Certified Information Privacy Professional/United States (CIPP/US) Video Course

CIPP-US: Certified Information Privacy Professional/United States (CIPP/US)

Your IAPP CIPP-US exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CIPP-US certification test. Ace your IAPP CIPP-US at the first attempt and obtain the Certified Information Privacy Professional/United States (CIPP/US) credential with ease.

# of Students
137
# of Lectures
131
Course Length
18 h
Course Rating
5.0

Curriculum for CIPP-US Video Course

Course Introduction: CIPP/US Masterclass

  Video Name Time
1. Why should you take this CIPP/US course? 3:58
2. What is the CIPP/US certificate? 7:15
3. What is the IAPP? 1:57
4. Why pursue a career in privacy? 10:55
5. Why get CIPP/US certified? 4:07
6. What is privacy? 14:05
7. What do privacy professionals do? 8:55
  Video Name Time
1. Branches of the U.S. Government 4:50
2. The U.S. Constitution and Privacy 9:50
3. Sources of U.S. Law 9:08
4. Legal Definitions 5:07
5. Where do privacy protections come from? 9:27
6. The Fair Information Practices (FIPs) 9:26
7. Global Interpretations of the FIPs 7:22
8. How to Analyze a Law Part 1 7:10
9. How to Analyze a Law Part 2 4:06
10. What is a regulatory authority? 7:19
11. Types of Privacy Risk 7:09
12. What is a data inventory? 12:22
13. How to Build a Privacy Program 13:01
14. Drafting, Reviewing, and Updating Privacy Policies 13:25
15. Managing User Privacy Preferences Part 1 8:10
16. Managing User Privacy Preferences Part 2 8:33
17. Internet Terminology for Privacy Pros Part 1 8:58
18. Internet Terminology for Privacy Pros Part 2 16:18
19. Online Cookies 6:37
20. The CIA Triad 7:45
21. Types of Privacy Attacks 9:16
22. Safeguarding Privacy 8:58
23. Children's Privacy 5:50
24. Data Collection and Use 14:32
25. Online Advertising Part 1 11:27
26. Online Advertising Part 2 12:30
27. Other Online Tracking Mechanisms 6:53
28. Vendor Management 10:36
29. A History of EU-US Data Transfer Frameworks 8:26
30. What is the GDPR? 10:04
31. The 7 GDPR Principles 6:35
32. GDPR Data Subject Rights 10:18
33. GDPR Enforcement and Breach Response 7:56
  Video Name Time
1. What is the FTC? Part 1 8:49
2. What is the FTC? Part 2 7:56
3. The FTC's Approach to Privacy 13:40
4. FTC Enforcement Case Studies 9:08
5. Children's Online Privacy Protection Act (COPPA) 6:04
6. Moore and Asimov's Laws 5:51
7. What is Big Data? 14:19
8. The Internet of Things (IoT) 13:20
9. Medical Privacy 5:14
10. What is HIPAA? 11:02
11. The HIPAA Privacy Rule 10:18
12. HIPAA Privacy Rule and Reproductive Health 10:18
13. The HIPAA Security Rule 9:29
14. The Health Information Technology for Economic and Clinical Health (HITECH) Act 11:17
15. 42 CFR part 2 11:09
16. The Genetic Information Nondiscrimination Act (GINA) 5:47
17. The 21st Century Cures Act 3:20
18. The Fair Credit Reporting Act (FCRA) 14:41
19. FCRA Notice and Disclosure 7:19
20. Other FCRA Requirements 7:17
21. The Fair and Accurate Credit Transaction Act (FACTA) 11:31
22. The Gramm-Leach-Bliley Act (GLBA) 10:59
23. GLBA Privacy Notices and the Safeguards Rule 10:16
24. California and New York GLBA Expansions 11:15
25. The Dodd-Frank Wall Street Reform and Consumer Protection Act 5:31
26. The Family Educational Rights and Privacy Act (FERPA) 9:45
27. FERPA Student Rights and Disclosure 9:47
28. FERPA and Other Laws 6:03
29. Education Technology 4:03
30. Telemarketing Regulations 7:27
31. Telemarketing Sales Rule (TSR) Restrictions 13:36
32. The Do Not Call (DNC) Registry 9:34
33. The Junk Fax Prevention Act and CAN-SPAM 9:26
34. CAN-SPAM and Mobile Service Commercial Messages (MSCM) 4:46
35. Customer Proprietary Network Information (CPNI) 6:08
36. Cable Communications Policy Act & Video Privacy Protection Act 12:09
37. Digital Advertising 8:42
38. Data Ethics 18:46
39. The Driver's Privacy Protection Act (DPPA) 2:24
  Video Name Time
1. The Fourth Amendment 5:31
2. Beyond the Fourth Amendment 5:51
3. The Bank Secrecy Act (BSA) 10:27
4. BSA Expansion Laws 3:22
5. Five Important Wiretap Laws 6:33
6. Telephone, Oral, Electronic, and Video Surveillance 9:01
7. Communications Assistance for Law Enforcement Act (CALEA) 4:25
8. The Foreign Intelligence Surveillance Act (FISA) 10:18
9. National Security and Privacy 14:15
10. The Cybersecurity Information Sharing Act (CISA) 6:33
11. Civil Litigation and Public Access 12:00
12. Required, Permitted, and Prohibited Disclosures 13:46
13. The Privacy Protection Act (PPA) 4:22
14. Electronic Discovery 9:29
15. Transborder Data Flows 6:15
16. The CLOUD Act 6:29
  Video Name Time
1. Introduction to Workplace Privacy 6:26
2. Laws Protecting Employee Privacy 6:24
3. Agencies Protecting Employee Privacy 3:50
4. Human Resources and Privacy 3:59
5. Privacy and the Employment Lifecycle 5:40
6. Background Screening and Anti-discrimination 9:08
7. The Americans with Disabilities Act (ADA) and Medical Screening 5:49
8. FCRA Employment Screening Restrictions 10:43
9. Polygraphs and Drug Testing 8:43
10. Workplace Monitoring 11:06
11. Monitoring Technologies 11:07
12. Employee Misconduct Investigations 4:18
13. After Employment Best Practices 2:53
  Video Name Time
1. California Privacy Protection Agency (CPPA) 3:07
2. Safeguarding Social Security Numbers 3:15
3. Data Destruction 8:47
4. CIA Triad (Review) 5:19
5. California Information Security Law (AB 1950) 6:38
6. Other State Information Security Laws 8:59
7. Illinois' Biometric Information Privacy Act (BIPA) 9:36
8. California Consumer Privacy Act (CCPA) - Scope 5:41
9. California Consumer Privacy Act (CCPA) - Definitions 6:34
10. California Consumer Privacy Act (CCPA) - Consumer Rights 6:01
11. California Consumer Privacy Act (CCPA) - Data Breaches and Enforcement 4:29
12. Recent State Developments 14:42
13. Key Terms Part 1: Business 8:07
14. Key Terms Part 2: Consumer and Personal Information 6:40
15. Key Terms Part 3: Sale 3:50
16. State Laws and Consumer Rights 7:16
17. State Laws and Business Obligations 5:56
18. State Laws Enforcement and Penalties 5:38
19. California Age-Appropriate Design Code Act 1:18
20. Data Breach Incident Response Management 14:25
21. Office of Management and Budget (OMB) M-17-12 4:39
22. State Breach Notification Laws Part 1 7:35
23. State Breach Notification Laws Part 2 11:52

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Databricks
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Oracle
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • IAPP
Next Step
Next Step