What you will learn
This learning path covers the role of information privacy within the US federal government’s executive branch. Students will learn about the Privacy Act of 1974, the Computer Matching and Privacy Protection Act of 1988, the E-Government Act of 2002 and the relevant concepts and topics. Next, students will learn about several US healthcare privacy-related laws and rules. They will review HIPAA, the HIPAA Privacy Rule, and the HIPAA Security Rule. They will review HITECH and the Breach Notification Rule, GINA’s privacy protection requirements and more. Finally, students will learn about several global data protection and information privacy laws. They will learn about data protection requirements in the EU GDPR, the UK Data Protection Act, LGDP, PIPEDA and more. Students will also review the concept of data protection principles, children’s online protection and special processing activities requirements.
Syllabus
Global Data Protection and Information Privacy Laws
Course — 05:14:34
K0003, K0004, K0038, K0044, K0615, S0374
A look at global data protection and information privacy laws.
The US Federal Government’s Executive Branch and Information Privacy
Course — 01:33:55
K0003, K0004, K0038, K0044, K0168, K0222, K0410, K0615, S0374
Students will take a look at US privacy legislation, including the Privacy Act of 1974.
US Healthcare Privacy-Related Laws and Privacy Compliance Guidance
Course — 03:01:03
K0003, K0004, K0038, K0044, K0168, K0222, K0260, K0262, K0410, K0615, S0374
A look at US healthcare-related laws, including HIPAA, HITCH and GINA.
Fundamental Privacy Laws Skill Assessment
Assessment — 18 questions — 00:09:00

Meet the author
Chris Stevens has spent over thirty-five years as a data protection professional, a homeland security intelligence professional, an information privacy professional, a strategic intelligence manager, and as a Senior National Intelligence Service Senior Executive. Chris possesses all seven of the International Association of Privacy Professionals’ (IAPP) certifications. He is an IAPP Fellow of Information Privacy. Chris is a member of the IAPP Privacy Faculty, and he served for two years as an IAPP Baltimore, MD Knowledge Net Chapter Co-Chairperson. He is an American Health Information Management Association “Certified in Healthcare Privacy and Security” professional. He is a Healthcare Compliance Association “Certified Healthcare Privacy Compliance” professional.
Chris is an ISACA “Certified Information Security Manager,” “Certified in Risk and Information Security Controls,” and a “Certified Data Privacy Solutions Engineer” professional. Chris has completed the Loyola University-Chicago School of Law’s “Graduate Certificate in Privacy Law.” Chris is a certified OneTrust Privacy Professional. Chris possesses several baccalaureate and graduate degrees in several disciplines. He is currently completing the Capella University Doctor of Information Technology with a concentration in Cybersecurity and Information Assurance.
He has assisted several private sector and public sector organizations in better managing their privacy and risk management programs. He has developed information privacy courses and learning paths for Cybrary and the Infosec Institute, respectively. He currently teaches IAPP privacy certification examination courses. He also teaches for Drexel University’s College of Computing and Informatics as a part-time adjunct professor. He currently works for King and Spalding LLP as its Privacy and Cybrary Risk Analyst. He lives in Laurel, MD with his fiancé, her 11-year-old son, and his two rambunctious Scottish terriers: Thor and Maggie.
The details
Learning path insights

How to claim CPEs
Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
No software. No set up. Unlimited access.
Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every lnfosec Skills subscription so your team can skill up however they learn best.

Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client