When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

EIT Digital logo

Security and Privacy for Big Data - Part 2

Master the Skills of Tomorrow with Coursera! From AI and Blockchain to Public Speaking and Psychology, Explore Courses Tailored for Your Success.

     
  • 4.7
  •  |
  • Reviews ( 257 )
Free

This Course Includes

  • iconcoursera
  • icon4.7 (257 reviews )
  • icon1 hour
  • iconenglish
  • iconOnline - Self Paced
  • iconcourse
  • iconEIT Digital

About Security and Privacy for Big Data - Part 2

Welcome to our focused course on Privacy and Data Protection in Big Data Environments. Here, you will delve into not only privacy-preserving methodologies but also explore crucial data protection regulations and concepts. By the end of this course, you'll be empowered to navigate your next Big Data project with confidence, assuring all aspects of privacy and data protection are well-managed.

This course will sharpen your ability to identify potential vulnerabilities in Big Data projects, providing you with the tools to fortify your systems for long-term sustainability. It is an invaluable resource for ICT professionals, systems designers, and managers who are involved with big data. Even if your experience with Big Data or IT is minimal, such as for a product manager, this course has been crafted to offer you the fundamental knowledge you need. Ready to master the intricacies of privacy in Big Data? Secure your spot in the course today.

What You Will Learn?

  • Understand what data protection is and why this is important.Explain what personal data is, and know the essential facts about the GDPR, what the GDPR has changed compared to previous data protection law.Know privacy risks arising from Big Data applications and methods which reduce or prevent privacy risks of data processing activities. Know concepts like anonymization and pseudonymization, k-anonymity, differential privacy, secure multiparty computation, and homomorphic encryption..