Home / Course catalog / Build EU GDPR Data Protection Compliance... (GDPR1)

Build EU GDPR Data Protection Compliance from scratch (CIPT) (GDPR1)

GDPR


Description

Learn what GDPR regulation is and what is needed in order to achieve GDPR compliance.

The course starts with GDPR foundations, explains data privacy concepts and what GDPR compliance means and also offers documents, policies and procedures that can be reused and adapted for your own organization in order to start GDPR programme.

Part of the documents include GDPR assessment tool, GDPR Data Privacy Impact, GDPR Implementation Guide, GDPR Data Breach Procedure etc

Learn how to hire a DPO (Data Privacy Officer) and what are the needed skills for the job. Also learn how to initiate the role.

You will be able to analyze a company GDPR compliance programme and to think properly by step by step examples. You will be able to use our templates and provide step by step recommendations.

We have included new topics related to GDPR for HR, GDPR for Cloud Service Providers and the DPO role in an organization + how to initiate it.

The course is a complete A to Z GDPR training, so we will cover everything that you need to know. In this way, we will first create the GDPR implementation plan as a first outcome, then I will teach you the basic theory you need to know for being successful in front of clients or management and also that will help you in achieving your CIPT certification.

What is CIPT certification you may ask. So, for the ones that do not heard about it, CIPT is the only technology related certification related to GDPR, developed by IAPP – International Association of Privacy Professionals.

In the end, you will learn how to pass all IAPP certifications, CIPT, CIPM and CIPP/E, not only CIPT, by practicing on real questions!

Every report will end up with recommendations that usually involve technology that can solve GDPR challenges. In this way I will demonstrate some security concepts by using different cloud technologies and we will use Azure cloud as a matter of experiment for this course.

The course is delivered in a mix of over the shoulder lessons and powerpoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey.

I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.

As a student of this course, you will also get regular updates and access to new additional lectures as they are added.

Continue To Order: https://ethicalhackersacademy.com/produc...

Content
  • 0_INTRO sample
  • 1.1_Welcome _ Intro
  • 1.2_Setting your expectations
  • 2.1_GDPR short intro
  • 2.2_Format _ Definitions
  • 2.3_Principles
  • 2.4_Lawfulness
  • 2.5_Consent _ Right of Data Subject
  • 2.6_Data Privacy Officer and Data Protection Impact Assessments _DPIA_
  • 2.7_Codes of conduct and international transfers
  • 2.8_Fines and Penalties
  • 2.9 Secure Mgmt Commitment
  • 2.10 Plan your project
  • 2.11 - GDPR Roles and Responsibilities
  • 2.12 Communication_ awareness and training
  • 2.13 Personal Data Inventory
  • 2.14 Rights of the Data Subject
  • 2.15 DPIA_ Breaches and Record Processing
  • 2.16 Conclussion
  • 3.1_Evolving compliance requirements
  • 3.2_Major risks to a company_s IT framework
  • 3.3_Stakeholder expectations for privacy
  • 3.4_Privacy vs Security
  • 3.5_IT Governance vs Data Governance
  • 4.1_Foundational elements for embedding privacy in IT _1_
  • 4.2_Foundational elements for embedding privacy in IT _2_
  • 4.3_Common Privacy Principles
  • 5.1_Collection
  • 5.2_Use
  • 5.3_Disclosure
  • 5.4_Retention
  • 5.5_Destruction
  • 5.6_Authentication
  • 5.7_Identifiability
  • 5.8_Privacy by Design _ Redesign
  • 6.1 - Identity and Access Management _IAM_
  • 6.2 - Credit card information _ processing
  • 6.3 - Remote access_ telecommuting and bridging devices to work
  • 6.4 Data Encryption
  • 6.5 Other privacy enhancing technologies
  • 7.2_Gap Assessment Tool
  • 7.3 Management Commitment
  • 7.4_Preparation Project Plan
  • 7.5_GDPR_Roles
  • 7.6_How to capture Personal Data in a Form
  • 7.7_GDPR Privacy Data Protection Policy
  • 7.8_Data Subject Req Procedure
  • 7.9_Data Protection Impact Assessment _DPIA_
  • 7.10_How to treat international transfers
  • 7.11_Data Breach and IRP
  • 7.12_ISO and GDPR
  • 8.1. Introduction - what you will going to see in this section
  • 8.2 Identity Protection demo _AAD IP_
  • 8.3 Privileged Identity Management demo _PIM_
  • 8.4 Mobile Productivity policies demo _Intune_
  • 8.5 Classification_ Labelling and Protection of Information demo _AIP_
  • 8.6 Cloud App visibility
  • 8.7 Security in Cloud environemnts
  • 8.8 ATP Incident Response
  • Final Conclusion
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever