Macquarie University
Cyber Security: Data Privacy
Macquarie University

Cyber Security: Data Privacy

Matt Bushby

位教师:Matt Bushby

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级
无需具备相关经验
2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级
无需具备相关经验
2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Build and maintain accurate data inventories to track and govern personal information.

  • Apply Privacy by Design principles to embed safeguards across systems and services.

  • Conduct Privacy and Algorithmic Impact Assessments to identify and mitigate risks.

  • Use de-identification techniques while managing re-identification vulnerabilities.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

September 2025

作业

12 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

本课程是 Cyber Security: Data, Privacy and AI Security 专项课程 专项课程的一部分
在注册此课程时,您还会同时注册此专项课程。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

Before organisations can safeguard privacy or comply with regulations, they must first know exactly what data they hold and how it is being used. This opening topic introduces learners to the critical practice of building and maintaining data inventories, the foundation of every effective privacy program. You’ll explore how organisations collect, store, share, and process personal information, and why incomplete or inaccurate records create blind spots that expose businesses to unnecessary risk. From customer details and employee records to metadata and machine-generated logs, you’ll learn to classify data according to sensitivity, purpose, and legal obligations. Just as importantly, you’ll examine how data flows across departments, systems, and third-party providers, uncovering the hidden pathways where information is most vulnerable. By working through real-world scenarios, you’ll see how inventories support compliance with global regulations like GDPR and CCPA, enable transparency with stakeholders, and provide the essential starting point for privacy by design, risk assessments, and incident response. This topic lays the groundwork for developing a holistic view of data, transforming what might appear as fragmented information into a structured map that empowers organisations to act responsibly and strategically.

涵盖的内容

2个作业5个插件

Protecting privacy cannot be an afterthought, it must be embedded at the very core of products, services, and systems. This topic introduces learners to the framework of Privacy by Design and its seven foundational principles, which shift organisations from reactive responses to proactive safeguards. You’ll explore how default settings, system architecture, and lifecycle planning can minimise risks before they materialise, while still delivering functionality and value. Real-world case studies highlight both the costs of bolting privacy on too late and the advantages of designing with trust and transparency from the outset. By the end, you’ll recognise how privacy by design is not just a compliance tool, but a strategic advantage that strengthens resilience, customer loyalty, and organisational reputation.

涵盖的内容

2个作业4个插件

Even the best-designed systems can carry risks when implemented in practice. This topic introduces learners to Privacy Impact Assessments (PIAs), a structured process for anticipating and addressing privacy concerns before they become costly problems. You’ll discover how PIAs originated from environmental impact assessments and why regulators worldwide now view them as essential for high-risk projects. Through practical guidance, you’ll learn how to scope an assessment, engage stakeholders, evaluate risks, and propose mitigation strategies. Real-world examples illustrate how PIAs strengthen governance, reduce compliance failures, and build public trust. More than just a checklist exercise, PIAs enable organisations to weigh trade-offs, make informed choices, and demonstrate accountability to both regulators and society.

涵盖的内容

2个作业4个插件

As artificial intelligence systems increasingly influence decisions about people’s lives, the need for oversight has never been greater. This topic explores Algorithmic Impact Assessments (AIAs), a framework for identifying risks, biases, and unintended consequences in automated decision-making. You’ll examine how AI systems can replicate or amplify human bias, how transparency and fairness can be compromised, and why regulators and the public demand greater accountability. By analysing case studies, you’ll see how flawed algorithms can harm individuals and erode trust, and how AIAs provide organisations with a systematic way to detect, address, and minimise those harms. This topic equips you to evaluate both the technical and ethical dimensions of algorithmic systems, ensuring their deployment is not only effective but also responsible.

涵盖的内容

2个作业5个插件

Sharing and analysing data is vital for innovation, but it must not come at the cost of individual privacy. This topic introduces learners to the principles and techniques of data de-identification, from simple anonymisation methods to advanced strategies such as differential privacy. You’ll explore the balance between maintaining data utility and reducing the risk of re-identification, and why achieving that balance is far more complex than it first appears. Real-world examples of re-identification attacks illustrate how even “anonymised” datasets can expose individuals when combined with other sources. By the end, you’ll understand not only how to apply de-identification techniques, but also how to assess when data remains vulnerable and what additional safeguards are needed to responsibly share or publish information.

涵盖的内容

2个作业3个插件

In a world where breaches are no longer a question of if but when, effective incident response is a cornerstone of privacy protection. This topic guides learners through the essential steps organisations must take to prepare for, detect, and respond to privacy incidents. You’ll learn how to build and test response plans, establish clear lines of responsibility, and engage regulators, stakeholders, and affected individuals with clarity and transparency. Case studies reveal how poor responses have amplified reputational and financial damage, while strong responses have limited harm and preserved trust. You’ll also explore the role of simulations, lessons learned reviews, and continuous improvement in ensuring that each incident, whether large or small, becomes an opportunity to strengthen resilience.

涵盖的内容

1篇阅读材料2个作业4个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程7,136 名学生

提供方

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题