Macquarie University
Data Security & Information Privacy
Macquarie University

Data Security & Information Privacy

Matt Bushby

Instructor: Matt Bushby

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

11 hours to complete
3 weeks at 3 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

11 hours to complete
3 weeks at 3 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Identify and Evaluate Privacy Risks.

  • Apply De-identification and Privacy-Preserving Techniques.

  • Use Industry Tools and Align with Global Frameworks.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

June 2025

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

Before organisations can defend the integrity and privacy of their information, they must first understand what they're up against. This foundational topic introduces learners to the evolving landscape of digital risk—from technical vulnerabilities in information systems to the broader implications of data privacy breaches. You'll explore the weak points that make networks and systems attractive to attackers, from exposed endpoints and unencrypted data flows to poor access controls and policy gaps. More importantly, you'll develop a working definition of "security" and "privacy" within different organisational and regulatory contexts—recognising how these concepts shift across industries and geographies. With a spotlight on real-world data breaches and systemic failures, this topic lays the groundwork for identifying, classifying, and contextualising common risks in modern digital ecosystems. You'll also unpack the unique challenges of protecting sensitive information in a world where data flows freely and threats are constantly evolving.

What's included

1 assignment8 plugins

Understanding that a dataset contains sensitive information is only the first step—knowing how much risk it carries is what allows you to act. In this topic, you’ll learn how to define, measure, and evaluate privacy risks in a structured, data-driven way. You’ll explore key attributes of data—such as uniqueness, uniformity, and correlation—that increase the risk of identifying individuals, even in seemingly anonymised datasets. From personally identifiable information (PII) to linkability between data sources, this topic introduces you to the critical variables that shape privacy exposure. You’ll also be introduced to standard metrics and evaluation techniques that help quantify privacy risk—giving you the tools to assess the vulnerability of information systems and datasets, and make informed decisions about how to mitigate those risks.

What's included

1 assignment8 plugins

Releasing or sharing data can unlock immense value—but without careful de-identification, it can also expose individuals to serious privacy risks. In this topic, you’ll explore the core challenge of privacy-preserving data release and examine the models that aim to balance data utility with confidentiality. You’ll be introduced to foundational privacy models like k-anonymity, l-diversity, and t-closeness, each designed to limit re-identification risk while preserving analytical usefulness. You’ll also discover how attackers can exploit weaknesses in these models—through linkage, homogeneity, and background knowledge attacks—reinforcing the importance of choosing the right model for each context. By engaging with real-world examples and structured methods, you’ll gain the practical skills to anonymise datasets responsibly and defend against privacy breaches.

What's included

1 assignment11 plugins

As data breaches and re-identification attacks become more sophisticated, traditional privacy techniques—like k-anonymity—are increasingly being challenged. In this topic, you'll explore why the world is shifting from probable privacy (where protections are assumed) to provable privacy (where protections are mathematically guaranteed). You’ll be introduced to the concept of differential privacy—a rigorous and provable framework that ensures individual data remains protected even when aggregated insights are published. You'll examine how different models and mechanisms of differential privacy work, such as adding noise to query results or applying privacy budgets, and understand how these techniques are shaping the future of secure data analysis.

What's included

1 assignment8 plugins

In an increasingly data-driven world, linking information across datasets can unlock powerful insights—whether it's matching patient records across hospitals or tracking customer behaviour across services. However, combining data from different sources often risks exposing sensitive personal information. This topic introduces the concept of privacy-preserving record linkage (PPRL)—a set of techniques designed to match and merge records across datasets without compromising individual privacy. You'll explore why traditional record linkage methods are vulnerable, and how privacy-preserving approaches use cryptographic and statistical techniques to ensure that sensitive information remains protected during the linkage process.

What's included

1 assignment10 plugins

In today’s complex data environment, theory alone is not enough—practical tools and internationally recognised frameworks are essential for implementing strong privacy and security measures across any organisation. This topic equips you with the hands-on skills to use industry-standard tools and understand the global standards shaping data protection practices. You’ll explore and apply real-world tools for de-identifying datasets, protecting sensitive information through encryption, and securing data both at rest and in motion. From open-source privacy tools to enterprise-grade security applications, this topic demonstrates how technology supports compliance and reduces risk in practice. In addition, you’ll gain critical awareness of global privacy frameworks, including the Australian Bureau of Statistics (ABS) Five Safes Framework and the NIST Privacy Framework, learning how these standards guide decision-making and accountability in data handling.

What's included

1 assignment10 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
7 Courses166 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions