CTG
CTG Academy

Certified Information Privacy Technologist (CIPT®) - Exam included - IN PERSON

Summary

Course:
Certified Information Privacy Technologist (CIPT®) - Exam included - IN PERSON
Language:
English
Start Date:
09-12-2024
Time:
9:00 AM - 5:00 PM
Location:
CTG Belgium ( be )
Price excl. VAT:
€ 1.980
* Prices subject to VAT

day 1
09-12-2024
day 2
10-12-2024

Certified Information Privacy Technologist (CIPT®) program - the first global privacy certification for IT practitioners. This two-day training provides guidance about critical privacy concepts, strategies, and techniques and will allow you to develop the skills to secure data at all stages of IT product and service lifecycles. The CIPT program was developed by the International Association of Privacy Professionals (IAPP) in conjunction with globally recognized privacy experts. It is accredited by ANSI under ANSI/ISO 17024: 2012 and recognized worldwide through a multilateral agreement with the International Accreditation Forum (IAF).

Certified Information Privacy Technologist (CIPT®)  - Exam included - IN PERSON

Upcoming

Currently no (other) upcoming dates are planned for this course

course-details

Course Objectives

This training is a robust, interactive opportunity to learn about critical privacy concepts that are also integral to the CIPT exam.

Key topics covered include:
• Critical data protection concepts and practices that impact IT
• Consumer data protection expectations and responsibility
• How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market
• How to establish data protection practices for data collection and transfer
• How to preempt data protection issues in the Internet of Things
• How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance
• How to communicate data protection issues with partners such as management, development, marketing and legal

The CIPT credential shows you’ve got the knowledge to build your organisation’s data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. While not purely a “test prep” course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge. Both the training and the exam are based on the same body of knowledge.

Typical Audience

Anyone who builds and develops IT systems, Data Protection Officers, Chief Privacy Officers, IT Managers and Administrators, Records Managers, System Developers, IT Security specialists.

Course Prerequisites

A basic knowledge of English is required.

Course Delivery

Two full days of training provided by our IAPP certified and experienced Privacy Professionals and including the following official IAPP materials (in English):
  • Class textbooks: An Introduction to Privacy for Technology Professionals, Strategic Privacy by Design
  • Sample questions
  • Participant guide
  • CIPT Certification Exam voucher
  • Complimentary IAPP Membership (1 year) with access to the DPO Ready Toolkit and Resources

Course Administration

Pricing

€1.980 including toolkit, exam voucher and 1 year of IAPP Membership.

All prices are VAT excluded; course material and free lunch and beverages including morning and afternoon refreshments are included.

Take two IAPP training courses (CIPP/E, CIPM or CIPT combination) and receive a nice discount: 3550€ for both trainings. Please mention this combination during your subscription.

Cancellation

By Participant: If a subscribed course participant is replaced by another participant or if the public course is postponed to a later date, no cancellation costs apply. A participant or a group that fails to attend, or that cancels a course without at least 15 working days written notice prior to the course start, is liable for the full subscription cost.
By CTG: CTG reserves the right to cancel a course at any time.

Course Logistics

All classroom courses begin promptly at 9:00 am and are scheduled until 5 pm.
Please contact us if you wish further information. The standard language of each course is English.

* Prices subject to VAT

* Prices subject to VAT

Course Outlines


Module 1: Foundational principles of privacy in technology

Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks.

Module 2: The role of the technology professional in privacy

Reviews the fundamentals of privacy as they relate to the privacy technologist; describes the privacy technologist’s role in ensuring compliance with privacy requirements and meeting stakeholder privacy expectations; explores the relationship between privacy and security.

Module 3: Privacy threats and violations

Identifies inherent risks throughout the stages of the data life cycle and explores how software security helps mitigate privacy threats; examines the impacts that behavioral advertising, cyberbullying and social engineering have on privacy within the technological environment.

Module 4: Technical measures and privacy-enhancing technologies

Outlines the strategies and techniques for enhancing privacy throughout the data life cycle, including: identity and access management; authentication, encryption, and aggregation; collection and use of personal information.

Module 5: Privacy engineering

Explores the role of privacy engineering within an organization, including the objectives of privacy engineering, privacy design patterns, and software privacy risks.

Module 6: Privacy-by-design methodology

Illustrates the process and methodology of the privacy-by-design model; explores practices to ensure ongoing vigilance when implementing privacy by design.

Module 7: Technology challenges for privacy

Examines the unique challenges that come from online privacy issues, including automated decision making, tracking and surveillance technologies, anthropomorphism, ubiquitous computing and mobile social computing.

Module 8: Technologies with Privacy Considerations

Describes specific privacy considerations associated with a variety of technologies including cloud computing, wireless IDs, location-based services, “smart” technologies, video/data/audio surveillance, and biometric recognition.

Meet our trainers

CTG's trainers are experts in their domain and bring the course content based on their experience. Meet some of our trainers below.

26023
Trainings Done
4954
Happy People
192354
Hours of Training
32460
Cups of Coffee

Contact

Europe

CTG Belgium NV

Culliganlaan 1D
1831 DIEGEM
Belgium
phone: +32 2 720 51 70
fax: +32 2 725 09 20

North-America

Buffalo,New York
300 Corporate Parkway
Suite 214N
Amherst, NY 14226
phone: +1 716 882 8000
fax: +1 716 887 7464

Cookie Settings