IAPP CIPP/US, CIPT and CIPM Certification Training Boot Camp

Transform your career in 6 days

Infosec’s six-day authorized CIPP/US, CIPT and CIPM boot camp provides privacy professionals with the essential knowledge and understanding of U.S. privacy laws, technology concerns, and privacy policies and frameworks necessary to successfully pass all three certification exams.

4.6 (738 ratings)

Affirm Financing available
Exam Pass Guarantee

Course essentials

Boot camp at a glance

  • Method

    Online, in-person, team onsite

  • Duration

    6 days

  • Experience

    1-3 years of experience

What you'll learn

Training overview

This course is designed to prepare you for the Certified Information Privacy Professional/United States (CIPP/US), Certified Information Privacy Technologist (CIPT) and Certified Information Privacy Manager (CIPM) certification exams.

  • The CIPP/US certification focuses on U.S. privacy laws and regulations. You will learn about cross-sector limits on the collection and use of data and about specific regulations for the medical, financial, education, telecommunications and marketing sectors. The course also covers laws governing access to private information by law enforcement and national security agencies, issues related to workplace privacy and important state privacy laws.
  • The CIPT certification focuses on core privacy concepts and essential elements of embedding privacy in information technology. The course covers privacy considerations for every stage of the information life cycle as well as effective privacy-enhancing techniques and technologies, including access management, data encryption and privacy-by-design principles. You will also learn about online services and technologies with specific privacy requirements and considerations, such as social media, cloud computing, and web browser privacy and security.
  • The CIPM certification focuses on privacy and data protection practices in the development, measurement and improvement of a privacy program. The course covers organizational-level privacy program governance, development, implementation and measurement of a privacy program framework as well as the application of the privacy operational life cycle.

Who should attend

Who Should Attend Image
  • Chief privacy officers (CPOs) and other senior information management professionals in both the U.S. public and private sectors or those employed by any organization with business or policy interests in the U.S.
  • Privacy managers, legal compliance officers and risk managers
  • Members of a privacy or compliance team
  • Intermediate-level privacy professionals and entry-level candidates who are transitioning from non-privacy roles or who are entirely new to the privacy profession
  • Information management professionals in the U.S. financial services, healthcare or telecommunications industries who seek to broaden their expertise into a general information privacy scope
  • Corporate managers who are responsible for privacy within their teams, such as human resources, procurement, marketing and customer relations
  • Non–privacy professionals who serve or support a privacy or compliance team and who need to achieve a consistent level of privacy education
  • Information security professionals (CISO, CISSP)
  • Information auditing and IT governance professionals (CISA, CISM)
  • IT project/program managers
  • Enterprise system architects (CTO, CIO)
  • Business process professionals (purchase decision makers for IT services and products)
  • Software, network, database and system professionals, including architects, designers, developers, engineers and administrators
  • Anyone who wants to secure a place in the information economy

Award-winning training you can trust

Ready to discuss your training goals? We've got you covered.

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

This is where the error message would go.

Step 1


Thanks! We look forward to meeting with you!

What's included

Everything you need to know

 Certification Logo
  • 90-day extended access to Boot Camp components, including class recordings
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Knowledge Transfer Guarantee
  • One year IAPP membership
  • Unlimited practice exam attempts

What makes the Infosec CIPP/US, CIPT and CIPM prep course different?

You can rest assured that the CIPP/US, CIPT and CIPM training materials are fully updated and synced with the latest version of the exam. With 20 years of training experience, we stand by our CIPP/US, CIPT and CIPM training with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!


Training schedule

Day 1
Morning session


Structure of U.S. law and enforcement models

  • Common privacy principles
  • U.S. law sources, definitions and authorities
  • Legal liability in the U.S.
  • U.S. approach to protecting privacy and security of information
Afternoon session

Regulating collection and use of data in the private sector

  • Federal trade commission privacy and security enforcement actions
  • HIPAA and other healthcare privacy regulations
  • Privacy in financial sector
  • FERPA (education)
  • Privacy protection laws for telecommunications and marketing
Evening session

Optional group & individual study

Day 2
Morning session

Access to private information by government and courts

  • Law enforcement access to financial data and communications
  • Laws related to national security
  • Privacy issues in civil litigation
Afternoon session

Workplace privacy

  • General workplace privacy concerns
  • Humans resources management
  • Relevant U.S. agencies and laws
  • Employee background screening
  • Employee monitoring and investigations
  • Employee termination

State privacy laws

  • Federal vs. state authority
  • Marketing laws
  • Financial data and data security laws
  • Overview of data breach notification laws
Evening session

Optional group & individual study

Day 3
Morning session

Importance of privacy in IT environment

  • Privacy and regulatory compliance requirements
  • Privacy expectations
  • Risks to IT environments
  • Common mistakes
  • Privacy vs. security
  • Governance and role of IT professionals
Afternoon session

Privacy fundamentals

  • Important privacy documents (notices and relevant security and privacy policies)
  • Relevant standards and frameworks
  • SDLC privacy and security
  • Privacy considerations in enterprise architecture (incident response cross-border data transfers and Privacy Impact Assessments)
  • Core privacy principles

Privacy in the information life cycle

  • Stages of the information life cycle
  • Privacy considerations for use of information
  • Privacy considerations for disclosure of information
  • Privacy considerations for retention of information
  • Privacy considerations for destruction of information
Evening session

Optional group & individual study

Day 4
Morning session

Privacy-enabling technologies and controls

  • Privacy challenges for enterprise IT architecture
  • Identify and access management (IAM)
  • Protecting credit card information
  • Privacy and security controls for remote access and mobile devices
  • Data encryption types, standards and implementation
  • Automated data retrieval and audits
  • Data masking and obfuscation
  • Implementing DLP
  • Privacy considerations for customer-facing applications

Common privacy techniques

  • Authentication
  • Identifiability of data
  • Privacy considerations for customer-facing applications
Afternoon session

Privacy in online environment

  • Online privacy expectations and requirements
  • Privacy challenges with social media
  • Common online threats and safeguards
  • E-commerce and advertising
  • Web tracking technologies (cookies, beacons and more)
  • Machine-readable languages for privacy policies
  • Web browser privacy and security features
  • Secure web protocols (SSL/TLS, HTTPS)

Privacy and emerging technologies

  • Cloud computing privacy and security concerns
  • Wireless communications
  • Principles of location-based technologies and services
  • IoT and other smart technologies
  • Electronic surveillance
  • Biometrics
Evening session

Optional group & individual study

Day 5
Morning session

Organizational level

  • Creating a company vision
  • Establishing a privacy program
  • Structuring the privacy team

Developing framework

  • Developing privacy policies, standards and guidelines
  • Defining privacy program activities
Afternoon session

Implementating framework

  • Communicating the privacy framework to stakeholders
  • Ensuring alignment with laws and regulations


  • Identifying intended audience for metrics
  • Defining reporting resources
  • Defining privacy metrics
  • Identifying systems/application collection points
Evening session

Optional group & individual study

Day 6
Morning session

Stage I: Assess

  • Documenting current baseline
  • Processors and third-party vendor assessment
  • Physical assessments
  • Mergers, acquisitions and divestitures
  • Conducting analysis and assessments

Stage II: Protect

  • Data life cycle
  • Information security practices
  • Privacy by design
Afternoon session

Stage III: Sustain

  • Measure
  • Align
  • Audit
  • Monitor

Stage IV: Respond

  • Information requests
  • Privacy incidents

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

You're in good company


The instructor was able to take material that prior to the class had made no sense, and explained it in real world scenarios that were able to be understood.

Erik Heiss, United States Air Force

I really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that it could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam, but will help in all exams I take in the future.

Michelle Jemmott, Pentagon

The course was extremely helpful and provided exactly what we needed to know in order to successfully navigate the exam. Without this I am not confident I would have passed.

Robert Caldwell, Salient Federal Solutions