Certified Information Privacy Technologist training course
The Certified Information Privacy Technologist (CIPT) is the first and only certification of its kind worldwide. It was launched by the International Association of Privacy Professionals (IAPP) in 2014 to meet the growing need that only tech pros can fill - securing data privacy at all stages of IT product and service lifecycles.
The CIPT credential shows you’ve got the knowledge to build your organization’s data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger.
Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have.
The CIPT certification also holds accreditation under ISO 17024: 2012.
Who should attend?
This course is designed for individuals with some experience in information security, whose work relates to the processing of personal data, including:
- Data Protection Officers
- IT Managers and Administrators
- Record Managers
- System Developers
- IT Security Specialists
- Anyone who builds and develops IT systems
What will I learn?
Critical data protection concepts and practices that impact IT
Consumer data protection expectations and responsibility
How to bake privacy into early stages of IT products and services for cost control, accuracy
How to establish data protection practices for data collection and transfer
How to preempt data protection issues in the Internet of Things
How to factor data protection into data classification and emerging tech such as cloud
computing, facial recognition and surveillance
How to communicate data protection issues with partners such as management, development,
marketing and legal
How will I benefit?
Be recognized as a leading professional in information security
Gain the confidence to interpret privacy regulations and ensure best practice techniques are embedded into your IT infrastructure
Greater ability to identify potential impacts of privacy on IT products and services at the beginning
of their lifecycle
What is included?
Comprehensive course notes
A certificate of attendance