Skip to content

Data Privacy

Companies everywhere are under threat of data breaches and cyber attacks, so it’s imperative that they find talent with the proper mindset about the use and protection of customer and client personal data.
Enroll Now
  • DAYS
  • HRS
  • MIN
  • SEC
  • Estimated Time
    1 month

    At 5-10 hours/week

  • Enroll by
    June 29, 2022

    Get access to classroom immediately on enrollment

  • Prerequisites
    Understanding of data privacy regulations and basic cybersecurity best practices

What You Will Learn


Data Privacy

Learners leave the course with a holistic view of data privacy issues in business, a data privacy checklist for use in future projects, and industry-guided best practices that can be implemented in physical or virtual office environments.

Learners leave the course with a holistic view of data privacy issues in business, a data privacy checklist for use in future projects, and industry-guided best practices that can be implemented in physical or virtual office environments.

Prerequisite Knowledge

Understanding of data privacy regulations and cybersecurity best practices.

  • Why Privacy

    Evaluate privacy threats; initiate the course project; analyze sensitive data types and purposes, and compare data privacy with information security.

  • Improving Privacy through Enterprise Risk Management

    Examine standard data privacy protection frameworks; develop data privacy governance; establish data classification and identification, and evaluate privacy risks using a Privacy Impact Assessment (PIA).

  • Data Privacy in Business

    Identify requirements for the protection of personal data; compare technical security controls as they relate to data privacy; compare procedural security controls as they relate to data privacy, and evaluate data protection solutions and technologies.

  • Data Privacy for Practitioners and Privacy Trends

    Evaluate data privacy models; apply cyber hygiene best practices for privacy, and evaluate privacy controls using a data protection checklist. Additionally, identify emerging technologies and describe evolving data security laws.

  • Course Project: Data Privacy Risk and Compliance Assessment

    In this project, students will conduct a data privacy risk and compliance assessment of the Microsoft 365 infrastructure for the case study company. They will complete the industry-standard data privacy risk assessment report documenting data management infrastructure, privacy program strategy, policies, procedures, privacy risks, and compliance gaps.

All Our Courses Include

Real-world projects from industry experts

Real-world projects from industry experts

With real world projects and immersive content built in partnership with top tier companies, you’ll master the tech skills companies want.
Technical mentor support

Technical mentor support

Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track.

Quizzes to test concepts

Check your understanding of concepts learned in the course by answering simple and auto-graded quizzes. Easily go back to the lessons to brush up on concepts anytime you get an answer wrong.
Flexible learning program

Flexible learning program

Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.
Course OfferingsFull list of offerings included:
Enrollment Includes:
Class content
Real-world projects
Project reviews
Project feedback from experienced reviewers
Student services
Technical mentor support
Student community
Succeed with personalized services.
We provide services customized for your needs at every step of your learning journey to ensure your success.
Get timely feedback on your projects.
Reviews By the numbers
1,400+ project reviewers
2.7M projects reviewed
88/100 reviewer rating
1.1 hours avg project review turnaround time
Reviewer Services
  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
Mentors available to answer your questions.
Mentors by the numbers
1,400+ technical mentors
0.85 hours median response time
Mentorship Services
  • Support for all your technical questions
  • Questions answered quickly by our team of technical mentors

Data Privacy

Get started today

  • Monthly access

    Pay as you go




    Enroll now
    • Maximum flexibility to learn at your own pace.
    • Cancel anytime.
  • Learn

    The fundamentals of core data privacy, data privacy from a business and a practitioner perspective, and strategizing enterprise risk management.
  • Average Time

    On average, successful students take 1 month to complete this program.
  • Benefits include

    • Real-world projects from industry experts
    • Technical mentor support

Program Details

  • Do I need to apply? What are the admission criteria?
    No. This Course accepts all applicants regardless of experience and specific background.
  • What are the prerequisites for enrollment?

    Students should have a basic understanding of:

    • Data privacy regulations in their jurisdiction (Examples: US Privacy Act of 1974, GDPR (EU), CCPA/CPRA (California), HIPAA, GLBA, COPPA, etc.)

    • Familiarity with basic cybersecurity best practices - Cybersecurity Fluency, Encryption, Data encryption and a general understanding of security fundamentals such as:

      • Cybersecurity hygiene best practices
      • One or more Cybersecurity frameworks (e.g., NIST CSF, CIS Controls, PCI DSS, ISO 2700)
      • Cybersecurity risk identification, assessment, and management fundamentals
      • Security access control management
      • Security network and system architecture
      • Encryption fundamentals
      • Event detection and response
  • How is this course structured?
    The Data Privacy course is comprised of content and curriculum to support one project. We estimate that students can complete the program in 1 month.

    The project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.
  • How long is this course?
    Access to this course runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our programs.
  • Can I switch my start date? Can I get a refund?
    Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
  • What software and versions will I need in this course?
    You will need access to the Internet, and a 64 bit computer. Additional software such as Word processing software will be required.

Data Privacy

Enroll Now