This course gives learners an opportunity to explore data security in the cloud. In this course, learners will:

* Dive into the data services offered by cloud providers and compare their security features.
* Analyze a data breach and trace it back to the vulnerability that made it possible.
* Learn about database injection and aggregation attacks.
* Follow the life cycle of a data item and its relationship to privacy and integrity.
* Associate modern privacy requirements with US and European laws.