Skip to content

Data Privacy

Course

Companies everywhere are under threat of data breaches and cyber attacks, so it’s imperative that they find talent with the proper mindset about the use and protection of customer and client personal data.

Enroll Now

04Days06Hrs56Min33Sec

  • Estimated time
    1 month

    At 5-10 hours/week

  • Enroll by
    September 28, 2022

    Get access to classroom immediately on enrollment

  • Prerequisites
    Understanding of data privacy regulations and basic cybersecurity best practices

What you will learn

  1. Data Privacy

    Estimated 1 month to complete

    Learners leave the course with a holistic view of data privacy issues in business, a data privacy checklist for use in future projects, and industry-guided best practices that can be implemented in physical or virtual office environments.

    Prerequisite knowledge

    1. Why Privacy

      Evaluate privacy threats; initiate the course project; analyze sensitive data types and purposes, and compare data privacy with information security.

      • Improving Privacy through Enterprise Risk Management

        Examine standard data privacy protection frameworks; develop data privacy governance; establish data classification and identification, and evaluate privacy risks using a Privacy Impact Assessment (PIA).

        • Data Privacy in Business

          Identify requirements for the protection of personal data; compare technical security controls as they relate to data privacy; compare procedural security controls as they relate to data privacy, and evaluate data protection solutions and technologies.

          • Data Privacy for Practitioners and Privacy Trends

            Evaluate data privacy models; apply cyber hygiene best practices for privacy, and evaluate privacy controls using a data protection checklist. Additionally, identify emerging technologies and describe evolving data security laws.

            • Course Project: Data Privacy Risk and Compliance Assessment

              In this project, students will conduct a data privacy risk and compliance assessment of the Microsoft 365 infrastructure for the case study company. They will complete the industry-standard data privacy risk assessment report documenting data management infrastructure, privacy program strategy, policies, procedures, privacy risks, and compliance gaps.

            All our programs include:

            • Real-world projects from industry experts

              With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

            • Technical mentor support

              Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you, and keeping you on track.

            • Quizzes

              Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.

            • Flexible learning program

              Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

            Course offerings

            • Class content

              • Real-world projects
              • Project reviews
              • Project feedback from experienced reviewers
            • Student services

              • Technical mentor support
              • Student community

            Succeed with personalized services.

            We provide services customized for your needs at every step of your learning journey to ensure your success.

            Get timely feedback on your projects.

            • Personalized feedback
            • Unlimited submissions and feedback loops
            • Practical tips and industry best practices
            • Additional suggested resources to improve
            • 1,400+

              project reviewers

            • 2.7M

              projects reviewed

            • 88/100

              reviewer rating

            • 1.1 hours

              avg project review turnaround time

            Mentors available to answer your questions.

            • Support for all your technical questions
            • Questions answered quickly by our team of technical mentors
            • 1,400+

              technical mentors

            • 0.85 hours

              median response time

            Learn with the best.

            Learn with the best.

            • Ron Woerner

              Chief Security Officer

              Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.

            Data Privacy

            Get started today

            • Monthly access

              Pay as you go


              per

              /

              /

              Enroll now
              • Maximum flexibility to learn at your own pace.
              • Cancel anytime.
            • Learn

              The fundamentals of core data privacy, data privacy from a business and a practitioner perspective, and strategizing enterprise risk management.
            • Average Time

              On average, successful students take 1 month to complete this program.
            • Benefits include

              • Real-world projects from industry experts
              • Technical mentor support

            Program details

            • Do I need to apply? What are the admission criteria?
            • What are the prerequisites for enrollment?
            • How is this course structured?
            • How long is this course?
            • Can I switch my start date? Can I get a refund?
            • What software and versions will I need in this course?

            Data Privacy

            Enroll Now