D211 – Design Process

Upon completion of this course, students should understand the key questions to ask during the design process in order to ensure that privacy considerations are prioritized and privacy concerns are addressed.
E211 – Technical Policy Enforcement

This lesson covers various techniques to technically enforce policies in systems.
D101 – Privacy Harms

This lesson provides an introduction into identifying privacy harms. Afterwards, participants should be able to properly identify potential areas of concern for privacy.
E201 – Fuzzy Hashing

Hashing can be very unforgiving. Fuzzing hashing provides a way of preserving privacy while allowing for some flexibility.
U112 – Gender Collection

Upon completion of this lesson, you will have a comprehensive understanding of the complexities surrounding gender collection and how to navigate them effectively.
D131 – Privacy Risk

Upon completion of this course, students should understand the basics of the Factors Analysis of Information Risk (FAIR) methodology and its application to privacy risk assessment, as well as the value of using quantitative measures in a privacy risk context.
E131 – Anonymization, Pseudonymization & De-Identification

This lesson covers the syntactic
dataset measures of anonymity
and their proper use.
U141 – Privacy Notice Design Space

Upon completion of this course, students should understand the key considerations and various options involved in crafting a well-designed privacy notice.
U131 – Deceptive Designs

Upon completion of this course, students should be able to state the common factors that contribute to manipulative interfaces. They should also be able to avoid manipulation and coercion in their own designs.
E121 – Privacy Enhancing Technologies

PETs are a set of technologies which have a primary purpose of preserving or enhancing privacy. This lesson covers the basics of the most popular PETs in use.