25.8.20
This website uses cookies to ensure you get the best experience on our website.
Learn more
Got it!
Skip to main content
Get Involved
Our Impact
Our Work
About Us
Sign in
Recommended Credentials
Discover related credentials might be your next learning step
Featured
Charles Leiserson
-
Featured
Leadership Skills for Engineering and Science Faculty
MIT Professional Education
Skills
Leadership
Leadership
Opens in a new tab
Featured
Julian Shun
-
Featured
Graph Algorithms and Machine Learning
MIT Professional Education
Skills
Data
Analytics
Machine Learning
Data
Analytics
Machine Learning
Opens in a new tab
Featured
James Kirtley
Steven Leeb
-
Featured
Design of Electric Motors, Generators, and Drive Systems
MIT Professional Education
Skills
Analyze Electric Motors
Design Electric Motors
Design generators
+4 more skills
Analyze Electric Motors
Design Electric Motors
Design generators
+4 more skills
Opens in a new tab
What is Encryption?
Internet Society
Skills
Encryption definition
How encryption protects your data
Symmetric and asymmetric encryption
+1 more skill
Encryption definition
How encryption protects your data
Symmetric and asymmetric encryption
+1 more skill
Opens in a new tab
Threats to Encryption
Internet Society
Skills
Types of threats to encryption
Methods that enable access to encrypted data
Methods that involve access to users’ data before encryption or after decryption
Types of threats to encryption
Methods that enable access to encrypted data
Methods that involve access to users’ data before encryption or after decryption
Opens in a new tab
History of Encryption Practices
Internet Society
Skills
Evolution of encryption practices
Government involvement in encryption
Back-door access to encrypted products
Evolution of encryption practices
Government involvement in encryption
Back-door access to encrypted products
Opens in a new tab
Advocacy for Encryption
Internet Society
Skills
Encryption advocacy
How to become an encryption advocate
Structuring advocacy messaging by audience
Encryption advocacy
How to become an encryption advocate
Structuring advocacy messaging by audience
Opens in a new tab
—
Encryption Certificate
Internet Society
Skills
Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society.
Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives.
Understand how and why efforts to weaken encryption pose a serious threat.
+3 more skills
Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society.
Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives.
Understand how and why efforts to weaken encryption pose a serious threat.
+3 more skills
Opens in a new tab
–
Internet Governance
Internet Society
Skills
History of the Internet
Internet governance
Internet ecosystem
+9 more skills
History of the Internet
Internet governance
Internet ecosystem
+9 more skills
Opens in a new tab
Introductions to Online Privacy
Internet Society
Skills
Privacy helps reinforce user trust of online services, yet online privacy is under constant pressure of being undermined
Privacy is an important right and an essential enabler of an individual’s autonomy, dignity, and freedom of expression. Yet, there is no universally agreed definition of privacy
Promoting strong, technology-neutral data privacy laws, privacy-by-design principles, and ethical data collection and handling principles is a key approach to protecting and fostering online privacy
Privacy helps reinforce user trust of online services, yet online privacy is under constant pressure of being undermined
Privacy is an important right and an essential enabler of an individual’s autonomy, dignity, and freedom of expression. Yet, there is no universally agreed definition of privacy
Promoting strong, technology-neutral data privacy laws, privacy-by-design principles, and ethical data collection and handling principles is a key approach to protecting and fostering online privacy
Opens in a new tab
What is a Digital Footprint?
Internet Society
Skills
Digital footprints are the records and traces we leave behind us as we use the Internet, every time we use the Internet
Digital footprints come with both benefits and costs
Your digital footprints are bigger than you may have thought, and they are being used - usually for commercial purposes, but sometimes for other reasons - to track you, customize for you, and market to you
Digital footprints are the records and traces we leave behind us as we use the Internet, every time we use the Internet
Digital footprints come with both benefits and costs
Your digital footprints are bigger than you may have thought, and they are being used - usually for commercial purposes, but sometimes for other reasons - to track you, customize for you, and market to you
Opens in a new tab
Protecting Online Privacy Through Ethical Data Collection
Internet Society
Skills
Personal data has monetary and strategic value to others that may not be aligned with an individual’s interests.
Ethical data collection and handling principles can assist in protecting online privacy.
Ethical privacy frameworks incorporate, among other things, the concepts of fairness, transparency, participation, accountability, and legitimacy in the collection and handling of data.
Personal data has monetary and strategic value to others that may not be aligned with an individual’s interests.
Ethical data collection and handling principles can assist in protecting online privacy.
Ethical privacy frameworks incorporate, among other things, the concepts of fairness, transparency, participation, accountability, and legitimacy in the collection and handling of data.
Opens in a new tab
Individual Privacy Rights: It’s Complicated
Internet Society
Skills
The Internet spans national borders, yet privacy and data protection laws are based on national sovereignty.
Provisions are needed to protect personal data that leaves one country and enters another to ensure the continuity of data protection for users.
Information about you may be shared with others without your knowledge or consent. It may happen because of something you do or something someone else does.
The Internet spans national borders, yet privacy and data protection laws are based on national sovereignty.
Provisions are needed to protect personal data that leaves one country and enters another to ensure the continuity of data protection for users.
Information about you may be shared with others without your knowledge or consent. It may happen because of something you do or something someone else does.
Opens in a new tab
Load more credentials
keyboard_arrow_down