CIPT: Certified Information Privacy Technologist (CIPT) Certification Video Training Course

Best Seller 87 Lectures 8h 1m 28s
Prepare for your IAPP examination with our training course. The CIPT course contains a complete batch of videos that will provide you with profound and thorough knowledge related to IAPP certification exam. Pass the IAPP CIPT test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. Foundational elements for embedding privacy in IT (1) 11m 16s
  • 2. Foundational elements for embedding privacy in IT (2) 4m 28s
  • 3. Common Privacy Principles 3m 22s
  • 1. Collection 8m 3s
  • 2. Use 7m 18s
  • 3. Disclosure 4m 47s
  • 4. Retention 7m
  • 5. Destruction 4m 44s
  • 6. Authentication techniques 9m 7s
  • 7. Identifiability 9m 42s
  • 1. Identity and Access Management (IAM) 9m 28s
  • 2. Credit card information & processing 6m 48s
  • 3. Remote access, telecommuting and bridging devices to work 5m 45s
  • 4. Data Encryption 8m 24s
  • 5. Other Privacy enhancing technologies 4m 33s
  • 1. GDPR short overview 2m 49s
  • 2. Format and Definitions 3m 6s
  • 3. Principles 1m 13s
  • 1. Where do privacy and HR meet? 4m 30s
  • 2. More difficult to rely on Consent 3m 59s
  • 3. Data Protection Principles from HR perspective 6m 26s
  • 4. Consent_no_longer_an_option_for_HR 4m 10s
  • 5. Legitimate interests 4m 49s
  • 6. Pseudonymisation 2m 56s
  • 7. Cross Border HR Data Transfers under GDPR 2m 42s
  • 8. Changes to employee data management under GDPR 4m 28s
  • 9. DPOs and DPIAs from HR perspective 3m 28s
  • 10. Data Breaches & what to take away from that 5m 10s
  • 11. Action Steps from HR perspective 4m 35s
  • 12. HR related policies and procedures 3m 59s
  • 13. Contracts of employment - what to look for 3m 47s
  • 14. Data Protection Policy 8m 36s
  • 15. GDPR terms and how they relate to recruiting? 4m 51s
  • 16. Map your recruiting data 2m 25s
  • 17. Create a privacy policy for recruiting 2m 54s
  • 18. Source candidates online with care 2m 44s
  • 19. Ensure you job application process complies with GDPR 5m 43s
  • 20. Ensure your software vendors are compliant 4m 24s
  • 1. Cloud and GDPR Concerns 5m 41s
  • 2. Looking at GDPR the right way 4m 41s
  • 3. Controllers and Processors 8m 44s
  • 4. CSP as a processor and GDPR 3m 33s
  • 5. Technical and Organisational measures 5m
  • 6. Subcontracting 5m 48s
  • 7. Detailed impact on cloud contracts 4m 26s
  • 8. Clauses between a processor and a sub-processor 6m 5s
  • 9. Codes of conduct, certifications and compliance 3m 20s
  • 10. Important steps to compliance 49s
  • 11. Choosing a hosting provider 2m 20s
  • 12. What businesses need to do 1m 41s
  • 13. Software and CSPs to consider - part 1 7m 27s
  • 14. Software and CSPs to consider - part 2 10m 4s
  • 15. Software and CSPs to consider - part 3 10m 40s
  • 16. Software and CSPs to consider - part 4 6m 49s
  • 17. Advices for CSPs and Software providers 3m 41s
  • 18. GDPR and IoT approach 4m 50s
  • 19. There is far more in this space 2m 39s
  • 20. GDPR requirements in an IoT context 6m 17s
  • 21. Robots, AI, IoT and BigData 5m
  • 1. What is PSD 2 and main objectives 4m 18s
  • 2. Benefits for consumers 7m 8s
  • 3. Scope of PSD2 directive 2m 55s
  • 4. New rules on authorisation and supervision 5m 26s
  • 5. New types of service providers - TPPs 6m 41s
  • 6. Impact of PSD2 to financial services industry 4m 29s
  • 7. New risks associated with the TPPs 6m 48s
  • 8. Banks are caught between GDPR and PSD2 6m 3s
  • 9. Other challenges - GDPR and PSD2 6m 7s
  • 10. What is Open Banking Consent Model 4m 17s
  • 11. Consent Step 2m 38s
  • 12. Authentication Step 1m 5s
  • 13. Authorisation Step 2m 14s
  • 14. Redirection 1m 29s
  • 15. Data Minimisation & Permissions 1m 55s
  • 1. What you will going to see in this section 3m 31s
  • 2. Identity Protection demo (AAD IP) 12m 37s
  • 3. Privileged Identity Management demo (PIM) 7m
  • 4. Mobile Productivity policies demo (Intune) 17m 32s
  • 5. Classification, Labelling and Protection of Information demo (AIP) 9m 28s
  • 6. Cloud application visibility and security demo (Cloud App Sec) 12m 31s
  • 7. Security in cloud infrastructure environment demo 11m 28s
  • 8. Defending and remediating endpoints from cloud demo 9m 15s

Hot Exams

How to Open Test Engine .dumpsqueen Files

Use FREE DumpsQueen Test Engine player to open .dumpsqueen files

DumpsQueen Test Engine

Windows

 safe checkout

Your purchase with DumpsQueen.com is safe and fast.

The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?