CIPT: Certified Information Privacy Technologist (CIPT)
Your IAPP CIPT exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CIPT certification test. Ace your IAPP CIPT at the first attempt and obtain the Certified Information Privacy Technologist (CIPT) credential with ease.
Curriculum for CIPT Video Course
Understanding the need for privacy in IT environment
Video Name | Time | |
---|---|---|
1. Evolving compliance requirements | 04:24 | |
2. Major Risks to a Company's IT Framework | 11:28 | |
3. Stakeholder expectations for privacy | 04:49 | |
4. Privacy vs Security | 03:52 | |
5. IT Governance vs Data Governance | 01:56 |
Video Name | Time | |
---|---|---|
1. Foundational elements for embedding privacy in IT (1) | 11:16 | |
2. Foundational elements for embedding privacy in IT (2) | 04:28 | |
3. Common Privacy Principles | 03:22 |
Video Name | Time | |
---|---|---|
1. Collection | 08:03 | |
2. Use | 07:18 | |
3. Disclosure | 04:47 | |
4. Retention | 07:00 | |
5. Destruction | 04:44 | |
6. Authentication techniques | 09:07 | |
7. Identifiability | 09:42 |
Video Name | Time | |
---|---|---|
1. Identity and Access Management (IAM) | 09:28 | |
2. Credit card information & processing | 06:48 | |
3. Remote access, telecommuting and bridging devices to work | 05:45 | |
4. Data Encryption | 08:24 | |
5. Other Privacy enhancing technologies | 04:33 |
Video Name | Time | |
---|---|---|
1. GDPR short overview | 02:49 | |
2. Format and Definitions | 03:06 | |
3. Principles | 01:13 |
Video Name | Time | |
---|---|---|
1. Where do privacy and HR meet? | 04:30 | |
2. More difficult to rely on Consent | 03:59 | |
3. Data Protection Principles from HR perspective | 06:26 | |
4. Consent_no_longer_an_option_for_HR | 04:10 | |
5. Legitimate interests | 04:49 | |
6. Pseudonymisation | 02:56 | |
7. Cross Border HR Data Transfers under GDPR | 02:42 | |
8. Changes to employee data management under GDPR | 04:28 | |
9. DPOs and DPIAs from HR perspective | 03:28 | |
10. Data Breaches & what to take away from that | 05:10 | |
11. Action Steps from HR perspective | 04:35 | |
12. HR related policies and procedures | 03:59 | |
13. Contracts of employment - what to look for | 03:47 | |
14. Data Protection Policy | 08:36 | |
15. GDPR terms and how they relate to recruiting? | 04:51 | |
16. Map your recruiting data | 02:25 | |
17. Create a privacy policy for recruiting | 02:54 | |
18. Source candidates online with care | 02:44 | |
19. Ensure you job application process complies with GDPR | 05:43 | |
20. Ensure your software vendors are compliant | 04:24 |
Video Name | Time | |
---|---|---|
1. Cloud and GDPR Concerns | 05:41 | |
2. Looking at GDPR the right way | 04:41 | |
3. Controllers and Processors | 08:44 | |
4. CSP as a processor and GDPR | 03:33 | |
5. Technical and Organisational measures | 5:00 | |
6. Subcontracting | 05:48 | |
7. Detailed impact on cloud contracts | 04:26 | |
8. Clauses between a processor and a sub-processor | 06:05 | |
9. Codes of conduct, certifications and compliance | 03:20 | |
10. Important steps to compliance | 00:49 | |
11. Choosing a hosting provider | 02:20 | |
12. What businesses need to do | 01:41 | |
13. Software and CSPs to consider - part 1 | 07:27 | |
14. Software and CSPs to consider - part 2 | 10:04 | |
15. Software and CSPs to consider - part 3 | 10:40 | |
16. Software and CSPs to consider - part 4 | 06:49 | |
17. Advices for CSPs and Software providers | 03:41 | |
18. GDPR and IoT approach | 04:50 | |
19. There is far more in this space | 02:39 | |
20. GDPR requirements in an IoT context | 06:17 | |
21. Robots, AI, IoT and BigData | 5:00 |
Video Name | Time | |
---|---|---|
1. What is PSD 2 and main objectives | 04:18 | |
2. Benefits for consumers | 07:08 | |
3. Scope of PSD2 directive | 02:55 | |
4. New rules on authorisation and supervision | 05:26 | |
5. New types of service providers - TPPs | 06:41 | |
6. Impact of PSD2 to financial services industry | 04:29 | |
7. New risks associated with the TPPs | 06:48 | |
8. Banks are caught between GDPR and PSD2 | 06:03 | |
9. Other challenges - GDPR and PSD2 | 06:07 | |
10. What is Open Banking Consent Model | 04:17 | |
11. Consent Step | 02:38 | |
12. Authentication Step | 01:05 | |
13. Authorisation Step | 02:14 | |
14. Redirection | 01:29 | |
15. Data Minimisation & Permissions | 01:55 |
Video Name | Time | |
---|---|---|
1. What you will going to see in this section | 03:31 | |
2. Identity Protection demo (AAD IP) | 12:37 | |
3. Privileged Identity Management demo (PIM) | 07:00 | |
4. Mobile Productivity policies demo (Intune) | 17:32 | |
5. Classification, Labelling and Protection of Information demo (AIP) | 09:28 | |
6. Cloud application visibility and security demo (Cloud App Sec) | 12:31 | |
7. Security in cloud infrastructure environment demo | 11:28 | |
8. Defending and remediating endpoints from cloud demo | 09:15 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals