Certified Information Privacy Manager (CIPM)

Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team.

Description

Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology - regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification program.

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

View / Download Course Details

Similar events

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. It highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.

More Information

This course is for students who are preparing for the CompTIA Advanced Security Practitioner (CASP+) certification exam CAS-003. In this course, students will expand their knowledge of information security to apply more advanced principles. Students will apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; support IT governance and risk management; architect security for hosts, networks, and software; respond to security incidents; and more.

More Information

CompTIA Cloud Essentials+ is the only internationally recognized, vendor-neutral certification utilizing key business principles and fundamental cloud concepts that validate data-driven cloud recommendations. It stands alone in this field by demonstrating that all necessary staff members not just the IT specialists understand how to increase efficiency, manage costs, and reduce security risks for organizations whenever tasked with making current cloud technology decisions.

More Information

This course covers in depth the skills and abilities needed to operate in the cloud, validating that candidates have the technical experience needed to deploy, secure, and automate environments regardless of the vendor solution.

More Information

CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

More Information

This course maps to the CompTIA Security+ certification exam (SK0-601) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs. This course emphasizes both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities.

More Information

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics. Through the CCISO program, EC-Council will transfer the knowledge of experienced professionals to you, the next generation of leadership, by focusing on the most critical competencies required to develop and maintain a successful information security portfolio.

More Information

EC-Council's CCT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.

More Information

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. This course was built to incorporate a unique, in-depth and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactic

More Information

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE).

More Information

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

More Information

Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches.

More Information

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

More Information

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

More Information

Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role.

More Information

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics.

More Information

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

More Information

This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment.

More Information

The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud. This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users.

More Information

Many organizations are incorporating different project management methodologies into their skill base. This course is designed for individuals who need to get started with agile concepts and practice. Basic planning is covered along with the various roles and responsibilities of customers and developers / practitioners. Learn about epics, stories, sprints, feature prioritization and value-driven delivery.

More Information

This course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT?s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements. This course prepares you for the Certified Agile Service Manager (CASM) certification.

More Information

The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.

More Information

Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

More Information

This course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution.

More Information

The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam.

More Information

In this course, students will define cloud computing technology and describe its impact on IT scenario.

More Information

Welcome to Introduction to DAX for Power BI. This two-day instructor-led course is intended for business users who have been using Power BI and want to use DAX to create custom calculations in their data models. In this class, you will be introduced to using Data Analysis Expressions (DAX), which is the expression language that is used to create custom calculations in the Power BI Data model. The course covers some of the theoretical underpinnings of the data model and the DAX language, but the emphasis is on using DAX to solve common business problems. You will learn how to write your own calculated columns, measures, and tables, how to visualize the way Power BI computes DAX calculations, and how to troubleshoot custom code.

More Information

Network Defense Essentials (NDE) is a security program covering the fundamental concepts of network security.

More Information

Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks.

More Information

Project managers are always under severe pressure to complete projects on time and within budget. However, most projects fail to meet these demands, and, as a result, many projects are terminated early. Successful project management requires knowledge and experience. This course is designed to provide you with the generally recognized practices of project management to successfully manage projects.

More Information

In this course, students will identify effective project management practices and their related processes. They will examine the elements of sound project management and apply the generally recognized practices to successfully manage projects.

More Information

The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge. In this course, you will apply the generally recognized practices of project management acknowledged by the Project Management Institute to successfully manage projects.

More Information

This course teaches the fundamentals of project management and its underlying structure and elements, including project phases, project life cycles, stakeholders, and areas of expertise. These, coupled with the ability to identify the project management processes that are recognized industry wide as good practice, will help you to apply effective project management techniques to improve the efficiency of your projects and ensure their success. This course is designed to cover various project management approaches and is not intended to focus on a single methodology or framework.

More Information

In this course, students learn to understand the basics of Scrum, effectively contribute to a Scrum project, and learn how to enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects.

More Information

This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience.

More Information

Scrum Product Owner Certified (SPOC) certification exam is designed to confirm applicants practical and working knowledge of Scrum that equips them to handle the business aspects and stakeholders in a Scrum environment. Successful candidates will be awarded the Scrum Product Owner Certified (SPOC)certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience.

More Information

Agile relies on adaptive planning and iterative development and delivery. It focuses primarily on the value of people in getting the job done effectively. Successful candidates will be awarded the SCRUMstudy Agile Master Certified (SAMC) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience.

More Information

The SRE (Site Reliability Engineering) Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms.

More Information

This course introduces a range of practices for advancing service reliability engineering through a mixture of automation, organizational ways of working and business alignment. Tailored for those focused on large-scale service scalability and reliability.

More Information

This course, SQL Querying: Fundamentals, will teach you to use SQL as a tool to retrieve the information you need from databases.

More Information

In this course you will learn how to identify and use advanced querying techniques. You might find that you need to modifying the structure of a table; inserting, updating, deleting data and indexing tables to optimize query performance..

More Information

Tableau® software is designed for data analysis and the creation of visualizations. Data analysts prepare data, perform initial analysis, and create visualizations that are then passed on to business data-driven decision makers. These decision makers can use Tableau's tools to explore the data, perform further analysis to find new insights, make decisions, and create customized reports to share their findings.

More Information

This fast paced hands-on course provides in-depth coverage of Tableau Server administration. The knowledge and skills acquired are best geared toward those who will be administering a Tableau Server installation, including managing content, users, and permissions.

More Information

The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance.

More Information

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more.

More Information

This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.

More Information

Nintex is a leading workflow automation platform used to streamline business processes. Major vendors for this technology include Nintex itself, Microsoft, and Pega. It is employed across industries for efficient workflow automation, improving productivity, and reducing manual tasks.

More Information

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, and more.

More Information

Network Defense Essentials covers the fundamental concepts of information security and network defence. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity.

More Information

Upon completing Python for Security Professionals certification training, an individual can acquire skills such as understanding Python language fundamentals, developing Python scripts for automation of tasks, performing network security analysis, implementing cybersecurity strategies and creating detection algorithms using Python. In addition, they would acquire knowledge on how Python is used for penetration testing, system analysis, and ethical hacking.

More Information

The Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense training shows you how to deploy and configure Cisco Secure Firewall Threat Defense system and its features as a data center network firewall or as an Internet Edge firewall with Virtual Private Network (VPN) support.

More Information

E|CIHv3 is the most desirable program according to the top incident handling professionals globally. EC-Council’s Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

More Information

As the technology changes so do the threats. It is critical that you have the necessary training to meet your cyber security objectives. We spend lots of time and effort to secure our data. We need to ensure that employees understand the importance of keeping things secure. Our classes enable you to apply the knowledge you've learned as soon as you return to the office and or home.

More Information