Our next webinar "AI and Privacy: Navigating Data Protection for DPOs in the Age of AI" is March 8th! Register Now!
Certified Information Privacy Technologist
This training is an opportunity to learn about critical privacy concepts that are also integral to the CIPM exam. While not purely a “test prep” course, this training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge. Both the training and the exam are based on the same body of knowledge
What’s included
feature
Interactive live online, training
feature
Follow up course material
feature
Sample exam questions and answers
feature
1-year IAPP membership
feature
IAPP exam voucher
ORGANISER
Shaab Al- baghdadi
Shaab Al- baghdadi

(CIPPE, CIPM, CIPT, CDPO, CLPI Certified, F. Inst. D)

DETAILS
Dates:

Please contact us for dates

Need Custom Dates? Please state the dates in the registration form

Cost:

€1950 (Ex. VAT)

venue:

Online

Module & Course Breakdown

1 Sections Modules 2 hours total length

Foundational principles of privacy in technology

Module 115 min

Summarizes the foundational elements for embedding privacy in technology through privacy by design and value-sensitive design; reviews the data life cycle and common privacy risk models and frameworks

The role of the technology professional in privacy

Module 215 min

Introduces key European data protection laws and regulatory bodies, describing the evolution toward a harmonised legislative framework

Privacy threats and violations

Module 315 min

Introduces key European data protection laws and regulatory bodies, describing the evolution toward a harmonised legislative framework

Technical measures and privacy-enhancing technologies

Module 430 min

In this module we will show how a growing dependence on technology – whether it’s at home, work or school – demands greater security online. You'll also learn the technical terms you should be aware of in the cyber world!

Privacy engineering

Module 525 min

In this module we will show how a growing dependence on technology – whether it’s at home, work or school – demands greater security online. You'll also learn the technical terms you should be aware of in the cyber world!

Privacy-by-design methodology

Module 61hr 15 min

In this module we will show how a growing dependence on technology – whether it’s at home, work or school – demands greater security online. You'll also learn the technical terms you should be aware of in the cyber world!

Technology challenges for privacy

Module 715 min

In this module we will show how a growing dependence on technology – whether it’s at home, work or school – demands greater security online. You'll also learn the technical terms you should be aware of in the cyber world!
Square-dots
Saab Logo
Seal Logo
Certa Ireland Logo
Hush Logo
Corinthia Logo