CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Understanding the need for privacy in IT environment
-
1. Evolving compliance requirements4m 24s
-
2. Major Risks to a Company's IT Framework11m 28s
-
3. Stakeholder expectations for privacy4m 49s
-
4. Privacy vs Security3m 52s
-
5. IT Governance vs Data Governance1m 56s
Core Privacy Concepts
-
1. Foundational elements for embedding privacy in IT (1)11m 16s
-
2. Foundational elements for embedding privacy in IT (2)4m 28s
-
3. Common Privacy Principles3m 22s
Privacy Considerations & Techniques
-
1. Collection8m 3s
-
2. Use7m 18s
-
3. Disclosure4m 47s
-
4. Retention7m
-
5. Destruction4m 44s
-
6. Authentication techniques9m 7s
-
7. Identifiability9m 42s
Privacy in Systems and Applications
-
1. Identity and Access Management (IAM)9m 28s
-
2. Credit card information & processing6m 48s
-
3. Remote access, telecommuting and bridging devices to work5m 45s
-
4. Data Encryption8m 24s
-
5. Other Privacy enhancing technologies4m 33s
GDPR Implementation - short intro guide!
-
1. GDPR short overview2m 49s
-
2. Format and Definitions3m 6s
-
3. Principles1m 13s
Lawful Processing of HR Data, Contracts & Recruiting
-
1. Where do privacy and HR meet?4m 30s
-
2. More difficult to rely on Consent3m 59s
-
3. Data Protection Principles from HR perspective6m 26s
-
4. Consent_no_longer_an_option_for_HR4m 10s
-
5. Legitimate interests4m 49s
-
6. Pseudonymisation2m 56s
-
7. Cross Border HR Data Transfers under GDPR2m 42s
-
8. Changes to employee data management under GDPR4m 28s
-
9. DPOs and DPIAs from HR perspective3m 28s
-
10. Data Breaches & what to take away from that5m 10s
-
11. Action Steps from HR perspective4m 35s
-
12. HR related policies and procedures3m 59s
-
13. Contracts of employment - what to look for3m 47s
-
14. Data Protection Policy8m 36s
-
15. GDPR terms and how they relate to recruiting?4m 51s
-
16. Map your recruiting data2m 25s
-
17. Create a privacy policy for recruiting2m 54s
-
18. Source candidates online with care2m 44s
-
19. Ensure you job application process complies with GDPR5m 43s
-
20. Ensure your software vendors are compliant4m 24s
GDPR for Cloud Service Providers (CSPs)
-
1. Cloud and GDPR Concerns5m 41s
-
2. Looking at GDPR the right way4m 41s
-
3. Controllers and Processors8m 44s
-
4. CSP as a processor and GDPR3m 33s
-
5. Technical and Organisational measures5m
-
6. Subcontracting5m 48s
-
7. Detailed impact on cloud contracts4m 26s
-
8. Clauses between a processor and a sub-processor6m 5s
-
9. Codes of conduct, certifications and compliance3m 20s
-
10. Important steps to compliance49s
-
11. Choosing a hosting provider2m 20s
-
12. What businesses need to do1m 41s
-
13. Software and CSPs to consider - part 17m 27s
-
14. Software and CSPs to consider - part 210m 4s
-
15. Software and CSPs to consider - part 310m 40s
-
16. Software and CSPs to consider - part 46m 49s
-
17. Advices for CSPs and Software providers3m 41s
-
18. GDPR and IoT approach4m 50s
-
19. There is far more in this space2m 39s
-
20. GDPR requirements in an IoT context6m 17s
-
21. Robots, AI, IoT and BigData5m
GDPR and Payment Services Directive (PSD2)
-
1. What is PSD 2 and main objectives4m 18s
-
2. Benefits for consumers7m 8s
-
3. Scope of PSD2 directive2m 55s
-
4. New rules on authorisation and supervision5m 26s
-
5. New types of service providers - TPPs6m 41s
-
6. Impact of PSD2 to financial services industry4m 29s
-
7. New risks associated with the TPPs6m 48s
-
8. Banks are caught between GDPR and PSD26m 3s
-
9. Other challenges - GDPR and PSD26m 7s
-
10. What is Open Banking Consent Model4m 17s
-
11. Consent Step2m 38s
-
12. Authentication Step1m 5s
-
13. Authorisation Step2m 14s
-
14. Redirection1m 29s
-
15. Data Minimisation & Permissions1m 55s
How Technology can help in achieving GDPR compliance
-
1. What you will going to see in this section3m 31s
-
2. Identity Protection demo (AAD IP)12m 37s
-
3. Privileged Identity Management demo (PIM)7m
-
4. Mobile Productivity policies demo (Intune)17m 32s
-
5. Classification, Labelling and Protection of Information demo (AIP)9m 28s
-
6. Cloud application visibility and security demo (Cloud App Sec)12m 31s
-
7. Security in cloud infrastructure environment demo11m 28s
-
8. Defending and remediating endpoints from cloud demo9m 15s