Search result for Privacy and data protection Online Courses & Certifications
Get Course Alerts by Email
GDPR Certification & Preparation to CIPP Certification Test
by ICAN Consultancy- 4.2
2 hours on-demand video
NEW: We have added an article to explain the differences and similarities of GDPR and California Consumer Privacy Act (CCPA) Our GDPR training course offer a structured learning path to equip professionals with the specialist knowledge and skills needed to deliver GDPR compliance and also fulfil the role of data protection officer. There is a dedicated lecture which includes example questions and answers....
$13.99
Chemerinsky on Constitutional Law – Individual Rights and Liberties
by Erwin Chemerinsky- 4.9
Approx. 17 hours to complete
In this course we will investigate the protection of individual rights and liberties and take a look at what rights are and are not protected and investigate several important shifts in jurisprudence. - Describe the individual liberties protected by the Constitution and account for the history and structure of their protection...
Copyright for Multimedia
by Kevin Smith, M.L.S., J.D. , Lisa A. Macklin, J.D.,M.L.S. , Anne Gilliland, JD, MLS- 4.6
Approx. 12 hours to complete
Copyright questions about different formats (data, images, music and video) can be especially difficult. Sometimes the law specifically distinguishes between these different formats, and in most cases there are media-specific considerations that impact a copyright analysis. Data Data and Copyright Data Examples Data Assessment Images in Social Media, Implied Licenses, and Privacy...
Data Science Ethics
by H.V. Jagadish- 4.8
Approx. 15 hours to complete
What are the ethical considerations regarding the privacy and control of consumer information and big data, especially in the aftermath of recent large-scale data breaches? This course provides a framework to analyze these concerns as you examine the ethical and privacy implications of collecting and managing big data. Data Science Needs Ethics...
Introduction to Data Analytics for Business
by David Torgerson- 4.7
Approx. 12 hours to complete
We will explore such key areas as the analytical process, how data is created, stored, accessed, and how the organization works with data and creates the environment in which analytics can flourish. Data and Analysis in the Real World Data Storage and Databases Aggregating and Sorting Data in SQL Data Privacy...
Palo Alto Networks Cybersecurity Essentials II
by James Dalton- 4.7
Approx. 14 hours to complete
• Describe uses of advanced malware research and analysis to provide enhanced protection for enterprise networks. LAB SETUP START HERE: Connecting to the NDG platform and performing labs. Essentials II: Module 2 - Advanced Endpoint Protection Reading: Advanced Endpoint Protection Discovery: Endpoint Protection with PaloAlto Networks Discovery: Endpoint Protection and Malware Mitigation...
INTERNET OF THINGS & LAW - DR. PAVAN DUGGAL - CYBERLAW UNIV.
by Dr. Pavan Duggal- 3.5
1 hour on-demand video
A course to discover the law and legalities concerning Internet of Things It takes you through a journey to discover the various complex legal issues that Internet of Things is beginning to throw up, including protection of privacy and cyber security and how different legal approaches are evolving to deal with these legalities and related nuances raised by IoT....
$12.99
Related searches
Machine Learning Data Lifecycle in Production
by Robert Crowe- 4.5
Approx. 20 hours to complete
Week 1: Collecting, Labeling, and Validating data Week 3: Data Journey and Data Storage Week 4: Advanced Data Labeling Methods, Data Augmentation, and Preprocessing Different Data Types Week 1: Collecting, Labeling and Validating Data Data and Concept Change in Production ML Week 3: Data Journey and Data Storage Week 4 (Optional): Advanced Labeling, Augmentation and Data Preprocessing...
Microsoft Azure Services and Lifecycles
by Microsoft- 4.8
Approx. 8 hours to complete
Understanding who is using your systems and what they have permission to do is critical to keeping your data safe from attackers. Compare authentication and authorization What are single sign-on, multifactor authentication, and conditional access? Privacy, Compliance & Data Protection Standards on Microsoft Azure Access the Microsoft Privacy Statement, the Online Services Terms, and the Data Protection Addendum...
Monero: Learn how to mine, how to buy and how to invest it
- 3.4
41 mins on-demand video
You will learn what is Monero, how to buy it, how to mine it and how to invest in his market. Monero is an alternative coin in the world of cryptocurrencies, much stronger than Bitcoin in terms of privacy protection....
$12.99