Macquarie University

Cyber Security: Data Privacy

Macquarie University

Cyber Security: Data Privacy

Matt Bushby

位教师:Matt Bushby

访问权限由 Coursera Learning Team 提供

深入了解一个主题并学习基础知识。
初级 等级
无需具备相关经验
2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级
无需具备相关经验
2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Build and maintain accurate data inventories to track and govern personal information.

  • Apply Privacy by Design principles to embed safeguards across systems and services.

  • Conduct Privacy and Algorithmic Impact Assessments to identify and mitigate risks.

  • Use de-identification techniques while managing re-identification vulnerabilities.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

12 项作业

授课语言:英语(English)
最近已更新!

September 2025

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

本课程是 Cyber Security: Data, Privacy and AI Security 专项课程 专项课程的一部分
在注册此课程时,您还会同时注册此专项课程。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

This module covers building and maintaining data inventories, a core element for privacy programs. Learn how organizations collect, store, and process personal information. Understand risks from incomplete records. Classify data by sensitivity and legal obligations. Examine data flows across systems and third parties to identify vulnerabilities. Scenarios show how inventories support GDPR and CCPA compliance, transparency, and prepare for privacy by design and incident response. This module provides a structured map for responsible data management. *Tip: Practice data classification exercises to apply concepts.*

涵盖的内容

2个作业8个插件

Privacy must be embedded into products, services, and systems from the start. This module introduces Privacy by Design and its seven principles, shifting focus from reactive responses to proactive safeguards. Learn how default settings, system architecture, and lifecycle planning minimize risks while delivering value. Case studies show the costs of late privacy integration versus the advantages of designing with trust. Understand how Privacy by Design acts as a strategic advantage, strengthening resilience and customer loyalty. *Tip: Analyze a product you use and identify its privacy by design elements.*

涵盖的内容

2个作业7个插件

Systems can carry risks in practice. This module introduces Privacy Impact Assessments (PIAs), a structured process for addressing privacy concerns before they become problems. Learn how PIAs originated and why regulators view them as vital for high-risk projects. Gain practical guidance on scoping assessments, engaging stakeholders, evaluating risks, and proposing mitigation strategies. Examples show how PIAs strengthen governance, reduce compliance failures, and build public trust. PIAs enable informed choices and demonstrate accountability. *Tip: Practice scoping a PIA for a hypothetical project.*

涵盖的内容

2个作业7个插件

Artificial intelligence systems influence decisions, requiring oversight. This module explores Algorithmic Impact Assessments (AIAs), a framework for identifying risks, biases, and unintended consequences in automated decision-making. Examine how AI systems can amplify human bias and compromise transparency. Understand why regulators demand accountability. Case studies show how flawed algorithms harm individuals and erode trust. Learn how AIAs provide a systematic way to detect and minimize harms. This module equips you to evaluate technical and ethical dimensions of algorithmic systems for responsible deployment. *Tip: Analyze a real-world AI system for potential biases.*

涵盖的内容

2个作业8个插件

Sharing data is vital for innovation, but not at the cost of privacy. This module introduces data de-identification principles and techniques, from anonymization to differential privacy. Explore the balance between data utility and reducing re-identification risk. Understand why this balance is complex. Examples of re-identification attacks show how "anonymized" datasets can expose individuals. Learn to apply de-identification techniques and assess data vulnerability. Determine safeguards needed for responsible data sharing. *Tip: Research different de-identification methods and their limitations.*

涵盖的内容

2个作业7个插件

Breaches are inevitable; effective incident response protects privacy. This module guides learners through steps to prepare for, detect, and respond to privacy incidents. Learn to build and test response plans, establish clear responsibilities, and engage regulators and affected individuals. Case studies show how poor responses amplify damage, while strong responses limit harm and preserve trust. Explore simulations, lessons learned reviews, and continuous improvement to strengthen resilience. *Tip: Develop a basic incident response plan for a hypothetical data breach.*

涵盖的内容

1篇阅读材料2个作业7个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程 15,676 名学生

提供方

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Computer Science 浏览更多内容