TrueschoTruescho
All Courses
Cyber Security: Data & Identity Security
Coursera
Specialization
Unknown

Cyber Security: Data & Identity Security

Macquarie University

Discover tools and methods for protecting sensitive data and managing digital identity, applying encryption and access security in modern digital business environments.

UnknownEnglish

About this Course

This Specialization brings together three industry-aligned courses, Data Security and Information Privacy, Identity and Access Management (IAM), and Applied Cryptography to provide a complete toolkit for safeguarding digital information and controlling access in today’s interconnected world. As organisations face growing challenges around cybercrime, data breaches and compliance with global privacy regulations, the ability to secure sensitive data and manage digital identities has never been more critical. In this program, you will learn how to evaluate and reduce risks to personal and organisational data, apply advanced privacy-preserving methods, and build systems that ensure confidentiality, integrity, and availability of information. You’ll gain hands-on experience in designing IAM frameworks that streamline user access while ensuring only authorised individuals can interact with critical assets. You will also explore the fundamentals and applications of cryptography, learning how encryption, public key infrastructure (PKI), and digital certificates are used to protect data at rest, in transit and in use. Developed by Macquarie University’s Cyber Skills Academy, ranked in the top 1% of universities globally and Australia’s leading cyber security school, combining academic rigour with real-world application. By the end, you’ll have the skills to strengthen organisational resilience, enhance compliance, and protect digital trust in an era of constant cyber threats

What You'll Learn

  • Secure sensitive data with advanced privacy techniques
  • Design and manage identity and access management systems
  • Apply cryptographic tools to data protection
  • Ensure compliance with global regulations

Prerequisites

  • Basic familiarity with related terminology
  • Willingness to practice through applied exercises

Instructors

M

Matt Bushby

Topics

Software Development
Computer Science
Computer Security and Networks
Understand key risks to data security and privacy in digital environments
Apply de-identification and anonymisation methods to protect sensitive data
Design secure authentication system architecture
Implement SSO, MFA, and passwordless authentication
Explain core cryptographic principles, algorithms, and encryption methods
Secure data and communications using symmetric and asymmetric encryption

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

تطوير البرمجيات
العلم الحاسوبي
أمن الحاسوب والشبكات
حماية البيانات والخصوصية
إدارة الهوية والوصول
التشفير التطبيقي
تأمين نظم التوثيق
التوافق التنظيمي
Secure data and communications using symmetric and asymmetric encryption

Start Learning Now