CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Understanding the need for privacy in IT environment

  • 1. Evolving compliance requirements
    4m 24s
  • 2. Major Risks to a Company's IT Framework
    11m 28s
  • 3. Stakeholder expectations for privacy
    4m 49s
  • 4. Privacy vs Security
    3m 52s
  • 5. IT Governance vs Data Governance
    1m 56s

Core Privacy Concepts

  • 1. Foundational elements for embedding privacy in IT (1)
    11m 16s
  • 2. Foundational elements for embedding privacy in IT (2)
    4m 28s
  • 3. Common Privacy Principles
    3m 22s

Privacy Considerations & Techniques

  • 1. Collection
    8m 3s
  • 2. Use
    7m 18s
  • 3. Disclosure
    4m 47s
  • 4. Retention
    7m
  • 5. Destruction
    4m 44s
  • 6. Authentication techniques
    9m 7s
  • 7. Identifiability
    9m 42s

Privacy in Systems and Applications

  • 1. Identity and Access Management (IAM)
    9m 28s
  • 2. Credit card information & processing
    6m 48s
  • 3. Remote access, telecommuting and bridging devices to work
    5m 45s
  • 4. Data Encryption
    8m 24s
  • 5. Other Privacy enhancing technologies
    4m 33s

GDPR Implementation - short intro guide!

  • 1. GDPR short overview
    2m 49s
  • 2. Format and Definitions
    3m 6s
  • 3. Principles
    1m 13s

Lawful Processing of HR Data, Contracts & Recruiting

  • 1. Where do privacy and HR meet?
    4m 30s
  • 2. More difficult to rely on Consent
    3m 59s
  • 3. Data Protection Principles from HR perspective
    6m 26s
  • 4. Consent_no_longer_an_option_for_HR
    4m 10s
  • 5. Legitimate interests
    4m 49s
  • 6. Pseudonymisation
    2m 56s
  • 7. Cross Border HR Data Transfers under GDPR
    2m 42s
  • 8. Changes to employee data management under GDPR
    4m 28s
  • 9. DPOs and DPIAs from HR perspective
    3m 28s
  • 10. Data Breaches & what to take away from that
    5m 10s
  • 11. Action Steps from HR perspective
    4m 35s
  • 12. HR related policies and procedures
    3m 59s
  • 13. Contracts of employment - what to look for
    3m 47s
  • 14. Data Protection Policy
    8m 36s
  • 15. GDPR terms and how they relate to recruiting?
    4m 51s
  • 16. Map your recruiting data
    2m 25s
  • 17. Create a privacy policy for recruiting
    2m 54s
  • 18. Source candidates online with care
    2m 44s
  • 19. Ensure you job application process complies with GDPR
    5m 43s
  • 20. Ensure your software vendors are compliant
    4m 24s

GDPR for Cloud Service Providers (CSPs)

  • 1. Cloud and GDPR Concerns
    5m 41s
  • 2. Looking at GDPR the right way
    4m 41s
  • 3. Controllers and Processors
    8m 44s
  • 4. CSP as a processor and GDPR
    3m 33s
  • 5. Technical and Organisational measures
    5m
  • 6. Subcontracting
    5m 48s
  • 7. Detailed impact on cloud contracts
    4m 26s
  • 8. Clauses between a processor and a sub-processor
    6m 5s
  • 9. Codes of conduct, certifications and compliance
    3m 20s
  • 10. Important steps to compliance
    49s
  • 11. Choosing a hosting provider
    2m 20s
  • 12. What businesses need to do
    1m 41s
  • 13. Software and CSPs to consider - part 1
    7m 27s
  • 14. Software and CSPs to consider - part 2
    10m 4s
  • 15. Software and CSPs to consider - part 3
    10m 40s
  • 16. Software and CSPs to consider - part 4
    6m 49s
  • 17. Advices for CSPs and Software providers
    3m 41s
  • 18. GDPR and IoT approach
    4m 50s
  • 19. There is far more in this space
    2m 39s
  • 20. GDPR requirements in an IoT context
    6m 17s
  • 21. Robots, AI, IoT and BigData
    5m

GDPR and Payment Services Directive (PSD2)

  • 1. What is PSD 2 and main objectives
    4m 18s
  • 2. Benefits for consumers
    7m 8s
  • 3. Scope of PSD2 directive
    2m 55s
  • 4. New rules on authorisation and supervision
    5m 26s
  • 5. New types of service providers - TPPs
    6m 41s
  • 6. Impact of PSD2 to financial services industry
    4m 29s
  • 7. New risks associated with the TPPs
    6m 48s
  • 8. Banks are caught between GDPR and PSD2
    6m 3s
  • 9. Other challenges - GDPR and PSD2
    6m 7s
  • 10. What is Open Banking Consent Model
    4m 17s
  • 11. Consent Step
    2m 38s
  • 12. Authentication Step
    1m 5s
  • 13. Authorisation Step
    2m 14s
  • 14. Redirection
    1m 29s
  • 15. Data Minimisation & Permissions
    1m 55s

How Technology can help in achieving GDPR compliance

  • 1. What you will going to see in this section
    3m 31s
  • 2. Identity Protection demo (AAD IP)
    12m 37s
  • 3. Privileged Identity Management demo (PIM)
    7m
  • 4. Mobile Productivity policies demo (Intune)
    17m 32s
  • 5. Classification, Labelling and Protection of Information demo (AIP)
    9m 28s
  • 6. Cloud application visibility and security demo (Cloud App Sec)
    12m 31s
  • 7. Security in cloud infrastructure environment demo
    11m 28s
  • 8. Defending and remediating endpoints from cloud demo
    9m 15s
Study4Pass does not provide real Microsoft exam questions. Similarly, Study4Pass does not supply real Amazon exam questions. The materials offered by Study4Pass lack real questions and answers from Cisco's certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of Study4Pass content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

© study4pass.com 2025. All rights reserved.