Search result for Healthcare data privacy and security Online Courses & Certifications
Get Course Alerts by Email
Cyberhacker Series: Cyber Anonymity
by Chad Russell- 4.1
2 hours on-demand video
Anonymizers such as TOR (The Onion Router) enable users to search the web anonymously and protect browser traffic from global mass surveillance. Data Privacy is a vast catalog of subject matter. In this course I will break down Data Privacy into it's various components and share with you the current state of digital privacy....
$12.99
Complete data protection system A-Z in 16 steps (GDPR, CIPM)
by Paweł Mielniczek- 5
5 hours on-demand video
I will cover the necessary steps where you prepare, identify, assess, implement and apply data protection principles at your firm. 16 steps to make sure all data protection measures are in place and function well Save time and resources with an efficient method to protect privacy Identify, assess, implement and maintain compliance with data protection laws...
$12.99
Understanding HIPAA Compliance
by Learnsector LLP- 4.3
1 hour on-demand video
This course helps you understand the various rules under HIPAA and how to be compliant with that. In recent years, with the increase in the number of health data breaches, HIPAA has gained a lot of prominence in the healthcare arena. While cyberattacks and ransomware attacks add to the agonies of health insurers and providers, HIPAA assures security and protection....
$9.99
Ethics in AI and Big Data
by Jennifer Cloer , Gary Schillinger- 0.0
6 Weeks
Learn how to build and incorporate ethical frameworks in your AI and Big Data technology and business initiatives to add transparency, build trust, and drive adoption. No longer stuck in the fantasy world of science fiction, Artificial Intelligence (AI) today is a reality, and data is its fuel. Understand what ethics means and how to apply it to AI....
$149
Becoming a Hyperledger Aries Developer
by Stephen Curran , Carol Howard- 0.0
7 Weeks
Data is driving our world today. However, we hear about Data breaches and Identity thefts all the time. As such, it is imperative that we adopt a new approach to identity management, and ensure data security and user privacy through tamper-proof transactions and infrastructures. Deploy instances of Aries agents and establish a connection between two or more Aries agents....
$199
Business Considerations for Edge Computing
by Jennifer Cloer , Gary Schillinger- 0.0
7 Weeks
We’ll review the data privacy and security considerations and share examples of where we see business innovation with Edge. What Edge Computing is and what is driving its adoption What are the data and privacy considerations for deploying Edge Computing networks Know the influencers and open source projects that are defining the future of Edge and the distributed computing world...
$149
Tech for Good: The Role of ICT in Achieving the SDGs
by Tech for Good Faculty , Dorothy Gordon , Guilherme Canela Godoi , José Clastornik- 0.0
10 Weeks
What opportunities and challenges do digital technologies present for the development of our society? It also addresses the new challenges that technology can introduce , such as privacy, data management, risks to cybersecurity, e-waste, and the widening of social divides. Responsible collection and use of data requires governance, security, and trust...
$49
Related searches
AZ-900: Microsoft Azure Fundamentals (Exam preparation)
by Phillip Burton- 0.0
5.5 hours on-demand video
We'll be looking at services for Compute, Networking, Storage, Databases, Internet of Things, Big Data and Analytics, Artificial Intelligence and more. We'll examine Azure management tools, security features and network security, identity services, governance features, and privacy and compliance resources. And if you are an American college student, you might even get college credit for passing that exam....
$12.99
Introduction to WebRTC
by Infinite Skills- 4.7
3.5 hours on-demand video
This course is designed for users that already have a basic understanding of JavaScript and HTML. From there, Arin will teach you about WebRTC signaling, WebRTC for data exchange, and screen sharing in a WebRTC application. Finally, you will learn about user interaction patterns and security and privacy considerations....
$17.99
Turn Ethical Frameworks into Actionable Steps
by Eleanor 'Nell' Watson , Aaron Hui , Abhishek Gupta , Megan Smith Branch- 4.6
Approx. 15 hours to complete
Principles alone can be elusive and impractical for application. Safety and Security Big Data Generated Through Devices vs. Corporate Data Hegemony Conflict Reconciliation Between Ethics, Regulations, and Business Demands Quiz Compare ethical frameworks and select one to guide decisions to resolve an organizational issue. Analyze applicable regulations, standards, and international best practices....