RAR-files |
linkedin.learning.data.steward.foundations-xqzt.rar |
50,000,000 |
44027A3F |
linkedin.learning.data.steward.foundations-xqzt.r00 |
50,000,000 |
328C6DCF |
linkedin.learning.data.steward.foundations-xqzt.r01 |
50,000,000 |
46590075 |
linkedin.learning.data.steward.foundations-xqzt.r02 |
50,000,000 |
AF2709A2 |
linkedin.learning.data.steward.foundations-xqzt.r03 |
50,000,000 |
1611F355 |
linkedin.learning.data.steward.foundations-xqzt.r04 |
50,000,000 |
CC97ADB4 |
linkedin.learning.data.steward.foundations-xqzt.r05 |
17,807,966 |
7ED04765 |
|
Total size: |
317,807,966 |
|
|
Archived
files |
01.01-data_stewardship.mkv
[e686fa6cde847188]
|
4,739,152 |
3831BA9D |
01.02-what_you_need_to_know.mkv
[dbf98b5c8d31353c]
|
1,095,103 |
F64B566C |
02.01-what_is_data_stewardship.mkv
[6006d90e443755ab]
|
8,807,198 |
7888024C |
02.02-exploring_data_stewardship_roles.mkv
[e9f37afdbd693f76]
|
10,795,032 |
BDD604A5 |
02.03-qualities_of_a_good_data_steward.mkv
[4edee5249a71f376]
|
10,811,250 |
C9E1E55D |
02.04-data_stewardship_responsibilities.mkv
[47ea9b63fd4d2e0e]
|
9,943,833 |
FCC15B9F |
02.05-obtaining_senior_leadership_support.mkv
[d109c997c220b6aa]
|
5,575,631 |
9DAE7FE9 |
03.01-implementing_master_data_management.mkv
[4ed23aa44725a0bb]
|
11,477,371 |
3548AEDB |
03.02-developing_data_definitions.mkv
[2ee7271ead4d8351]
|
9,153,772 |
FD21BD54 |
03.03-protecting_data_quality.mkv
[7ebcd25fb10f6d42]
|
7,653,451 |
81B7D7EE |
03.04-validating_data_quality.mkv
[88c2460ed0360ec4]
|
5,937,696 |
60F56C7E |
03.05-promoting_data_reuse.mkv
[41b115bd4ddee50c]
|
3,559,446 |
FE786879 |
04.01-goals_of_information_security.mkv
[10cfa441cb0687e9]
|
6,511,493 |
43F24784 |
04.02-preserving_data_confidentiality.mkv
[48f9a0270eb2f2f5]
|
9,110,002 |
59B4ACE4 |
04.03-protecting_data_integrity.mkv
[7d31ee36747176a5]
|
8,888,538 |
E630135C |
04.04-maintaining_data_availability.mkv
[b357b953d39d25ad]
|
3,556,908 |
E616A531 |
04.05-identification_authentication_and_authorization.mkv
[5173e48d8bb1f458]
|
10,623,494 |
0574768E |
04.06-discretionary_access_controls.mkv
[b8a73bb910d9c6a5]
|
5,318,552 |
37FE58AB |
04.07-access_control_lists.mkv
[a8751de98d567355]
|
11,633,269 |
82CBE422 |
04.08-role-based_access_control.mkv
[e69a4455766eb762]
|
3,152,800 |
EFF993A9 |
04.09-managing_the_data_lifecycle.mkv
[16b9c1b627a0e9a4]
|
14,221,936 |
DA24CC0C |
05.01-privacy_program_development.mkv
[ee38111d852c423d]
|
4,907,544 |
D6171C9C |
05.02-generally_accepted_privacy_principles.mkv
[28f87544bb44d86a]
|
10,259,876 |
3B715942 |
05.03-data_anonymization.mkv
[78b1ebcc1640c479]
|
7,951,357 |
CFA7F096 |
05.04-data_obfuscation.mkv
[af867cc60b765227]
|
6,628,837 |
0D9663D4 |
06.01-todays_regulatory_landscape.mkv
[d1f65c2fd5b69929]
|
9,120,114 |
5D84B12E |
06.02-health_insurance_portability_and_accountability_act_(hipaa).mkv
[c6cf6b28e575d1f7]
|
13,198,269 |
B88976F2 |
06.03-family_educational_rights_and_privacy_act_(ferpa).mkv
[f9860b518edfdb3a]
|
17,238,226 |
2E36B71F |
06.04-gramm-leach-bliley_act_(glba).mkv
[193c3f94ac2c6ffa]
|
12,642,061 |
1E85D34C |
06.05-data_breach_notification_laws.mkv
[85b2cdb732811ad7]
|
12,585,371 |
7158CA8C |
06.06-international_data_transfers.mkv
[68a4f99f60918193]
|
10,939,328 |
D6FD5BDE |
07.01-data_inventory.mkv
[691ecbffc30ce9c4]
|
11,382,633 |
541E79F4 |
07.02-entity-relationship_diagrams.mkv
[63db90854aa73de8]
|
10,131,259 |
7B59ED2A |
07.03-data_classification.mkv
[7b43f04d89c54c2d]
|
5,371,071 |
3F466B12 |
07.04-interviewing_key_employees.mkv
[6fb1c09428681bd9]
|
14,626,203 |
00A69689 |
07.05-following_data_flows.mkv
[6d36f074150941d8]
|
4,799,003 |
FEA2B7CC |
07.06-data_sharing_and_transfers.mkv
[aca68d448b9d4790]
|
2,530,746 |
25137EE8 |
08.01-continuing_your_studies.mkv
[5d3f5ac8ee04b5c0]
|
926,560 |
D1C4137B |
|
Total size: |
317,804,385 |
|
|