Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Macquarie University

Cyber Security: Data Security and Information Privacy

Macquarie University via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Data Security and Information Privacy | Protect Identities. Preserve Trust. Power Compliance. This course helps compliance leaders, analysts, data scientists, and tech professionals secure data and ensure privacy by design. Developed by the Cyber Skills Academy at Macquarie University, this program offers hands-on methods and technologies to manage data security and privacy in real-world environments. You'll gain critical skills in: * Identifying threats, risks, and vulnerabilities in information systems. * Evaluating privacy risk using metrics and de-identification models (k-anonymity, l-diversity, t-closeness). * Applying differential privacy techniques for provable privacy. * Linking datasets securely with privacy-preserving record linkage. * Using tools for data encryption, anonymisation, and secure sharing. * Applying standards like ABS Five Safes and NIST Privacy Framework for compliance. This course empowers you to embed privacy as a core data strategy, reducing organizational risk and building trust. To succeed, learners should have a basic understanding of data concepts and digital environments.

Syllabus

  • Threats, Risks and Vulnerabilities
    • Before protecting information, understand the threats. This foundational topic introduces the digital risk landscape, from technical vulnerabilities to data privacy breaches. You'll learn about weak points in networks and systems, like exposed endpoints and poor access controls. Develop working definitions of 'security' and 'privacy' across contexts. This module uses real-world data breaches to identify, classify, and contextualize common risks in digital ecosystems. You'll also address protecting sensitive information as threats evolve. To succeed, focus on understanding the interconnectedness of these concepts.
  • Privacy Risk Quantification and Evaluation
    • Knowing a dataset holds sensitive information is one step; quantifying its risk enables action. This topic teaches you to define, measure, and evaluate privacy risks with data-driven methods. You'll examine data attributes like uniqueness and correlation that increase identification risk, even in anonymized datasets. From PII to data source linkability, this module covers variables shaping privacy exposure. You'll gain standard metrics and evaluation techniques to quantify privacy risk, assessing information system and dataset vulnerability to mitigate risks. Focus on applying these metrics to real-world data.
  • De-identification Methods for Data Release: From k-anonymity to t-closeness
    • Sharing data offers value, but without de-identification, it risks privacy. This topic addresses privacy-preserving data release, balancing utility with confidentiality. You'll learn foundational privacy models: k-anonymity, l-diversity, and t-closeness, designed to limit re-identification risk. Discover how attackers exploit model weaknesses through linkage and background knowledge attacks. Gain practical skills to anonymize datasets responsibly and defend against privacy breaches. Practice applying these models to various data scenarios.
  • Probable Privacy to Provable Privacy
    • With sophisticated data breaches, traditional privacy methods face challenges. This topic explains the shift from probable to provable privacy, where protections are mathematically guaranteed. You'll learn about differential privacy, a rigorous framework protecting individual data even in aggregated insights. Examine how differential privacy models work, including adding noise to query results and applying privacy budgets. Understand how these techniques shape secure data analysis. Focus on the mathematical foundations of differential privacy.
  • Privacy-Preserving Record Linkage
    • Linking data across datasets offers insights, but combining sources risks exposing sensitive information. This topic introduces privacy-preserving record linkage (PPRL), techniques to match and merge records without compromising privacy. You'll learn why traditional methods are vulnerable and how PPRL uses cryptographic and statistical techniques to protect sensitive information during linkage. Pay attention to the balance between data utility and privacy in linkage scenarios.
  • Privacy and Security Tools, Use Cases, and Frameworks
    • Theory needs practical application in today's data environment. This topic provides hands-on skills with industry-standard tools and global frameworks for strong privacy and security. You'll apply real-world tools for de-identifying datasets, encrypting sensitive information, and securing data. This module shows how technology supports compliance and reduces risk. Gain awareness of global privacy frameworks, including ABS Five Safes and NIST Privacy Framework, understanding their role in data handling decisions. Focus on practical implementation and framework application.

Taught by

Matt Bushby

Reviews

Start your review of Cyber Security: Data Security and Information Privacy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.