top of page

Certified Information Privacy Technologist (CIPT)

Certified Information Privacy Technologist (CIPT)

ABOUT THIS COURSE

The CIPT credential shows you’ve got the knowledge to build your organization’s privacy structures from the ground up. With regulators worldwide calling for tech professionals to factor data privacy into their products and services, the job market for privacy-trained IT pros has never been stronger. Do you work in IT, security, or engineering? The CIPT is for you. How about privacy by design, software engineering, data management or audit? Ditto. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have.

COURSE BENEFITS

Data privacy regulations worldwide require privacy protections be built into products and services. IAPP Privacy in Technology training, aligned with the ANAB-accredited CIPT certification program, will provide you with the knowledge to recognize privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles.

WHO SHOULD ATTEND?

Software developers, information security professionals, data architects, privacy engineers, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing.

COURSE CONTENTS

Foundational Principles in Technology

  • Apply privacy risk models and frameworks.

  • Employ value-sensitive design principles in product development.

  • Understand the data lifecycle.

The Tech Pro’s Role in Privacy

  • Comprehend the fundamentals of privacy-related technology.

  • Detail the privacy-technology relationship.

  • Understand the technologist’s privacy responsibilities.

  • Employ privacy by design principles.

Neutralizing Threats and Enhancing Privacy

  • Recognize privacy threats and violations in the data lifecycle.

  • Understand privacy risks associated with intrusions, decisional-interference and self- representation.

  • Secure software.

  • Apply privacy-enhancing technologies and strategies.

Privacy Engineering

  • Identify privacy objectives.

  • Spot privacy risks in software.

  • Apply privacy design patterns.

Technological Challenges for Privacy

  • Identify privacy risks of automated decision making.

  • Understand privacy impacts of tracking and surveillance.

  • Recognize privacy concerns of anthropomorphism, ubiquitous computing, and mobile social computing.

OVERVIEW IN TRAINING SCHEDULE

INSTRUCTOR

Nipon Nachin, Ph.D.

DAY

3

Q / YEAR

Q4/2024

START DATE

17-ธ.ค.-24

END DATE

19-ธ.ค.-24

PRICE :

45,000.00

bottom of page