This is the third and final lecture of this course on neuroinformatics infrastructure for handling sensitive data.
In this lecture, you will learn about virtual research environments (VREs) and their technical limitations, (i.e., a computing platform and the software stack behind it) and the security measures which should be considered during implementation.