The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you. The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course What will you learn? Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal. This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice. MODULE 1: Fundamentals of Information Privacy Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. MODULE 2: Privacy in Technology Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments. Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams. Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle. Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them. Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data. Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection. Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included? 1 years membership of the IAPP Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend? The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
Mobile IP training course description A detailed examination of the protocols and architecture of Mobile IP. What will you learn Recognise the benefits of ADSL. Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. Mobile IP course details Who will benefit: Technical staff wanting to learn DNS.Network Administrators. Support personnel. Prerequisites: TCP/IP Foundation Duration 2 days Mobile IP course contents Introduction Quick review of IP, What is Mobile IP? What Mobile IP provides, Mobility requirements, Where Mobile IP is required, where mobile IP is not required, DHCP as an alternative, Proxy ARP as an alternative. Architecture Mobile node, home network, home agent, Foreign agent, Fixed home address, Care of address, Correspondent node, Tunnelling. How Mobile IP works Using two addresses, issues with TCP, discovering the care of address, registering care of address, tunnelling the care of address. The protocols involved. Issues with Mobile IP Routing inefficiencies, Security and firewalls, ingress filtering, QoS. MIP and IPv6 Stateless address configuration, Neighbour discovery, miscellaneous.
WhatsUp Gold training course description A hands on course focusing on network management using WhatsUp Gold. What will you learn Discover devices using WhatsUp Gold. Use WhatsUp Gold. Poll and monitor devices using WhatsUp Gold. Create Alarms, alerts and reports. Diagnose faults using WhatsUp Gold. Administrate a WhatsUp Gold system. WhatsUp Gold training course details Who will benefit: Technical staff working with WhatsUp Gold. Prerequisites: None. Duration 2 days WhatsUp Gold for engineers Getting started with WhatsUp Gold Starting WhatsUp Gold, manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using WhatsUp Gold. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using WhatsUp Gold Polling, obtaining MIB information, MIB walking, Active monitors, critical monitors, passive monitors. Hands on Monitoring devices. Groups. MIB walking. SNMP trap monitor. Syslog monitor. Alarms Actions, Alert centre, thresholds, actions on events. Hands on Using the alert centre. Web tools. Reports Creating reports, automatic reports, customising reports. Hands on Performance reports. Graphs. Administration Users, backups, the database. Hands on Adding a user. Backups.
SNMPc training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SNMPc training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SNMPc training course content Getting started with SNMPc Manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using SNMPc. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using SNMPc Polling, obtaining MIB information, MIB walking. Compiling MIBs. Hands on Monitoring devices. Groups. MIB walking. SNMP traps. Alarms Events and alarms, thresholds, event actions. Hands on Automatic alarms. Reports Creating reports, trend reports, customising reports. Hands on Performance reports. Graphs. Administration Users, customised views, backups, the database. Hands on Adding a user. Backups.
OpenView training course description A hands-on course focusing on network management using HP OpenView network node manager on Microsoft Windows or UNIX. What will you learn Recognise the benefits of ADSL. Describe the network management architecture. Use HP OpenView. Diagnose faults using HP OpenView. Recognise the MIB structure. OpenView training course details Who will benefit: Technical staff wanting to learn DNS. Prerequisites: TCP/IP Foundation Duration 2 days OpenView training course contents Network management What is network management?, Benefits, issues, demonstration. Getting started with HP OpenView Starting HP OpenView, IP discovery, IP monitoring, controlling IP discovery. Using HP OpenView Mapping devices, map layouts, maps and submaps, objects and symbols, object attributes, colour codings, polling. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Parts of SNMP SNMP architecture, MIB's, The protocol. HP OpenView SNMP configuration HP OpenView alarm browser HP OpenView alarms, alarm categories, filtering alarms, alarm details window. MIB's MIB1, MIB2, The MIB2 groups, additional MIB's, MIB compilers, vendor MIB's. HP OpenView MIB loader and browser. Monitoring devices Polling, obtaining MIB information. Diagnostic tools Poll node, the ping window, protocol test, locate route HP OpenView fault management Alarms, polling, fault management, setting thresholds and configuring traps.
OpenSSL for engineers training course description A hands on course covering OpenSSL. The course focusses on the use of OpenSSL from the command line as opposed to using its extensive libraries. Certificate authorities are configured along with key generation, HTTPS and a SSL VPN. What will you learn Describe OpenSSL. Use OpenSSL. Describe and implement: Explain how the various technologies involved in an OpenSSL work. OpenSSL for engineers training course details Who will benefit: Network personnel. Prerequisites: IP security foundation for engineers Duration 2 days OpenSSL for engineers training course contents What is OpenSSL? What is SSL? SSL versions, TLS, TLS negotiation, TLS authentication, What is OpenSSL, Command line tool, SSL library. OpenSSH, OpenVPN. Hands on TLS packet analysis. Getting started with OpenSSL Downloading, source code, packages, installing, versions, configuration, openssl command. Cipher suite selection. Hands on Encrypting a file with openssl. Public and private keys Algorithms, creating keys, public keys, private keys, encrypting the private key. Hands on Encrypting a file with keys. Digital signatures Creating signatures, checking validity of signatures, Self signing SSL certificates. Viewing certificates. Certificate files. Converting between formats. Hands on Securing a web server with HTTPS. Simple PKI with OpenSSL Root CA, signing CA, configuration files, Certificate signing requests. Email certificates, TLS server certificates. Hands on Implementing a simple PKI with OpenSSL.
Zeroconf and Bonjour training course description A hands on training course focusing on Microsoft and Apple implementations of Zeroconf. The course covers all three main areas: Interface configuration, name resolution and service discovery. Hands on with Apple Bonjour and Microsoft UPnP compliment all the major theory sessions. What will you learn Explain how mDNS and LLMNR work. Explain how DNS-SD and SSDP work. Recognise the role of service discovery gateways. Zeroconf and Bonjour training course details Who will benefit: Technical staff working with Zeroconf. Developers using Zeroconf. Prerequisites: TCP/IP Foundation for engineers Duration 2 day Zeroconf and Bonjour training course contents What is Zeroconf? Zeroconf, architecture, Microsoft UPnP, Apple, Bonjour, devices, components. Home networks, enterprise networks, BYOD. Plug and play without Zeroconf DHCP, DNS, A, PTR, SRV records, DDNS. Hands on DHCP configuration. Address selection IPv4 link local addresses, IPv6 link local addresses. Hands: Addresses without DHCP. Name resolution mDNS, finding names, announcing names, .local DNS namespace, LLMNR. Hands on Names without DNS. Role of multicasting Multicast addresses, multicasts and switches, multicasts and routers. Hands on Multicasts, TTL. Service discovery DNS-SD, SRV and TXT lookups, SSDP, HTTP. Hands on Browsing for services Zeroconf in a routed environment Service Discovery gateways, configuration, service filters, DNS-LLQ, NAT-PMP. Miscellaneous Security, automatic multicast addresses, wireless auto configuration.
MPEG training course description This course studies the MPEG standards for video and audio compression. A major focus is on MPEG-4 and MPEG-TS. Hands on includes decoding and analysing MPEG streams. What will you learn Recognise the main MPEG standards. Describe the techniques used in MPEG video and audio compression. Compare MPEG2m MPEG4 and MPEG-H. Describe the MPEG-TS. Analyse MPEG streams. MPEG training course details Who will benefit: Anyone working with MPEG. Prerequisites: None. Duration 2 days MPEG training course contents Introduction What is MPEG? MPEG and VCEG, MPEG 1, MPEG 2, MPEG-3, MPEG-4, MPEG-H, others, codecs and containers, licensing and patents, parts and layers (System, Video, Audio, others). MPEG2 DVD, DVB, characteristics, MPEG2 Part2, audio MPEG2 Part 7 (AAC). MPEG tools Wireshark, vlc, analysers, decoders, ffmpeg, wowzer. MPEG2 Video compression Sampling, bit rates, resolution. Inter and Intra frame coding, I, B, P frames, GOP, slices, blocks, macroblocks. Motion estimation. Hands on Analysing MPEG frames. MPEG4 Profiles and levels, Enhancements, Parts 1,2,3, Part 10 and AVC, Part 14 and mp4. Performance versus MPEG2. MPEG audio Coding, frequencies, bit rates. MPEG-TS PES, Transport Streams, TS elements, packets, PID, Programs, PSI, PAT, PMT, synchronisation, PCR, PTS. MPEG-H Part 2 HEVC, benefits, improvements. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing.
Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.
Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals