CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Understanding the need for privacy in IT environment

  • 1. Evolving compliance requirements
    4m 24s
  • 2. Major Risks to a Company's IT Framework
    11m 28s
  • 3. Stakeholder expectations for privacy
    4m 49s
  • 4. Privacy vs Security
    3m 52s
  • 5. IT Governance vs Data Governance
    1m 56s

Core Privacy Concepts

  • 1. Foundational elements for embedding privacy in IT (1)
    11m 16s
  • 2. Foundational elements for embedding privacy in IT (2)
    4m 28s
  • 3. Common Privacy Principles
    3m 22s

Privacy Considerations & Techniques

  • 1. Collection
    8m 3s
  • 2. Use
    7m 18s
  • 3. Disclosure
    4m 47s
  • 4. Retention
    7m
  • 5. Destruction
    4m 44s
  • 6. Authentication techniques
    9m 7s
  • 7. Identifiability
    9m 42s

Privacy in Systems and Applications

  • 1. Identity and Access Management (IAM)
    9m 28s
  • 2. Credit card information & processing
    6m 48s
  • 3. Remote access, telecommuting and bridging devices to work
    5m 45s
  • 4. Data Encryption
    8m 24s
  • 5. Other Privacy enhancing technologies
    4m 33s

GDPR Implementation - short intro guide!

  • 1. GDPR short overview
    2m 49s
  • 2. Format and Definitions
    3m 6s
  • 3. Principles
    1m 13s

Lawful Processing of HR Data, Contracts & Recruiting

  • 1. Where do privacy and HR meet?
    4m 30s
  • 2. More difficult to rely on Consent
    3m 59s
  • 3. Data Protection Principles from HR perspective
    6m 26s
  • 4. Consent_no_longer_an_option_for_HR
    4m 10s
  • 5. Legitimate interests
    4m 49s
  • 6. Pseudonymisation
    2m 56s
  • 7. Cross Border HR Data Transfers under GDPR
    2m 42s
  • 8. Changes to employee data management under GDPR
    4m 28s
  • 9. DPOs and DPIAs from HR perspective
    3m 28s
  • 10. Data Breaches & what to take away from that
    5m 10s
  • 11. Action Steps from HR perspective
    4m 35s
  • 12. HR related policies and procedures
    3m 59s
  • 13. Contracts of employment - what to look for
    3m 47s
  • 14. Data Protection Policy
    8m 36s
  • 15. GDPR terms and how they relate to recruiting?
    4m 51s
  • 16. Map your recruiting data
    2m 25s
  • 17. Create a privacy policy for recruiting
    2m 54s
  • 18. Source candidates online with care
    2m 44s
  • 19. Ensure you job application process complies with GDPR
    5m 43s
  • 20. Ensure your software vendors are compliant
    4m 24s

GDPR for Cloud Service Providers (CSPs)

  • 1. Cloud and GDPR Concerns
    5m 41s
  • 2. Looking at GDPR the right way
    4m 41s
  • 3. Controllers and Processors
    8m 44s
  • 4. CSP as a processor and GDPR
    3m 33s
  • 5. Technical and Organisational measures
    5m
  • 6. Subcontracting
    5m 48s
  • 7. Detailed impact on cloud contracts
    4m 26s
  • 8. Clauses between a processor and a sub-processor
    6m 5s
  • 9. Codes of conduct, certifications and compliance
    3m 20s
  • 10. Important steps to compliance
    49s
  • 11. Choosing a hosting provider
    2m 20s
  • 12. What businesses need to do
    1m 41s
  • 13. Software and CSPs to consider - part 1
    7m 27s
  • 14. Software and CSPs to consider - part 2
    10m 4s
  • 15. Software and CSPs to consider - part 3
    10m 40s
  • 16. Software and CSPs to consider - part 4
    6m 49s
  • 17. Advices for CSPs and Software providers
    3m 41s
  • 18. GDPR and IoT approach
    4m 50s
  • 19. There is far more in this space
    2m 39s
  • 20. GDPR requirements in an IoT context
    6m 17s
  • 21. Robots, AI, IoT and BigData
    5m

GDPR and Payment Services Directive (PSD2)

  • 1. What is PSD 2 and main objectives
    4m 18s
  • 2. Benefits for consumers
    7m 8s
  • 3. Scope of PSD2 directive
    2m 55s
  • 4. New rules on authorisation and supervision
    5m 26s
  • 5. New types of service providers - TPPs
    6m 41s
  • 6. Impact of PSD2 to financial services industry
    4m 29s
  • 7. New risks associated with the TPPs
    6m 48s
  • 8. Banks are caught between GDPR and PSD2
    6m 3s
  • 9. Other challenges - GDPR and PSD2
    6m 7s
  • 10. What is Open Banking Consent Model
    4m 17s
  • 11. Consent Step
    2m 38s
  • 12. Authentication Step
    1m 5s
  • 13. Authorisation Step
    2m 14s
  • 14. Redirection
    1m 29s
  • 15. Data Minimisation & Permissions
    1m 55s

How Technology can help in achieving GDPR compliance

  • 1. What you will going to see in this section
    3m 31s
  • 2. Identity Protection demo (AAD IP)
    12m 37s
  • 3. Privileged Identity Management demo (PIM)
    7m
  • 4. Mobile Productivity policies demo (Intune)
    17m 32s
  • 5. Classification, Labelling and Protection of Information demo (AIP)
    9m 28s
  • 6. Cloud application visibility and security demo (Cloud App Sec)
    12m 31s
  • 7. Security in cloud infrastructure environment demo
    11m 28s
  • 8. Defending and remediating endpoints from cloud demo
    9m 15s