Skip to content

Data Privacy

Course

Companies everywhere are under threat of data breaches and cyber attacks, so it’s imperative that they find talent with the proper mindset about the use and protection of customer and client personal data.

Enroll Now
  • Estimated time
    1 month

    At 5-10 hours/week

  • Enroll by
    June 7, 2023

    Get access to classroom immediately on enrollment

  • Skills acquired
    Privacy Impact Assessments, NIST Cybersecurity Framework

What you will learn

  1. Data Privacy

    Estimated 1 month to complete

    Learners leave the course with a holistic view of data privacy issues in business, a data privacy checklist for use in future projects, and industry-guided best practices that can be implemented in physical or virtual office environments.

    Prerequisite knowledge

    Understanding of data privacy regulations and cybersecurity best practices.

    1. Why Privacy

      Evaluate privacy threats; initiate the course project; analyze sensitive data types and purposes, and compare data privacy with information security.

      • Improving Privacy through Enterprise Risk Management

        Examine standard data privacy protection frameworks; develop data privacy governance; establish data classification and identification, and evaluate privacy risks using a Privacy Impact Assessment (PIA).

        • Data Privacy in Business

          Identify requirements for the protection of personal data; compare technical security controls as they relate to data privacy; compare procedural security controls as they relate to data privacy, and evaluate data protection solutions and technologies.

          • Data Privacy for Practitioners and Privacy Trends

            Evaluate data privacy models; apply cyber hygiene best practices for privacy, and evaluate privacy controls using a data protection checklist. Additionally, identify emerging technologies and describe evolving data security laws.

            • Course Project: Data Privacy Risk and Compliance Assessment

              In this project, students will conduct a data privacy risk and compliance assessment of the Microsoft 365 infrastructure for the case study company. They will complete the industry-standard data privacy risk assessment report documenting data management infrastructure, privacy program strategy, policies, procedures, privacy risks, and compliance gaps.

            All our courses include

            • Real-world projects from industry experts

              With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

            • Real-time support

              On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.

            • Quizzes

              Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.

            • Flexible learning program

              Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

            Course offerings

            • Class content

              • Real-world projects
              • Project reviews
              • Project feedback from experienced reviewers
            • Student services

              • Student community
              • Real-time support

            Succeed with personalized services.

            We provide services customized for your needs at every step of your learning journey to ensure your success.

            Get timely feedback on your projects.

            • Personalized feedback
            • Unlimited submissions and feedback loops
            • Practical tips and industry best practices
            • Additional suggested resources to improve
            • 1,400+

              project reviewers

            • 2.7M

              projects reviewed

            • 88/100

              reviewer rating

            • 1.1 hours

              avg project review turnaround time

            Learn with the best.

            Learn with the best.

            • Ron Woerner

              Chief Security Officer

              Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.

            Data Privacy

            Get started today

              • Learn

                The fundamentals of core data privacy, data privacy from a business and a practitioner perspective, and strategizing enterprise risk management.

              • Average Time

                On average, successful students take 1 month to complete this program.

              • Benefits include

                • Real-world projects from industry experts
                • Real-time support

              Program details

              • Do I need to apply? What are the admission criteria?

                No. This course accepts all applicants regardless of experience and specific background.

              • What are the prerequisites for enrollment?

                Students should have a basic understanding of:

                • Data privacy regulations in their jurisdiction (Examples: US Privacy Act of 1974, GDPR (EU), CCPA/CPRA (California), HIPAA, GLBA, COPPA, etc.)
                • Familiarity with basic cybersecurity best practices - Cybersecurity Fluency, Encryption, Data encryption and a general understanding of security fundamentals such as:
                • - Cybersecurity hygiene best practices - One or more Cybersecurity frameworks (e.g., NIST CSF, CIS Controls, PCI DSS, ISO 2700) - Cybersecurity risk identification, assessment, and management fundamentals - Security access control management - Security network and system architecture - Encryption fundamentals - Event detection and response
              • How is this course structured?

                The Data Privacy course is comprised of content and curriculum to support one project. We estimate that students can complete the program in 1 month.

                The project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.

              • How long is this course?

                Access to this course runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our programs.

              • Can I switch my start date? Can I get a refund?

                Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.

              • What software and versions will I need in this course?

                You will need access to the Internet, and a 64 bit computer. Additional software such as Word processing software will be required.

              Data Privacy

              Enroll Now