchain
by Don Tapscott , Alex Tapscott- 4.8
Approx. 16 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. Security Tokens Crypto-fiat Currencies and Stablecoins Security Tokens Crypto-fiat Currencies and Stablecoins Cryptocurrencies, Protocol Tokens, and Utility Tokens Security Tokens, and Natural Asset & Commodity Tokens Smart Contracts and Law Smart Contracts and Law...
Software Quality for Managers
by Soerin Bipat- 0.0
1.5 hours on-demand video
functioning of heart) and outputs (sweat). To assess the health of a human system the GP uses general key performance indicators (KPI's), such as: heartbeat and temperature. Managing Security, Privacy and Quality professionals. Responsible for implementing and maintaining a well balanced organisational risk posture; - Security and privacy operations manager (2 years)....
$12.99
Cybersecurity Compliance and System Administration
by Coreen Ryskamp- 0.0
4 Weeks
Build the background needed to understand key cybersecurity compliance and industry standards. You will learn the concepts of endpoint security and patch management. Describe the key privacy and data protection requirements for GDPR. Describe the differences between basic, foundational and organizational Center for Internet Security (CIS) controls. Describe Windows and Linux security management considerations....
$149
Machine Learning Data Lifecycle in Production
by Robert Crowe- 4.5
Approx. 20 hours to complete
Understanding machine learning and deep learning concepts is essential, but if you’re looking to build an effective AI career, you need production engineering capabilities as well. Responsible Data: Security, Privacy & Fairness Data and Concept Change in Production ML Process Feedback and Human Labeling Week 2: Feature Engineering, Transformation and Selection...
CS50 for Lawyers
by Doug Lloyd , David J. Malan- 0.0
10 Weeks
Whereas CS50 itself takes a bottom-up approach, emphasizing mastery of low-level concepts and implementation details thereof, this course takes a top-down approach, emphasizing mastery of high-level concepts and design decisions related thereto. In addition, it prepares students to formulate technology-informed legal arguments and opinions. Challenges at the Intersection of Law and Technology...
$199
CS50's Computer Science for Lawyers
by Doug Lloyd , David J. Malan- 0.0
10 Weeks
Whereas CS50 itself takes a bottom-up approach, emphasizing mastery of low-level concepts and implementation details thereof, this course takes a top-down approach, emphasizing mastery of high-level concepts and design decisions related thereto. In addition, it prepares students to formulate technology-informed legal arguments and opinions. Challenges at the Intersection of Law and Technology...
$199
Email Marketing: Send Unlimited Emails via Own Mail Server
by Dhiraj Rahul- 3.6
1 hour on-demand video
Learn to set up your own mail server like Gmail, Outlook and send emails/newsletters without any limit. You server will be automatically configured to follow modern mail protocols (DMARC, DKIM, and SPF) and the best security practices which includes HSTS, strong ciphers, opportunistic TLS, DNSSEC (with DANE TLSA). Do you accept that all your data (including business contract & confidential information) get collected, processed, and analyzed?...
$12.99
Related searches
Population Health: Responsible Data Analysis
by Mar Rodriguez Girondo , Jelle Goeman , Saskia le Cessie- 4.6
Approx. 21 hours to complete
First, you will learn how to obtain, safely gather, clean and explore data. A final important aspect is interpreting and reporting. In this course, we will emphasize the concepts and we will also teach you how to effectively perform your analysis using R. Data privacy and security Privacy and security in practice Relation between p-values and confidence intervals...
AI-100 & DP 100 practice Test: Real Exam Questions
by EXAM SUCCESS- 0.0
Map security requirements to tools, technologies, and processes May include but is not limited to: Design authentication architecture, design a content moderation strategy, ensure appropriate governance for data, design strategies to ensure the solution meets data privacy and industry standard regulations Validate solutions to ensure compliance with data privacy and security requirements...
$12.99
CISSP certification practice questions: Domain 1 & 2 - 2021
by Thor Pedersen | 234,000+ Enrollments Worldwide- 4.3
CISSP certification practice questions for CISSP Domain 1 and 2 - Security and Risk Mgmt & Asset Security. CISSP DOMAIN 1: Security and Risk Management (15% of the weighted questions - 160 questions) Security policies, standards, procedures and guidelines Integrate security risk considerations into acquisition strategy and practice Establish and manage information security education, training, and awareness...
$14.99