Select course by Certification/Exam Body or by Topic Below

Certified Information Privacy Manager Course Overview

In this course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe. An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. You will also learn about online privacy as it relates to using personal information on websites and other internet-related technologies.

You will learn how to create a privacy program at an organisational level, develop and implement a framework, and establish metrics to measure program effectiveness. In an interactive format applying practices to a real-world scenario, you will review privacy program practices through the privacy life cycle: assess, protect, sustain and respond.

   11000+ Trained Globally- including FTSE 250
   Classroom based small, highly interactive sessions.
   Widest range of Cyber courses – Select on your exact needs.
   The best content developed by qualified professionals.
   Great value – Exceptional quality at a great price.
ISACA
EC-Council
British Computer Society
PECB
CREST

Book Your Course

Not sure which course is right for you?

Call us on 020 8840 4496 and we’ll help you try and find the best course for you.

Date Location Price Course Booking
November 23-24, 2017 London-Ealing Click here -->
May 10-11, 2018 London-Ealing Click here -->

Email us for best price!

Course Syllabus

Fundamentals of Information Privacy

Common Principles and Approaches to Privacy

  • Modern History of Privacy
  • Types of Information
  • Risk Management Overview
  • Modern Privacy Principles

Jurisdictions and Industries

  • Major Privacy Models around the Globe
  • Privacy Regulation by Jurisdictions
  • Privacy Regulation by Industry Sectors

Information Security: Safeguarding Personal Information

Information Security

  • Definitions
  • Elements
  • Standards
  • Threats and Vulnerabilities

Information Security Management and Governance

  • Frameworks
  • Controls
  • Cryptography
  • Identity and Access Management (IAM)

Online Privacy: Using Personal Information and Websites and Other Internet-Related Technologies

Privacy Considerations for Sensitive Online Information

  • Notices
  • Access
  • Security
  • Authentication Identification
  • Data Collection

Additional Online Privacy

  • Children’s Online Privacy
  • Online Data Collection
  • Email
  • Searches
  • Online Marketing and Advertising
  • Social Media
  • Online Assurance
  • Cloud Computing
  • Mobile Devices

Privacy Program Governance

Create a Privacy Program

  • Company Vision
  • Alignment to the Business
  • Structure a Privacy Team

Develop and Implement a Framework

  • Organizational Privacy Policies
  • Standards and Guidelines

Establish Metrics to Measure Program Effectiveness

  • Define Program Activities
  • Define Program Metrics

Privacy Operational Life Cycle

  • Assess
  • Document Privacy Baseline
  • Data Processors and Third Party Vendor Assessments
  • Physical Assessments
  • Mergers, Acquisitions, and Divestures
  • Privacy Threshold Analysis
  • Privacy Impact Assessments
  • Information Security Practices
  • Protect
  • Privacy by Design
  • Integrating Privacy Requirements Across the Organization
  • Sustain
  • Auditing a Privacy Program
  • Creating Awareness
  • Compliance Monitoring
  • Respond
  • Handling Information Requests
  • Handling Privacy Incidents

These course will interest you too!

CIPP/E

Certified Iformation Privacy Porfessional / Europe

CIPT

Certified Information Privacy Technologist

GDPR

General Data Profection Regulation

Additional Information

Pre-Requisites

Certified Information Privacy Professional Europe – CIPP/E

Who should attend our Certified Information Privacy Manager Course?

Individuals who need an understanding of practices in managing information privacy and data protection and those interested in pursuing CIPM certification

We Accept

Course List