Filter by
The language used throughout the course, in both instruction and assessments.
Results for "personally identifiable information"
University of Michigan
Skills you'll gain: Data Ethics, Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Ethical Standards And Conduct, Big Data, Law, Regulation, and Compliance, Data Analysis, Social Sciences, Data-Driven Decision-Making, Diversity Awareness
The University of Sydney
Skills you'll gain: Critical Thinking, Information Management, Digital Communications, Document Management, Technical Communication, Data Ethics, General Networking, Personally Identifiable Information, Ethical Standards And Conduct, Data Access, Learning Strategies
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Help Desk Support, Information Technology, Hardware Troubleshooting, Microsoft Windows, Linux, Computer Networking, Computational Logic, Technical Documentation
Johns Hopkins University
Skills you'll gain: Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Information Management and Medical Records, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Law, Regulation, and Compliance, Information Privacy, Compliance Management, Health Care Procedure and Regulation, Data Security, Incident Response, Risk Analysis, Governance
- Status: Free
EIT Digital
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Management, Data Governance, Vulnerability Assessments, Big Data, Encryption
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
Skills you'll gain: Security Controls, Information Assurance, Cybersecurity, Risk Management Framework, Information Systems Security, Security Awareness, Cyber Governance, Security Management, Cyber Security Policies, Cyber Risk, Data Ethics, Data Integrity
In summary, here are 10 of our most popular personally identifiable information courses
- Data Science Ethics:Â University of Michigan
- Information & Digital Literacy for University Success:Â The University of Sydney
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Technical Support Fundamentals:Â Google
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Foundations of Cybersecurity:Â Google
- Google Cybersecurity:Â Google
- Cyber Security in Manufacturing :Â University at Buffalo
- Privacy Law and HIPAA:Â University of Pennsylvania
- Security and Privacy for Big Data - Part 2:Â EIT Digital