CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Understanding the need for privacy in IT environment
Lectures | Duration |
---|---|
1. Evolving compliance requirements | 4m 24s |
2. Major Risks to a Company's IT Framework | 11m 28s |
3. Stakeholder expectations for privacy | 4m 49s |
4. Privacy vs Security | 3m 52s |
5. IT Governance vs Data Governance | 1m 56s |
1. Evolving compliance requirements
4m 24s
2. Major Risks to a Company's IT Framework
11m 28s
3. Stakeholder expectations for privacy
4m 49s
4. Privacy vs Security
3m 52s
5. IT Governance vs Data Governance
1m 56s
Core Privacy Concepts
Lectures | Duration |
---|---|
1. Foundational elements for embedding privacy in IT (1) | 11m 16s |
2. Foundational elements for embedding privacy in IT (2) | 4m 28s |
3. Common Privacy Principles | 3m 22s |
1. Foundational elements for embedding privacy in IT (1)
11m 16s
2. Foundational elements for embedding privacy in IT (2)
4m 28s
3. Common Privacy Principles
3m 22s
Privacy Considerations & Techniques
Lectures | Duration |
---|---|
1. Collection | 8m 3s |
2. Use | 7m 18s |
3. Disclosure | 4m 47s |
4. Retention | 7m |
5. Destruction | 4m 44s |
6. Authentication techniques | 9m 7s |
7. Identifiability | 9m 42s |
1. Collection
8m 3s
2. Use
7m 18s
3. Disclosure
4m 47s
4. Retention
7m
5. Destruction
4m 44s
6. Authentication techniques
9m 7s
7. Identifiability
9m 42s
Privacy in Systems and Applications
Lectures | Duration |
---|---|
1. Identity and Access Management (IAM) | 9m 28s |
2. Credit card information & processing | 6m 48s |
3. Remote access, telecommuting and bridging devices to work | 5m 45s |
4. Data Encryption | 8m 24s |
5. Other Privacy enhancing technologies | 4m 33s |
1. Identity and Access Management (IAM)
9m 28s
2. Credit card information & processing
6m 48s
3. Remote access, telecommuting and bridging devices to work
5m 45s
4. Data Encryption
8m 24s
5. Other Privacy enhancing technologies
4m 33s
GDPR Implementation - short intro guide!
Lectures | Duration |
---|---|
1. GDPR short overview | 2m 49s |
2. Format and Definitions | 3m 6s |
3. Principles | 1m 13s |
1. GDPR short overview
2m 49s
2. Format and Definitions
3m 6s
3. Principles
1m 13s
Lawful Processing of HR Data, Contracts & Recruiting
Lectures | Duration |
---|---|
1. Where do privacy and HR meet? | 4m 30s |
2. More difficult to rely on Consent | 3m 59s |
3. Data Protection Principles from HR perspective | 6m 26s |
4. Consent_no_longer_an_option_for_HR | 4m 10s |
5. Legitimate interests | 4m 49s |
6. Pseudonymisation | 2m 56s |
7. Cross Border HR Data Transfers under GDPR | 2m 42s |
8. Changes to employee data management under GDPR | 4m 28s |
9. DPOs and DPIAs from HR perspective | 3m 28s |
10. Data Breaches & what to take away from that | 5m 10s |
11. Action Steps from HR perspective | 4m 35s |
12. HR related policies and procedures | 3m 59s |
13. Contracts of employment - what to look for | 3m 47s |
14. Data Protection Policy | 8m 36s |
15. GDPR terms and how they relate to recruiting? | 4m 51s |
16. Map your recruiting data | 2m 25s |
17. Create a privacy policy for recruiting | 2m 54s |
18. Source candidates online with care | 2m 44s |
19. Ensure you job application process complies with GDPR | 5m 43s |
20. Ensure your software vendors are compliant | 4m 24s |
1. Where do privacy and HR meet?
4m 30s
2. More difficult to rely on Consent
3m 59s
3. Data Protection Principles from HR perspective
6m 26s
4. Consent_no_longer_an_option_for_HR
4m 10s
5. Legitimate interests
4m 49s
6. Pseudonymisation
2m 56s
7. Cross Border HR Data Transfers under GDPR
2m 42s
8. Changes to employee data management under GDPR
4m 28s
9. DPOs and DPIAs from HR perspective
3m 28s
10. Data Breaches & what to take away from that
5m 10s
11. Action Steps from HR perspective
4m 35s
12. HR related policies and procedures
3m 59s
13. Contracts of employment - what to look for
3m 47s
14. Data Protection Policy
8m 36s
15. GDPR terms and how they relate to recruiting?
4m 51s
16. Map your recruiting data
2m 25s
17. Create a privacy policy for recruiting
2m 54s
18. Source candidates online with care
2m 44s
19. Ensure you job application process complies with GDPR
5m 43s
20. Ensure your software vendors are compliant
4m 24s
GDPR for Cloud Service Providers (CSPs)
Lectures | Duration |
---|---|
1. Cloud and GDPR Concerns | 5m 41s |
2. Looking at GDPR the right way | 4m 41s |
3. Controllers and Processors | 8m 44s |
4. CSP as a processor and GDPR | 3m 33s |
5. Technical and Organisational measures | 5m |
6. Subcontracting | 5m 48s |
7. Detailed impact on cloud contracts | 4m 26s |
8. Clauses between a processor and a sub-processor | 6m 5s |
9. Codes of conduct, certifications and compliance | 3m 20s |
10. Important steps to compliance | 49s |
11. Choosing a hosting provider | 2m 20s |
12. What businesses need to do | 1m 41s |
13. Software and CSPs to consider - part 1 | 7m 27s |
14. Software and CSPs to consider - part 2 | 10m 4s |
15. Software and CSPs to consider - part 3 | 10m 40s |
16. Software and CSPs to consider - part 4 | 6m 49s |
17. Advices for CSPs and Software providers | 3m 41s |
18. GDPR and IoT approach | 4m 50s |
19. There is far more in this space | 2m 39s |
20. GDPR requirements in an IoT context | 6m 17s |
21. Robots, AI, IoT and BigData | 5m |
1. Cloud and GDPR Concerns
5m 41s
2. Looking at GDPR the right way
4m 41s
3. Controllers and Processors
8m 44s
4. CSP as a processor and GDPR
3m 33s
5. Technical and Organisational measures
5m
6. Subcontracting
5m 48s
7. Detailed impact on cloud contracts
4m 26s
8. Clauses between a processor and a sub-processor
6m 5s
9. Codes of conduct, certifications and compliance
3m 20s
10. Important steps to compliance
49s
11. Choosing a hosting provider
2m 20s
12. What businesses need to do
1m 41s
13. Software and CSPs to consider - part 1
7m 27s
14. Software and CSPs to consider - part 2
10m 4s
15. Software and CSPs to consider - part 3
10m 40s
16. Software and CSPs to consider - part 4
6m 49s
17. Advices for CSPs and Software providers
3m 41s
18. GDPR and IoT approach
4m 50s
19. There is far more in this space
2m 39s
20. GDPR requirements in an IoT context
6m 17s
21. Robots, AI, IoT and BigData
5m
GDPR and Payment Services Directive (PSD2)
Lectures | Duration |
---|---|
1. What is PSD 2 and main objectives | 4m 18s |
2. Benefits for consumers | 7m 8s |
3. Scope of PSD2 directive | 2m 55s |
4. New rules on authorisation and supervision | 5m 26s |
5. New types of service providers - TPPs | 6m 41s |
6. Impact of PSD2 to financial services industry | 4m 29s |
7. New risks associated with the TPPs | 6m 48s |
8. Banks are caught between GDPR and PSD2 | 6m 3s |
9. Other challenges - GDPR and PSD2 | 6m 7s |
10. What is Open Banking Consent Model | 4m 17s |
11. Consent Step | 2m 38s |
12. Authentication Step | 1m 5s |
13. Authorisation Step | 2m 14s |
14. Redirection | 1m 29s |
15. Data Minimisation & Permissions | 1m 55s |
1. What is PSD 2 and main objectives
4m 18s
2. Benefits for consumers
7m 8s
3. Scope of PSD2 directive
2m 55s
4. New rules on authorisation and supervision
5m 26s
5. New types of service providers - TPPs
6m 41s
6. Impact of PSD2 to financial services industry
4m 29s
7. New risks associated with the TPPs
6m 48s
8. Banks are caught between GDPR and PSD2
6m 3s
9. Other challenges - GDPR and PSD2
6m 7s
10. What is Open Banking Consent Model
4m 17s
11. Consent Step
2m 38s
12. Authentication Step
1m 5s
13. Authorisation Step
2m 14s
14. Redirection
1m 29s
15. Data Minimisation & Permissions
1m 55s
How Technology can help in achieving GDPR compliance
Lectures | Duration |
---|---|
1. What you will going to see in this section | 3m 31s |
2. Identity Protection demo (AAD IP) | 12m 37s |
3. Privileged Identity Management demo (PIM) | 7m |
4. Mobile Productivity policies demo (Intune) | 17m 32s |
5. Classification, Labelling and Protection of Information demo (AIP) | 9m 28s |
6. Cloud application visibility and security demo (Cloud App Sec) | 12m 31s |
7. Security in cloud infrastructure environment demo | 11m 28s |
8. Defending and remediating endpoints from cloud demo | 9m 15s |
1. What you will going to see in this section
3m 31s
2. Identity Protection demo (AAD IP)
12m 37s
3. Privileged Identity Management demo (PIM)
7m
4. Mobile Productivity policies demo (Intune)
17m 32s
5. Classification, Labelling and Protection of Information demo (AIP)
9m 28s
6. Cloud application visibility and security demo (Cloud App Sec)
12m 31s
7. Security in cloud infrastructure environment demo
11m 28s
8. Defending and remediating endpoints from cloud demo
9m 15s