Macquarie University

Cyber Security: Data Privacy

Macquarie University

Cyber Security: Data Privacy

Matt Bushby

Instructor: Matt Bushby

Access provided by Alliance University

Gain insight into a topic and learn the fundamentals.
Beginner level
No prior experience required
2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level
No prior experience required
2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Build and maintain accurate data inventories to track and govern personal information.

  • Apply Privacy by Design principles to embed safeguards across systems and services.

  • Conduct Privacy and Algorithmic Impact Assessments to identify and mitigate risks.

  • Use de-identification techniques while managing re-identification vulnerabilities.

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

12 assignments

Taught in English
Recently updated!

September 2025

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Cyber Security: Data, Privacy and AI Security Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

This module covers building and maintaining data inventories, a core element for privacy programs. Learn how organizations collect, store, and process personal information. Understand risks from incomplete records. Classify data by sensitivity and legal obligations. Examine data flows across systems and third parties to identify vulnerabilities. Scenarios show how inventories support GDPR and CCPA compliance, transparency, and prepare for privacy by design and incident response. This module provides a structured map for responsible data management. *Tip: Practice data classification exercises to apply concepts.*

What's included

2 assignments8 plugins

Privacy must be embedded into products, services, and systems from the start. This module introduces Privacy by Design and its seven principles, shifting focus from reactive responses to proactive safeguards. Learn how default settings, system architecture, and lifecycle planning minimize risks while delivering value. Case studies show the costs of late privacy integration versus the advantages of designing with trust. Understand how Privacy by Design acts as a strategic advantage, strengthening resilience and customer loyalty. *Tip: Analyze a product you use and identify its privacy by design elements.*

What's included

2 assignments7 plugins

Systems can carry risks in practice. This module introduces Privacy Impact Assessments (PIAs), a structured process for addressing privacy concerns before they become problems. Learn how PIAs originated and why regulators view them as vital for high-risk projects. Gain practical guidance on scoping assessments, engaging stakeholders, evaluating risks, and proposing mitigation strategies. Examples show how PIAs strengthen governance, reduce compliance failures, and build public trust. PIAs enable informed choices and demonstrate accountability. *Tip: Practice scoping a PIA for a hypothetical project.*

What's included

2 assignments7 plugins

Artificial intelligence systems influence decisions, requiring oversight. This module explores Algorithmic Impact Assessments (AIAs), a framework for identifying risks, biases, and unintended consequences in automated decision-making. Examine how AI systems can amplify human bias and compromise transparency. Understand why regulators demand accountability. Case studies show how flawed algorithms harm individuals and erode trust. Learn how AIAs provide a systematic way to detect and minimize harms. This module equips you to evaluate technical and ethical dimensions of algorithmic systems for responsible deployment. *Tip: Analyze a real-world AI system for potential biases.*

What's included

2 assignments8 plugins

Sharing data is vital for innovation, but not at the cost of privacy. This module introduces data de-identification principles and techniques, from anonymization to differential privacy. Explore the balance between data utility and reducing re-identification risk. Understand why this balance is complex. Examples of re-identification attacks show how "anonymized" datasets can expose individuals. Learn to apply de-identification techniques and assess data vulnerability. Determine safeguards needed for responsible data sharing. *Tip: Research different de-identification methods and their limitations.*

What's included

2 assignments7 plugins

Breaches are inevitable; effective incident response protects privacy. This module guides learners through steps to prepare for, detect, and respond to privacy incidents. Learn to build and test response plans, establish clear responsibilities, and engage regulators and affected individuals. Case studies show how poor responses amplify damage, while strong responses limit harm and preserve trust. Explore simulations, lessons learned reviews, and continuous improvement to strengthen resilience. *Tip: Develop a basic incident response plan for a hypothetical data breach.*

What's included

1 reading2 assignments7 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
15 Courses 14,618 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Explore more from Computer Science