CIPT Certification Training | Certified Information Privacy Technologist Training

Print Friendly, PDF & Email

CIPT Certification Training | Certified Information Privacy Technologist Training course hands-on – Learn the principles of privacy in technology while preparing for the CIPT examination.

In this CIPT Certification Training course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe.

An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. With CIPT Certification Training you will also learn about online privacy as it relates to using personal information on websites and other Internet-related technologies.

You will learn the need and importance for privacy in the IT environment with impacts such as regulatory activities, security threats, advances in technology and the proliferation of social networks. This CIPT Certification Training | Certified Information Privacy Technologist Training course will provide an introduction to privacy laws, regulations, and standards impacting privacy in IT and the risks inherent in the IT environment. You will also learn about the importance of personally identifiable information and methods for ensuring its protection.

This two-day CIPT Certification Training program covering practices the principles of information privacy in technology includes:

» Official IAPP CIPT Certification participant guide
» Official IAPP CIPT Certification textbooks ("Introduction to IT Privacy" and "Privacy in Technology")
» Official IAPP CIPT Certification Training practice test
» IAPP CIPT certification exam voucher
» IAPP membership for one year

Note: Your contact information must be provided to the IAPP and will be used by IAPP for membership services fulfillment in accordance with IAPP's policies.

Duration: 2 days

CIPT Certification TrainingRelated Courses

CIPT Certification Training - Customize It:

» If you are familiar with some aspects of this CIPT Certification Training or Certified Information Privacy Technologist Training course, we can omit or shorten their discussion.
» We can adjust the emphasis placed on the various topics or build the CIPT Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
» If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CIPT Certification Training course in manner understandable to lay audiences.

CIPT Certification Training - Audience / Target Group:

The target audience for this CIPT Certification Training course:

» Individuals who need to understand the principles of information privacy in technology
» Anyone interested in pursuing CIPT certification

CIPT Certification Training – Objectives

Upon completing this CIPT Certification Training course, learners will be able to meet these objectives:

» Common principles and approaches to privacy
» Jurisdictions and industries
» Safeguarding personal information
» Online privacy
» Privacy in the IT environment
» Core privacy concepts
» Regulations and standards impacting privacy in IT
» Privacy in systems and applications
» Online privacy issues
» De-identifying and anonymizing personally identifiable information
» Cloud computing

CIPT Certification Training – Course Syllabus

Fundamentals of Information Privacy:

1. Common Principles and Approaches to Privacy

Modern History of Privacy
Types of Information
Risk Management Overview
Modern Privacy Principles

2. Jurisdictions and Industries

Major Privacy Models around the Globe
Privacy Regulation by Jurisdictions
Privacy Regulation by Industry Sectors

3. Information Security: Safeguarding Personal Information

Information Security
Threats and Vulnerabilities
Information Security Management and Governance
Identity and Access Management (IAM)

4. Online Privacy: Using Personal Information and Websites and Other Internet-Related Technologies

Privacy Considerations for Sensitive Online Information
Authentication Identification
Data Collection
Additional Online Privacy
Children’s Online Privacy
Online Data Collection
Online Marketing and Advertising
Social Media
Online Assurance
Cloud Computing
Mobile Devices
Privacy in Technology:

5. The Need for Privacy in the IT Environment

IT Department Impacts
Regulatory Activities
Security Threats
Advances in Technology
Proliferation of Social Networks

6. Core Privacy Concepts

Attainable Privacy Compliance
Information Lifecycle Plans
Data Identification and Classification Systems
Data Flow Diagrams

7. Regulations and Standards

Privacy Laws, Regulations, and Standards

8. Privacy in Systems and Applications

Risks Inherent in the IT Environment
Addressing Risks

9. De-Identifying and Anonymizing Personally Identification Information

10. Cloud Computing

Privacy and Security Concerns with Cloud Services
Standards of Use

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment