MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
What You Will Learn
- How to analyze a data breach and trace it back to the vulnerability that made it possible.
- How data security and privacy requirements arise from legal obligations and industry standards.
Course 2 of 4 in the Cybersecurity in the Cloud Specialization
Syllabus
WEEK 1
Organizing and Protecting Data
We organize our data into databases and structures to optimize our processing efforts. Data organization also impacts how we protect our data.
WEEK 2
SQL and Data Breaches
Many systems rely on the Structured Query Language, and this has yielded some notorious security problems.
WEEK 3
What Vendors Provide
Each cloud vendor offers a variety of data storage and structuring services. While each vendor has their unique jargon, most services fall into well-known categories. We will examine these categories and use them to review could provider offerings.
WEEK 4
Data Privacy and the Cloud
Privacy regulations give individuals some control over data collected about them by organizations. International trade makes it important to fulfill privacy expectations of other countries and regions.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.