We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Creating a De-identified Copy of Data in Cloud Storage

Google Cloud Training

This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will create and run a Cloud DLP job using the DeID Findings Action to create a redacted and de-identified copy data in Cloud Storage.

Enroll now

What's inside

Syllabus

Creating a De-identified Copy of Data in Cloud Storage

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides Cloud Storage-based learners with the chance to become familiar with data science tools from Google
Offers a hands-on self study lab that provides up to date tool experience

Save this course

Save Creating a De-identified Copy of Data in Cloud Storage to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Creating a De-identified Copy of Data in Cloud Storage. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Creating a De-identified Copy of Data in Cloud Storage will develop knowledge and skills that may be useful to these careers:
Data Governance Analyst
Data Governance Analysts help implement and maintain good data management practices. Cloud Storage will contain rich datasets. These datasets are often PII due to compliance or privacy regulations. Taking this course will help you keep PII safe while adhering to these regulations. Building upon this knowledge will assist you as a Data Governance Analyst, no matter what industry you work in.
Data Analyst
This course teaches learners how to make de-identified copies of data stored in Cloud Storage. As a Data Analyst, you may work with datasets that contain PII. Taking this course could help you learn how to properly handle PII in your data, which could help your company avoid compliance or privacy issues.
Database Administrator
Database Administrators are responsible for maintaining and securing databases. This course can help you build a foundation in data security that could help you take the next step in your career and become a Database Administrator.
Information Security Analyst
Information Security Analysts help protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Data security is a crucial component of information security. Taking this course could help you develop skills that will make you a more competitive candidate for roles in this field.
Security Analyst
Security Analysts help organizations identify and mitigate security risks. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge will allow you to contribute to a security team's efforts to keep their data safe from unauthorized access.
Privacy Analyst
Privacy Analysts help organizations protect personal data. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Information Systems Security Manager
Information Systems Security Managers are responsible for developing and implementing security policies and procedures. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Data Protection Officer
Data Protection Officers help organizations comply with privacy regulations. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
IT Security Manager
IT Security Managers are responsible for developing and implementing security policies and procedures. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Systems Engineer
Systems Engineers design, install, and maintain computer systems. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
DevOps Engineer
DevOps Engineers help build and maintain software systems. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Cloud Architect
Cloud Architects design and build cloud computing solutions. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Compliance Manager
Compliance Managers help organizations comply with regulations. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Risk Analyst
Risk Analysts help organizations identify and mitigate risks. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.
Business Analyst
Business Analysts help organizations improve their business processes. This course teaches learners how to work with Cloud Storage data and safely de-identify PII. This knowledge could make you a more competitive candidate for roles in this rapidly growing field.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Creating a De-identified Copy of Data in Cloud Storage.
Provides legal guidance on privacy and data protection laws and regulations. It covers a wide range of topics such as privacy compliance, data breach response, and international data transfers.
Provides a comprehensive overview of cryptography and network security. It valuable resource for anyone who wants to learn more about these important topics.
Provides a concise introduction to privacy. It covers a wide range of topics, including the history of privacy, the different types of privacy, and the threats to privacy in the digital age.
Provides a comprehensive overview of privacy and security challenges in the cloud. It covers a wide range of topics such as cloud security models, data encryption, access control, and regulatory compliance.
Provides a practical toolkit for data protection. It covers a wide range of topics, including data protection regulations, privacy best practices, and data breach response.
Provides a comprehensive overview of the General Data Protection Regulation (GDPR). It covers a wide range of topics such as GDPR compliance, data protection by design, and cross-border data transfers.
Provides a legal analysis of privacy laws and regulations. It covers a wide range of topics such as the right to privacy, data protection principles, and international data transfers.
Provides a comprehensive overview of data ethics. It covers a wide range of topics such as data privacy, data security, and data ownership.
Provides a philosophical analysis of the privacy paradox. It explores the tension between people's desire for privacy and their willingness to share personal information.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Creating a De-identified Copy of Data in Cloud Storage.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser