Build EU GDPR Data Protection Compliance from scra... (GDPR1)

  • 2.6_Data Privacy Officer and Data Protection Impact Assessme... 
    • 0_INTRO
    • 1.1_Welcome _ Intro
    • 1.2_Setting your expectations
    • 2.1_GDPR short intro
    • 2.2_Format _ Definitions
    • 2.3_Principles
    • 2.4_Lawfulness
    • 2.5_Consent _ Right of Data Subject
    • 2.6_Data Privacy Officer and Data Protection Impac...
    • 2.7_Codes of conduct and international transfers
    • 2.8_Fines and Penalties
    • 2.9 Secure Mgmt Commitment
    • 2.10 Plan your project
    • 2.11 - GDPR Roles and Responsibilities
    • 2.12 Communication_ awareness and training
    • 2.13 Personal Data Inventory
    • 2.14 Rights of the Data Subject
    • 2.15 DPIA_ Breaches and Record Processing
    • 2.16 Conclussion
    • 3.1_Evolving compliance requirements
    • 3.2_Major risks to a company_s IT framework
    • 3.3_Stakeholder expectations for privacy
    • 3.4_Privacy vs Security
    • 3.5_IT Governance vs Data Governance
    • 4.1_Foundational elements for embedding privacy in...
    • 4.2_Foundational elements for embedding privacy in...
    • 4.3_Common Privacy Principles
    • 5.1_Collection
    • 5.2_Use
    • 5.3_Disclosure
    • 5.4_Retention
    • 5.5_Destruction
    • 5.6_Authentication
    • 5.7_Identifiability
    • 5.8_Privacy by Design _ Redesign
    • 6.1 - Identity and Access Management _IAM_
    • 6.2 - Credit card information _ processing
    • 6.3 - Remote access_ telecommuting and bridging de...
    • 6.4 Data Encryption
    • 6.5 Other privacy enhancing technologies
    • 7.2_Gap Assessment Tool
    • 7.3 Management Commitment
    • 7.4_Preparation Project Plan
    • 7.5_GDPR_Roles
    • 7.6_How to capture Personal Data in a Form
    • 7.7_GDPR Privacy Data Protection Policy
    • 7.8_Data Subject Req Procedure
    • 7.9_Data Protection Impact Assessment _DPIA_
    • 7.10_How to treat international transfers
    • 7.11_Data Breach and IRP
    • 7.12_ISO and GDPR
    • 8.1. Introduction - what you will going to see in ...
    • 8.2 Identity Protection demo _AAD IP_
    • 8.3 Privileged Identity Management demo _PIM_
    • 8.4 Mobile Productivity policies demo _Intune_
    • 8.5 Classification_ Labelling and Protection of In...
    • 8.6 Cloud App visibility
    • 8.7 Security in Cloud environemnts
    • 8.8 ATP Incident Response
    • Final Conclusion
  • Course info
×

Course info

Build EU GDPR Data Protection Compliance from scratch (CIPT) (GDPR1)

Continue To Order: https://ethicalhackersacademy.com/produc...

Content
  • 0_INTRO sample
  • 1.1_Welcome _ Intro
  • 1.2_Setting your expectations
  • 2.1_GDPR short intro sample
  • 2.2_Format _ Definitions
  • 2.3_Principles
  • 2.4_Lawfulness
  • 2.5_Consent _ Right of Data Subject
  • 2.6_Data Privacy Officer and Data Protection Impact Assessments _DPIA_ sample
  • 2.7_Codes of conduct and international transfers
  • 2.8_Fines and Penalties
  • 2.9 Secure Mgmt Commitment
  • 2.10 Plan your project
  • 2.11 - GDPR Roles and Responsibilities
  • 2.12 Communication_ awareness and training
  • 2.13 Personal Data Inventory
  • 2.14 Rights of the Data Subject
  • 2.15 DPIA_ Breaches and Record Processing
  • 2.16 Conclussion
  • 3.1_Evolving compliance requirements
  • 3.2_Major risks to a company_s IT framework
  • 3.3_Stakeholder expectations for privacy
  • 3.4_Privacy vs Security
  • 3.5_IT Governance vs Data Governance
  • 4.1_Foundational elements for embedding privacy in IT _1_
  • 4.2_Foundational elements for embedding privacy in IT _2_
  • 4.3_Common Privacy Principles
  • 5.1_Collection
  • 5.2_Use
  • 5.3_Disclosure
  • 5.4_Retention
  • 5.5_Destruction
  • 5.6_Authentication
  • 5.7_Identifiability
  • 5.8_Privacy by Design _ Redesign
  • 6.1 - Identity and Access Management _IAM_
  • 6.2 - Credit card information _ processing
  • 6.3 - Remote access_ telecommuting and bridging devices to work
  • 6.4 Data Encryption
  • 6.5 Other privacy enhancing technologies
  • 7.2_Gap Assessment Tool
  • 7.3 Management Commitment
  • 7.4_Preparation Project Plan
  • 7.5_GDPR_Roles
  • 7.6_How to capture Personal Data in a Form
  • 7.7_GDPR Privacy Data Protection Policy
  • 7.8_Data Subject Req Procedure
  • 7.9_Data Protection Impact Assessment _DPIA_
  • 7.10_How to treat international transfers
  • 7.11_Data Breach and IRP
  • 7.12_ISO and GDPR
  • 8.1. Introduction - what you will going to see in this section
  • 8.2 Identity Protection demo _AAD IP_
  • 8.3 Privileged Identity Management demo _PIM_
  • 8.4 Mobile Productivity policies demo _Intune_
  • 8.5 Classification_ Labelling and Protection of Information demo _AIP_
  • 8.6 Cloud App visibility
  • 8.7 Security in Cloud environemnts
  • 8.8 ATP Incident Response
  • Final Conclusion
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever
Close
×

Congratulations!

Course completed!

Course completed!

Download certificate

Continue

Go to next course

×

You didn't quite make it

You didn't quite make it

Unfortunately, you didn't reach a passing score for this course

Go to course list

×

Notice

 Delete  Delete, don't keep asking Cancel
×

Notice

 Delete Cancel
×

Notice

 Discard changes Cancel