Real-world projects from industry experts
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
Companies everywhere are under threat of data breaches and cyber attacks, so it’s imperative that they find talent with the proper mindset about the use and protection of customer and client personal data.
At 5-10 hours/week
Get access to classroom immediately on enrollment
Learners leave the course with a holistic view of data privacy issues in business, a data privacy checklist for use in future projects, and industry-guided best practices that can be implemented in physical or virtual office environments.
Understanding of data privacy regulations and cybersecurity best practices.
Evaluate privacy threats; initiate the course project; analyze sensitive data types and purposes, and compare data privacy with information security.
Examine standard data privacy protection frameworks; develop data privacy governance; establish data classification and identification, and evaluate privacy risks using a Privacy Impact Assessment (PIA).
Identify requirements for the protection of personal data; compare technical security controls as they relate to data privacy; compare procedural security controls as they relate to data privacy, and evaluate data protection solutions and technologies.
Evaluate data privacy models; apply cyber hygiene best practices for privacy, and evaluate privacy controls using a data protection checklist. Additionally, identify emerging technologies and describe evolving data security laws.
In this project, students will conduct a data privacy risk and compliance assessment of the Microsoft 365 infrastructure for the case study company. They will complete the industry-standard data privacy risk assessment report documenting data management infrastructure, privacy program strategy, policies, procedures, privacy risks, and compliance gaps.
With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.
On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.
Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.
Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
We provide services customized for your needs at every step of your learning journey to ensure your success.
project reviewers
projects reviewed
reviewer rating
avg project review turnaround time
Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.
The fundamentals of core data privacy, data privacy from a business and a practitioner perspective, and strategizing enterprise risk management.
On average, successful students take 1 month to complete this program.
No. This course accepts all applicants regardless of experience and specific background.
Students should have a basic understanding of:
The Data Privacy course is comprised of content and curriculum to support one project. We estimate that students can complete the program in 1 month.
The project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.
Access to this course runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our programs.
Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
You will need access to the Internet, and a 64 bit computer. Additional software such as Word processing software will be required.