e-Privacy and Cybersecurity: Technology and Policy issues
Petros Kavassalis
This course is designed to introduce privacy for digital assets and digital identities, as well as modern information and IT systems protection technology and methods, to a wider audience. The goal is to help the participants in the course to understand how the "privacy-by-design" of digital assets and personal identities, and the protection of computer applications, devices, Information Systems, Network Infrastructures from digital attacks, have evolved as compelling concerns to public and private organizations, to policy-makers as well as to individuals. Policy-makers, managers, engineers, developers, students will benefit from this learning experience and acquire valuable knowledge for professional development... Good luck as you get started, we hope you enjoy the course!
Register for Free, now! | New to UAegean? Read the Announcements below
LessThis course is designed to introduce privacy for digital assets and digital identities, as well as modern information and IT systems protection technology and methods, to a wider audience. The goal is to help the participants in the course to understand how the "privacy-by-design" of digital assets and personal identities, and the protection of computer applications, devices, Information Systems, Network Infrastructures from digital attacks, have evolved as compelling concerns to public and private organizations, to policy-makers as well as to individuals. Policy-makers, managers, engineers, developers, students will benefit from this learning experience and acquire valuable knowledge for professional development... Good luck as you get started, we hope you enjoy the course!
Register for Free, now! | New to UAegean? Read the Announcements below
This course is designed to introduce privacy for digital assets and digital identities, as well as modern information and IT systems protection technology and methods, to a wider audience. The goal is to help the participants in the course to understand how the "privacy-by-design" of digital assets and personal identities, and the protection of computer applications, devices, Information Systems, Network Infrastructures from digital attacks, have evolved as compelling concerns to public and private organizations, to policy-makers as well as to individuals. Policy-makers, managers, engineers, developers, students will benefit from this learning experience and acquire valuable knowledge for professional development... Good luck as you get started, we hope you enjoy the course!
Register for Free, now! | New to UAegean? Read the Announcements below