Price Reduction   |   Now £1450 for IAPP's CIPP/E and CIPM 'Online Instructor-Led' Courses   |   Offer Ending Soon!
 

Shop

 

THE IAPP (CIPT)

Certified Information Privacy Technologist

Virtual Instructor Led Course

Online Instructor Led (Live)
10 Modules
Covered in 13 hours
Over 4 days

Thank you very much …, this was one of the best learning experiences in the last couple of years!

Elena O, IT Program Manager, Prague

I enjoyed the atmosphere. As a small class size of 3 attendees, we had all the trainer’s focus.

IT Project Manager, Budapest

The practice exam questions were very helpful in facilitating the way to think.

Attorney @ Law, Benei Brak

I took the examination and passed it at the first attempt. I will attribute this achievement to the thorough and practical teaching method you apply in teaching and preparing me and other candidates for the exam. Thank you!

Hilary Emmanuel, London

I was very satisfied with the course in general … the trainer gave expected answers to my questions every time and very quickly … she gave me tips on how to tackle.

Masahiko D, Brussels

Browse Courses by Category

Browse Courses by Category

DATE: 23 November - 26 November

TIME: 9:00 am - 12:15 pm (GMT)

LOCATION: Anywhere

0 places left

Overview

 

The Certified Information Privacy Technologist (CIPT) certifies individuals in their knowledge of privacy-related issues and practices in the context of the design and implementation of information and communication technologies.

At AllNet Law we strive to give our delegates the hands-on experience and do not just focus on the knowledge and exam techniques. Our comprehensive style of delivery provides you with the practical application and invaluable insight to Data Privacy and Compliance in the real world.

Each course includes:

  • 13 hours of instructor-led training
  • 1 hour mock exam
  • Electronic copy of IAPP course textbook – An Introduction to Privacy for Technology Professionals and Strategic Privacy by Design
  • Course notes and handouts to support you in the course and beyond
  • Sample course exam questions and answers
  • 12-month IAPP membership
    (for existing IAPP members, your membership will be extended by 12 months)
  • Exam voucher
    (The IAPP offers computer-based certification exams. The exam can be taken at home, work or at a testing centre local to you. There is a 12-month window to schedule exams).

Course Outline

At the end of the sessions, delegates would have gained knowledge of:

Module 1: Foundational principles of privacy in technology

Summarises the foundational elements for embedding privacy in technology through privacy by design and value sensitive design; reviews the data life cycle and common privacy risk models and frameworks

Module 2: The role of the technology professional in privacy

Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security

Module 3: Privacy threats and violations

Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioural advertising, cyberbullying and social engineering have on privacy within the technological environment

Module 4: Technical measures and privacy-enhancing technologies

Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information

Module 5: Privacy engineering

Explores the role of privacy engineering within an organisation, including the objectives of privacy engineering, privacy design patterns, and software privacy risks

Module 6: Privacy-by-design methodology

Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design

Module 7: Technology challenges for privacy

Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing

 

We provide delegates with the specialist training and tools to pass the CIPT qualification. All courses are taught by qualified practitioners with commercial experience. 

 

Exam and Certification

 

On completion of the course, delegates would have gained the knowledge and skills required to take the CIPT- Certified Information Privacy Technologist certification exam.

(Cost includes exam registration fees and the IAPP professional membership)

 

Additional Skills/Experience

There are no prerequisites for this course. But it is highly recommended that you should either already be already involved with data protection processes and programmes:

  • IT Security Managers
  • Information Managers
  • Data Protection Officers
  • Data Protection Managers
  • Legal Compliance Officers
  • Auditors

 

0 places left

Categories: , ,
Online Instructor Led (Live)
10 Modules
Covered in 13 hours
Over 4 days


DATE: 23 November - 26 November

TIME: 9:00 am - 12:15 pm (GMT)

LOCATION: Anywhere

£1,650.00

0 places left

Categories: , ,

Overview

 

The Certified Information Privacy Technologist (CIPT) certifies individuals in their knowledge of privacy-related issues and practices in the context of the design and implementation of information and communication technologies.

At AllNet Law we strive to give our delegates the hands-on experience and do not just focus on the knowledge and exam techniques. Our comprehensive style of delivery provides you with the practical application and invaluable insight to Data Privacy and Compliance in the real world.

Each course includes:

  • 13 hours of instructor-led training
  • 1 hour mock exam
  • Electronic copy of IAPP course textbook – An Introduction to Privacy for Technology Professionals and Strategic Privacy by Design
  • Course notes and handouts to support you in the course and beyond
  • Sample course exam questions and answers
  • 12-month IAPP membership
    (for existing IAPP members, your membership will be extended by 12 months)
  • Exam voucher
    (The IAPP offers computer-based certification exams. The exam can be taken at home, work or at a testing centre local to you. There is a 12-month window to schedule exams).

Course Outline

At the end of the sessions, delegates would have gained knowledge of:

Module 1: Foundational principles of privacy in technology

Summarises the foundational elements for embedding privacy in technology through privacy by design and value sensitive design; reviews the data life cycle and common privacy risk models and frameworks

Module 2: The role of the technology professional in privacy

Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security

Module 3: Privacy threats and violations

Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioural advertising, cyberbullying and social engineering have on privacy within the technological environment

Module 4: Technical measures and privacy-enhancing technologies

Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information

Module 5: Privacy engineering

Explores the role of privacy engineering within an organisation, including the objectives of privacy engineering, privacy design patterns, and software privacy risks

Module 6: Privacy-by-design methodology

Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design

Module 7: Technology challenges for privacy

Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing

 

We provide delegates with the specialist training and tools to pass the CIPT qualification. All courses are taught by qualified practitioners with commercial experience. 

 

Exam and Certification

 

On completion of the course, delegates would have gained the knowledge and skills required to take the CIPT- Certified Information Privacy Technologist certification exam.

(Cost includes exam registration fees and the IAPP professional membership)

 

Additional Skills/Experience

There are no prerequisites for this course. But it is highly recommended that you should either already be already involved with data protection processes and programmes:

  • IT Security Managers
  • Information Managers
  • Data Protection Officers
  • Data Protection Managers
  • Legal Compliance Officers
  • Auditors

 


£1,650.00

0 places left

Thank you very much …, this was one of the best learning experiences in the last couple of years!

Elena O, IT Program Manager, Prague

I enjoyed the atmosphere. As a small class size of 3 attendees, we had all the trainer’s focus.

IT Project Manager, Budapest

The practice exam questions were very helpful in facilitating the way to think.

Attorney @ Law, Benei Brak

I took the examination and passed it at the first attempt. I will attribute this achievement to the thorough and practical teaching method you apply in teaching and preparing me and other candidates for the exam. Thank you!

Hilary Emmanuel, London

I was very satisfied with the course in general … the trainer gave expected answers to my questions every time and very quickly … she gave me tips on how to tackle.

Masahiko D, Brussels

Browse Courses by Category

Browse Courses by Category