Introduction.- Secure Cooperative Learning in Early Years.- Outsourced Computation for Learning.- Secure Distributed Learning.- Learning with Differential Privacy.- Applications - Privacy-Preserving Image Processing.- Threats in Open Environment.- Conclusion.