IAPP CIPT Learning Path

Prepare for the CIPT exam with this learning path.

7 hours, 49 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    7 hours, 49 minutes

  • Assessment

    questions

About IAPP CIPT

This path explores the intersection of technology, data security, and policy. You'll learn key concepts about privacy and compliance, as well as the frameworks and tech to support these. We'll cover threats and violations, privacy by design, data management strategies, encryption and more. You'll also get tips on passing the CIPT exam, as well as practice materials.

 

Syllabus

CIPT practice exam

Assessment - 70 questions

Privacy fundamentals

Course - 00:37:00

In this course, you’ll learn about the origins of modern privacy law and theory. What is anonymity? How do we define privacy harms? You'll see how these relate to today’s privacy questions and dilemmas. You’ll also learn about commonly recognized frameworks such as the Fair Information Practice Principles, the OECD model for protecting privacy and data security and the phases of the data life cycle.
Privacy in engineering

Course - 01:24:00

In this course, you’ll cover a broad range of topics like risk management, the software development life cycle and requirements gathering. We’ll also go in-depth on systems architecture, modeling and documentation, design patterns and defining privacy harms from an engineering prospective. Finally, we’ll explore systems testing from all angles.
Encryption

Course - 00:52:00

In this course, students will explore privacy and encryption fundamentals. We’ll start with a high-level overview, including many of the terms you’ll need to fully understand encryption concepts. The course then delves into ciphers, algorithms and concepts like randomness and types of cryptographic attacks. We’ll also cover symmetric and asymmetric encryption in depth and talk about cryptographic hashing. We’ll round out the course with a look at public-key infrastructure (PKI) and cryptographic systems.
Identity

Course - 00:33:00

This course discusses the concept of identity. There are many levels at which we can identify a individual, from completely identified to completely anonymous. We’ll cover these in depth and explain why these concepts are important to safeguarding data and privacy. We’ll also explore anonymization concepts and techniques. Finally, we'll take an in-depth look at authentication concepts and practices, as well as some of the challenges identity presents in today’s privacy environment.
Designing privacy interfaces

Course - 01:06:00

This course is all about keeping the user and privacy in focus in our designs. We’ll explore some of the psychology behind how users make privacy-related decisions and why the privacy paradox sometimes prevents individuals from making the choices they really want to make. We’ll cover UX concepts and review the various kinds of privacy-related interfaces our users need.
Surveillance & tracking

Course - 01:18:00

This course gets into the ways in which users are tracked, and how they can protect themselves. We’ll look at why companies, organizations and governments track and surveil users as well as the underlying internet technologies that make tracking users possible. We’ll cover web tracking, email tracking, location tracking, audio and video surveillance and sensor-based surveillance. We’ll also tackle some of the ethical questions connected to these technologies.
Interference

Course - 00:30:00

Surveillance can cause decisional interference, psychological interference and even physical interference in peoples’ lives. In this course, we’ll talk about the ways in which spam, behavior profiling, machine learning, cyberbullying and more can change the way people behave and the kinds of decisions they make. We’ll also cover some best practices to reduce these harms.
Cybersecurity principles

Course - 00:30:00

In this course, you'll learn about how cybersecurity principles can help to protect privacy. We’ll discuss concepts like the CIA Triad, dealing with adversaries and attacks and malware, and principles like least privilege and implementing multiple layers of defense.
Data governance

Course - 00:25:00

A look at data governance and data privacy. We’ll talk in-depth about data governance, a few representative privacy laws and how compliance and technology intertwine. We’ll also cover the principles of privacy by design, which help us put our users and their privacy needs front and center when we are creating and maintaining our apps and systems.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo