Ultimate Privacy by Design Data Protection Course(GDPR,LGPD)
Ultimate Privacy by Design Data Protection Course(GDPR,LGPD), available at $69.99, has an average rating of 4.45, with 67 lectures, based on 469 reviews, and has 3468 subscribers.
You will learn about Privacy by Design Privacy Interest Create a Privacy Model Use a Privacy by Design methodology Perform Risk An analysis from privacy perspective This course is ideal for individuals who are Privacy Enthusiasts or Privacy Law enthusiasts or Lawyers that need the privacy focus or Audit and Compliance people or Data Privacy Officers (DPO) or Students of other courses developed by me as a part of the learning plan It is particularly useful for Privacy Enthusiasts or Privacy Law enthusiasts or Lawyers that need the privacy focus or Audit and Compliance people or Data Privacy Officers (DPO) or Students of other courses developed by me as a part of the learning plan.
Enroll now: Ultimate Privacy by Design Data Protection Course(GDPR,LGPD)
Summary
Title: Ultimate Privacy by Design Data Protection Course(GDPR,LGPD)
Price: $69.99
Average Rating: 4.45
Number of Lectures: 67
Number of Published Lectures: 67
Number of Curriculum Items: 67
Number of Published Curriculum Objects: 67
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Privacy by Design
- Privacy Interest
- Create a Privacy Model
- Use a Privacy by Design methodology
- Perform Risk An analysis from privacy perspective
Who Should Attend
- Privacy Enthusiasts
- Privacy Law enthusiasts
- Lawyers that need the privacy focus
- Audit and Compliance people
- Data Privacy Officers (DPO)
- Students of other courses developed by me as a part of the learning plan
Target Audiences
- Privacy Enthusiasts
- Privacy Law enthusiasts
- Lawyers that need the privacy focus
- Audit and Compliance people
- Data Privacy Officers (DPO)
- Students of other courses developed by me as a part of the learning plan
Lessons from Chief Security Officer (CISO) of SAP
also an ex IBM-er, MICROSOFT-er, Accenture, Cognizant, Genpactand Cisco
5+ hours video content
60+ lessons
2023 update
MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:
Course 1: Build EU GDPR data protection compliance from scratch (CIPT)
Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)
Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT)
Course 4:Ultimate Privacy by Design Guide – step by step strategies with examples (CIPM, CIPT) – we are here!!!
Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)
Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) – Complete course
Course 7: Build a cybersecurity career and earn more than 150k per year
My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.
I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.
Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF
Protecting private information has vital and obvious implications for everyday life, and the only way companies can successfully do this is to create a culture of privacy.
The only solution — the only way to change people’s behavior — is to embed privacy in the very fabric of the organization. That’s why Privacy by Design, a decades-old application design and development strategy, is now being discussed as a foundational strategy for entire organizations.
The original goal of Privacy by Design was developing best practices that ensured application developers were building privacy into their products from the ground up. Even if concern for customer or employee privacy wasn’t the highest priority, there was always profit — it is very expensive to re-engineer privacy into a product following a failure.
Today, these best practices are more important than ever. Increasing amounts of data have created an ever-expanding attack surface, and complex new regulations demand a foundational approach to privacy. In fact, Article 25 of the GDPR is titled “Data Protection & Privacy by Design and by Default.”
Organizations face an ever-growing number of attack vectors related to privacy, including the internet of things (IoT), government and business data over-collection and unread mobile app permissions such as allowing scanner apps to keep and sell the data they scan.
This course is not about the GDPR, CCPA or LGPD in essence, though it can certainly be used as a process for data protection & privacy by design and default (Article 25 of the GDPR regulation). Most probably you are already enrolled in my bestseller “Build EU GDPR from scratch course” which goes for GDPR from all perspectives. This course is not meant to comply with any specific regulation, though use of the correct privacy-by-design process herein will help organizations comply with many regulations. This course is about how to build better processes, products and services that consider individuals’ privacy interest as a design requirement. It is about how to build things that people can trust.
There are four sections I have created. Section 2 provides introductory remarks, including an introduction to Ann Cavoukian’s 7 Foundational Principles of Privacy by Design, a short history of regulatory adoption and past challenges that privacy-by-design practitioners have faced. Given its 10-year history in the privacy professionals’ community, many readers may already be familiar with Cavoukian’s principles. This section also contains something most privacy professionals, outside academia, may not be aware of. Here I discuss what I feel is the impetus for why companies must build privacy into their processes, products and services and not rely on individuals’ self-help to protect their own privacy.
For those not familiar with the Solove Taxonomy of Privacy or the Hoepman Strategies, most probably the majority of you, Section 3 is a must. The two frameworks form the basis for identifying and mitigating privacy risks in the privacy model developed in that section. Section 4 describes how to analyze the privacy model built in Section 3.
In the analysis section, a risk model is built using the Factor Analysis of Information Risk with a focus on individual risks over organizational risks and tweaks in the terms and definitions for privacy beyond information security. Designers may never need to determine privacy risk explicitly but understanding the factors that influence privacy risk provides a deeper understanding of why the process is built the way it is. The last section, Section 5, details the design procedure, while using the other sections as reference
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction – Why Privacy by Design is extremely important
Lecture 2: What you will learn in this course?
Lecture 3: IAPP certification learning plan – CIPT, CIPM, CIPP/E
Lecture 4: Powerpoint Presentations for download
Lecture 5: One more word before we start…
Chapter 2: Privacy by Design generalities and principles!
Lecture 1: How was privacy by design adopted during time!
Lecture 2: Privacy by Design Principle 1
Lecture 3: Privacy by Design Principle 2
Lecture 4: Privacy by Design Principle 3
Lecture 5: Privacy by Design Principle 4
Lecture 6: Privacy by Design – Principles 5, 6 and 7
Lecture 7: Are there any challenges?
Lecture 8: It is extremely important to include privacy from early stages!
Chapter 3: Let's define a privacy by design Model!
Lecture 1: What is this section about?
Lecture 2: Individuals
Lecture 3: Important Actors
Lecture 4: Links and Relationships
Lecture 5: Privacy by Design – Example 1
Lecture 6: Privacy by Design – Example 2
Lecture 7: Privacy by Design – Example 3
Lecture 8: Violations – Overview
Lecture 9: Information collection
Lecture 10: Information processing (part 1)
Lecture 11: Information processing (part 2)
Lecture 12: Information dissemination (part 1)
Lecture 13: Information dissemination (part 2)
Lecture 14: Invasions
Lecture 15: Centralization
Lecture 16: Identifiability
Chapter 4: Privacy by Design Model – Data Oriented Strategies
Lecture 1: Privacy Data-Oriented Strategies – SEPARATE
Lecture 2: Privacy Data-Oriented Strategies – MINIMIZE (part 1)
Lecture 3: Privacy Data-Oriented Strategies – MINIMIZE (part 2)
Lecture 4: Privacy Data-Oriented Strategies – HIDE
Lecture 5: Privacy Data-Oriented Strategies – ABSTRACT
Lecture 6: Privacy Process-Oriented Strategies – ENFORCE
Lecture 7: Privacy Process-Oriented Strategies – DEMONSTRATE
Lecture 8: Privacy Process-Oriented Strategies – INFORM
Lecture 9: Privacy Process-Oriented Strategies – CONTROL
Lecture 10: Architecture Redux
Lecture 11: Information Flow
Lecture 12: Domains and Subdomains
Lecture 13: App example
Lecture 14: Exercises
Chapter 5: Privacy Analysis – The FAIR method for privacy risk
Lecture 1: Risk Analysis from Privacy perspective
Lecture 2: A FAIR method for privacy risk
Lecture 3: What is Frequency?
Lecture 4: Vulnerability
Lecture 5: Magnitude
Lecture 6: How to apply controls (part 1)
Lecture 7: How to apply controls (part 2)
Lecture 8: Risk at the organization level
Lecture 9: Quantitative Risk Management – example 1 (part 1)
Lecture 10: Quantitative Risk Management – example 1 (part 2)
Lecture 11: App Example
Lecture 12: Exercises
Chapter 6: Let's create the privacy by design Methodology!
Lecture 1: The purpose of this methodology!
Lecture 2: Quality Attributes
Lecture 3: Identify Information Needs
Lecture 4: Imposing Controls – ARCHITECT & SECURE
Lecture 5: Imposing Controls – Supervise & Balance
Lecture 6: Online Behavioral Advertising & Mobile Phone monitoring
Lecture 7: Integrating privacy by design into the business
Lecture 8: How the methodology meets the initial principles
Lecture 9: The App under the methodology
Lecture 10: Final Exercises
Chapter 7: BONUS – Remember my first promise to you?
Lecture 1: BONUS – Remember my first promise to you? Learning plan differences
Lecture 2: BONUS 2 – How to get more content and help me create more!
Instructors
-
Roland Costea
Chief Security Officer at SAP
Rating Distribution
- 1 stars: 6 votes
- 2 stars: 24 votes
- 3 stars: 70 votes
- 4 stars: 161 votes
- 5 stars: 208 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024