IAPP CIPT Certified Information Privacy Technologist
The Certified Information Privacy Technologist (CIPT) is the first and only certification of its kind worldwide. It was launched by the International Association of Privacy Professionals (IAPP) in 2014 to meet the growing need that only tech pros can fill – securing data privacy at all stages of IT product and service lifecycles.
The CIPT credential shows you’ve got the knowledge to build your organization’s data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger.
Course Key Learnings
- Critical data protection concepts and practices that impact IT
- Consumer data protection expectations and responsibility
- How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
- How to establish data protection practices for data collection and transfer
- How to preempt data protection issues in the Internet of Things
- How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance
Course Outline
Foundational Principles in Technology
- Apply privacy risk models and frameworks.
- Employ value-sensitive design principles in product development.
- Understand the data lifecycle.
The Tech Pro’s Role in Privacy
- Comprehend the fundamentals of privacy-related technology.
- Detail the privacy-technology relationship.
- Understand the technologist’s privacy responsibilities.
- Employ privacy by design principles.
Neutralizing Threats and Enhancing Privacy
- Recognize privacy threats and violations in the data lifecycle.
- Understand privacy risks associated with intrusions, decisional-interference and self- representation.
- Secure software.
- Apply privacy-enhancing technologies and strategies.
Privacy Engineering
- Identify privacy objectives.
- Spot privacy risks in software.
- Apply privacy design patterns.
Technological Challenges for Privacy
- Identify privacy risks of automated decision making.
- Understand privacy impacts of tracking and surveillance.
- Recognize privacy concerns of anthropomorphism, ubiquitous computing, and mobile social computing.
Who this course is for:
- Certified Information Privacy Technologist
Your FREE eLEARNING Courses (Click Here)
International Student Fee : 1,000 USD
Flexible Class Options
- Corporate BootCamps | Evening Classes | Fast-Track
- Week End Classes For Professionals SAT | SUN
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
Offensive Security Certified Professional (OSCP)
Ethical Hacking Course
Certified Information Security Manager (CISM)
CISA: Certified Information Systems Auditor Exam
Penetration Testing Certificate Training Services
ISO 27001 Information Security Management Systems – ISMS
ISO 27017-Information Security Controls for Cloud Services
ISO 22301 – ISMS Lead Auditor