Filter by
The language used throughout the course, in both instruction and assessments.
289 results for "privacy"
Skills you'll gain: System Security, Cyberattacks, Cryptography, Network Security, Security Engineering
O.P. Jindal Global University
Skills you'll gain: Culture, Leadership and Management, Problem Solving, Risk Management
- Status: Free
Duke University
Skills you'll gain: Data Management, Data Analysis, Databases, Microsoft Excel, SQL, Spreadsheet Software
- Status: Free
Stanford University
Skills you'll gain: Algorithms, Cryptography, Mathematics, Security Engineering, Theoretical Computer Science, Probability & Statistics, Critical Thinking, Mathematical Theory & Analysis, Computer Security Models, Probability Distribution
Skills you'll gain: Cryptography, Network Security, System Security
University of Maryland, College Park
Skills you'll gain: Human Computer Interaction, Software Security, System Security, Systems Design, User Experience, Cyberattacks, Design and Product, Security Engineering, User Research, Interactive Design
- Status: Free
The University of Edinburgh
Skills you'll gain: Communication, Data Management, Social Media, Decision Making, Digital Marketing, Human Computer Interaction, Network Security, User Experience
Skills you'll gain: Cryptography, Linux
- Status: Free
University of Michigan
Skills you'll gain: Decision Making, Critical Thinking, Data Analysis, Data Management, Regulations and Compliance, Social Media, Big Data, Experiment, General Statistics, Probability & Statistics
Board Infinity
In summary, here are 10 of our most popular privacy courses
- Introduction to Cybersecurity Essentials:Â IBM
- M.A. in International Relations, Security, and Strategy:Â O.P. Jindal Global University
- Copyright for Multimedia:Â Duke University
- Prepare Data for Exploration:Â Google
- Cryptography I:Â Stanford University
- IT Security: Defense against the digital dark arts:Â Google
- Usable Security:Â University of Maryland, College Park
- Digital Footprint:Â The University of Edinburgh
- Assets, Threats, and Vulnerabilities:Â Google
- Introduction to Privacy - Part 3:Â Infosec