• No products in the cart.

The following are the highlights of the course:

– Identifying threats, risks, and vulnerabilities in modern information systems and networks.

– Evaluating privacy risk using quantifiable metrics and applying de-identifying models like k-anonymity, l-diversity, and t-closeness.

– Navigating the shift from probabilistic to provable privacy with different privacy techniques.

– Linking datasets securely with privacy-preserving record linkage methods.

– Using cutting-edge tools for data encryption, anonymization, and secure sharing.