• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

38 Certified Information Security Manager (CISM) courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Information Privacy Technologist (CIPT)

By Training Centre

  The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles.  Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you.  The CIPT certification also holds accreditation under ISO 17024: 2012 ABOUT THIS COURSE   What will you learn?   * Critical data protection concepts and practices that impact IT * Consumer data protection expectations and responsibility * How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market * How to establish data protection practices for data collection and transfer * How to pre-empt data protection issues in the Internet of Things * How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance * How to communicate data protection issues with partners such as management, development, marketing and legal.   This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.   MODULE 1: Fundamentals of Information Privacy   * Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles.   * Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors.   * Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM).   * Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices.    MODULE 2: Privacy in Technology   * Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments.   * Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams.   * Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle.   * Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them.   * Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data.   * Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection.   * Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use.   PREREQUISITES   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. WHAT'S INCLUDED?   1 years membership of the IAPP  Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees WHO SHOULD ATTEND?   The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; * Data Protection Officers  * IT Managers and Administrators  * Records Managers  * System Developers  * IT Security specialists  ACCREDITATION OUR GUARANTEE   * We are an approved IAPP Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Technologist (CIPT)
Delivered Online
Dates arranged on request
£1395

Certified Information Privacy Auditor (CIPA)

By Training Centre

  Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements.   Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification ABOUT THIS COURSE   LEARNING OUTCOMES * UNDERSTAND A PRIVACY INFORMATION MANAGEMENT SYSTEM (PIMS) AND ITS PROCESSES BASED ON ISO/IEC 27701 * IDENTIFY THE RELATIONSHIP BETWEEN ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, AND OTHER STANDARDS AND REGULATORY FRAMEWORKS * ACQUIRE THE COMPETENCES OF THE AUDITOR'S ROLE IN PLANNING, LEADING, AND FOLLOWING UP ON A MANAGEMENT SYSTEM AUDIT IN ACCORDANCE WITH ISO 19011. * LEARN HOW TO INTERPRET THE REQUIREMENTS OF ISO/IEC 27701 IN THE CONTEXT OF A PIMS AUDIT   COURSE OVERVIEW * DOMAIN 1-THE PROCESS OF AUDITING INFORMATION PRIVACY SYSTEMS & SOLUTIONS * DOMAIN 2-GOVERNANCE & MANAGEMENT OF INFORMATION PRIVACY TECHNOLOGY * DOMAIN 3-INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT & IMPLEMENTATION * DOMAIN 4-INFORMATION SYSTEMS OPERATIONS, MAINTENANCE & SERVICE MANAGEMENT * DOMAIN 5-PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) ASSETS   COURSE AGENDA * DAY 1: INTRODUCTION TO PRIVACY INFORMATION MANAGEMENT SYSTEM (PIMS) AND ISO/IEC 27701 * DAY 2: AUDIT PRINCIPLES, PREPARATION, AND LAUNCHING OF AN AUDIT * DAY 3: ON-SITE AUDIT ACTIVITIES AND CLOSING THE AUDIT ACCREDITATION   This course is Accredited by NAS [http://www.nacs.ee] and Administered by the IECB [https://www.iecb.org] ASSESSMENT   All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. PREREQUISITES   None, but candidates would benefit from having a fundamental understanding of Audit principles WHAT'S INCLUDED?   * Comprehensive course materials totalling some 450 pages * Case Study * Exam fees * Exam pass guarantee WHO SHOULD ATTEND?   * Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits * Managers or consultants seeking to master a PIMS audit process * Individuals responsible for maintaining conformance with PIMS requirements * Technical experts seeking to prepare for a PIMS audit * Expert advisors in the protection of Personally Identifiable Information (PII)

Certified Information Privacy Auditor (CIPA)
Delivered Online
Dates arranged on request
£1250

Data Protection (GDPR) Practitioner Certificate

By CloudLearn

We are data protection specialists and this is our flagship training programme for Data Protection Officers, Data Protection Managers, Compliance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. It equips current and aspiring data protection officers and data protection managers with knowledge and skills to undertake data protection compliance activities throughout an organisation. It is a valuable course for anybody with data protection compliance responsibilities. The course takes account of the latest developments in this fast moving subject, together with the latest guidance from the ICO and includes real life, practical examples throughout. There are two versions of the course (with the same content and same trainer). The courses priced at £1200 are run by Computer Law Training and lead to the TQUK endorsed certificate. The courses priced at £1440+VAT are run in collaboration with, and are booked through, the Law Society of Scotland and, on successful completion, lead to the TQUK endorsed certificate and a 'Certified Specialist' certification from the Law Society of Scotland. -------------------------------------------------------------------------------- SUITABILITY - WHO SHOULD ATTEND? The training programme for Data Protection Officers, Data Protection Managers, Compliance Managers, Corporate Governance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is ideal for you if you: * Are already undertaking the role of Data Protection Officer * Expect to be filling the post of Data Protection Officer in their current employment * Are looking for employment as a Data Protection Officer * Have, or expect to have, data protection responsibilities in their organisation * Need to advise others on data protection compliance * Wish to be able to demonstrate verifiable practical skills and learning in this area. It is suitable for those working in: the public sector, the private sector and the third sector. In either case, it will teach participants essential data protection skills and in depth knowledge. OUTCOME / QUALIFICATION ETC. * Understand the importance of data protection legislation and compliance in the UK and beyond. * Interpret key terminology of the UK GDPR and Data Protection Act 2018 (DPA) in a practical context * Understand the key obligations of the UK GDPR and DPA * Create appropriate policies and procedures necessary for data protection compliance * Carry out a data protection audit and gap analysis * Develop an action plan to address a data protection gap analysis * Respond appropriately to data protection issues arising in an organisation * Carry out the duties of a data protection officer * Undertake accountability and risk analysis activities TRAINING COURSE CONTENT DAY 1 * Data Protection – history and background * GDPR Overview * What, really, is personal data * Purposes & Legal Bases DAY 2 * Consent * Special Categories of Personal Data * Data Subject Rights * Transparency Requirements * Data Processors and Controllers * Information Security Obligations * Breach Reporting and Recording DAY 3 * Restricted (International) Transfers * Cloud Services * Accountability * The Personal Data Audit & Record of Processing * The “Accountability Portfolio” * Data Protection by Design & Default * Data Protection Impact Assessments * Privacy Enhancing Technologies * Data Protection Officers * Direct Marketing & Cookies Day 4 * Data Protection Act 2018 * HR Issues * Risk Frameworks * Data Protection Governance DAY 5 * Data Protection Audit * Gap Analysis * Action Plan * Implementation * The ICO and Enforcement * Brexit and the future (crystal ball!) * The European Data Protection Board (EDPB) * Questions COURSE DELIVERY DETAILS The course is delivered on Zoom. It lasts 5 days over 3 weeks, 9.30-16.30. The advertised start date is usually a Tuesday which is the first day of the course. The course normally continues on the Thursday of that week, Tuesday and Thursday the following week and one day in the third week: 24, 26, 31 January & 2, 7 February 2023 The one-hour test to obtain the certificate is online by arrangement in the week or two following the course. The trainer for the course is Tim Musson, who has a Master of Laws degree in IT and Telecoms Law, is a Certified Information Privacy Professional (CIPP/E) and a Certified Information Privacy Technologist (CIPT).

Data Protection (GDPR) Practitioner Certificate
Delivered Online
Dates arranged on request
£1200

C)ISSA Certified Information Systems Security Auditor Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will  be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. COURSE OUTLINE * The Process of Auditing Information Systems * Risk-Based Auditing * Audit Planning and Performance * IS Systems Auditor reports * IT Governance and Management * Systems Acquisition, Development and Implementation * Systems Development Models * Types of Specialized Business Applications * Application Controls * Information Systems Operations, Maintenance, and Support * System and Communications * Hardware ADDITIONAL COURSE DETAILS: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSA Certified Information Systems Security Auditor Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)ISSM - Certified Information Systems Security Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. COURSE OUTLINE * Introduction * Information Security Governance * Information Risk Management and Compliance * Information Security Program Development and Management * Information Security Incident Management ADDITIONAL COURSE DETAILS: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSM - Certified Information Systems Security Manager Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)ISRM - Certified Information System Risk Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam.  Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. COURSE OUTLINE * The Big Picture * Domain 1 ? Risk Identification Assessment and Evaluation * Domain 2 ? Risk Response * Domain 3 ? Risk Monitoring * Domain 4 ? IS Control Design and Implementation

C)ISRM - Certified Information System Risk Manager Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)ISSO - Certified Information Security Systems Officer Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. COURSE OUTLINE * Risk Management * Security Management * Identification and Authentication * Access Control * Security Models and Evaluation * Operations Security * Vulnerability Assessments * Symmetric Cryptography and Hashing * Network Connections * Network Protocols and Devices * Telephony, VPNs, and Wireless * Security Architecture and Attacks * Software Development Security * Database Security * Malware and Software Attacks * Business Continuity * Disaster Recovery * Incident Management, Law, and Ethics * Physical Security ADDITIONAL COURSE DETAILS: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSO - Certified Information Security Systems Officer Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. COMMON PRINCIPLES AND APPROACHES TO PRIVACY * This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. JURISDICTION AND INDUSTRIES * This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. INFORMATION SECURITY: SAFEGUARDING PERSONAL INFORMATION * This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). ONLINE PRIVACY: USING PERSONAL INFORMATION ON WEBSITES AND WITH OTHER INTERNET-RELATED TECHNOLOGIES * This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. CANADIAN LEGAL FRAMEWORK * This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. CANADIAN PRIVATE-SECTOR PRIVACY LAWS * This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. CANADIAN PUBLIC-SECTOR PRIVACY LAWS * This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. HEALTH INFORMATION PRIVACY LAWS * This unit touches on the applicability and purpose of health information privacy laws. PRIVATE-SECTOR COMPLIANCE PRACTICES * This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. PUBLIC-SECTOR COMPLIANCE PRACTICES * This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. HEALTH-SECTOR COMPLIANCE PRACTICES * This unit covers the issues presented with digital compliance in the health sector. ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Manager (CIPM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. INTRODUCTION TO PRIVACY PROGRAM MANAGEMENT * Privacy program management responsibilities * Accountability in privacy program management PRIVACY GOVERNANCE * Considerations for developing and implementing a privacy program * Position of the privacy function within an organization * Role of the DPO * Program scope and charter * Privacy strategy * Support and ongoing involvement of key functions and privacy frameworks APPLICABLE LAWS AND REGULATIONS * The regulatory environment * Common elements across jurisdictions * Strategies for aligning compliance with organizational strategy DATA ASSESSMENTS * Practical processes for creating and using data inventories/maps * Generating and applying gap analyses * Privacy assessments * Privacy impact assessments/data protection impact assessments * Vendor assessments POLICIES * Common types of privacy-related policies * Policy components * Strategies for implementation DATA SUBJECT RIGHTS * Operational considerations for communicating and ensuring data subject rights * Privacy notice * Choice and consent * Access and rectification * Data portability * Erasure TRAINING AND AWARENESS * Developing privacy training and awareness programs * Implementing privacy training and awareness programs PROTECTING PERSONAL INFORMATION * Holistic approach to protecting personal information * Privacy by design DATA BREACH INCIDENT PLANS * Planning for a data security incident or breach * Responding to a data security incident or breach MONITORING AND AUDITING PROGRAM PERFORMANCE * Common practices for monitoring privacy program performance * Measuring, analyzing and auditing privacy programs ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Manager (CIPM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/E)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. DATA PROTECTION LAWS * Key European data protection laws and regulatory bodies * Evolving toward a harmonised legislative framework PERSONAL DATA * Understanding and differentiating between types of data as defined by the GDPR * Personal, anonymous, pseudonymous and special categories CONTROLLERS AND PROCESSORS * Roles and relationships of controllers and processors as defined by the GDPR PROCESSING PERSONAL DATA * Data processing and GDPR processing principles * Applying the GDPR * Legal grounds for processing personal data DATA SUBJECT RIGHTS * Data subject rights * Applying rights * Controller and processor obligations INFORMATION PROVISION OBLIGATIONS * Controller obligations for providing information about data processing activities to data subjects * Supervisory authorities as set out in the GDPR CROSS-BORDER DATA TRANSFERS * Options and obligations under the GDPR for transferring data outside the European Economic Area * Adequacy decisions * Safeguards and derogations COMPLIANCE CONSIDERATIONS * Applying European data protection laws * Legal bases and compliance requirements for processing personal data in practice * Processing employee data * Surveillance * Direct marketing * Internet technology and communications SECURITY OF PROCESSING * Considerations and duties of controllers and processors for ensuring security of personal data * GDPR specifications for providing notification of data breaches ACCOUNTABILITY * Accountability requirements * Data protection management systems * Data protection impact assessments * Data protection policies * Role of the data protection officer SUPERVISION AND ENFORCEMENT * Role, powers and procedures of supervisory authorities * Composition and tasks of the European Data Protection Board * Role of the European Data Protection Supervisor * Remedies, liabilities and penalties for noncompliance as set out in the GDPR ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/E)
Delivered on-request, onlineDelivered Online
Price on Enquiry