YoVDO

Privacy by Design: Data Sharing

Offered By: LinkedIn Learning

Tags

Data Governance Courses Encryption Courses Privacy Courses Data Protection Courses Data Classification Courses

Course Description

Overview

Learn how to develop a mature and dynamic data governance in order to enable privacy-aware data sharing.

Syllabus

Introduction
  • Welcome
  • Who this course is for
  • Data classification as part of data governance
1. Data Sharing: Risks and Possibilities
  • How data sharing works: The ads use case
  • How data sharing can go wrong
  • Data sharing risks: A case study
  • When data sharing should raise red flags
  • Valid reasons for data sharing
2. Solving for Data Sharing
  • Techniques to minimize privacy risk
  • Anonymization concepts
  • Anonymization techniques
  • Encryption
3. k-Anonymity and Data Sharing
  • What is k-anonymity?
  • k-Anonymity: A use case
  • k-Anonymity: With very coarse data
  • k-Anonymity: With very granular data
  • k-Anonymity: Industry best practice
4. l-Diversity
  • How l-diversity helps privacy
  • k-Anonymity vs. l-diversity
5. The Challenge of Privacy: Your Digital Fingerprint
  • Your physical fingerprint
  • Your digital fingerprint
  • The power of joining outside data
Conclusion
  • Next steps

Taught by

Nishant Bhajaria

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera