top of page

About

CIPT Training & Certification, teaches "Privacy in Technology" and is the how-to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. 


Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP’s ANSI-accredited Certified Information Privacy Technologist (CIPT) certification program.


Where is this course available?


This course is available In-Person in Doha, Qatar, Dubai, Abu Dhabi in UAE & Riyadh in Saudi Arabia, Muscat in Oman and Amman in Jordan as well as being available Online Worldwide.


Why Should I Take This CIPT Course?

Data privacy regulations worldwide require privacy protections be

built into products and services. IAPP Privacy in Technology training,

aligned with the ANAB-accredited CIPT certification program, will provide you with the knowledge to recognise privacy threats and skills to apply technical strategies to mitigate privacy risk throughout the software and systems development lifecycles.


What Will I Learn though this CIPT Training?

Privacy in Technology training teaches technology and data professionals how to understand and integrate strategies and techniques to minimise privacy threats. The curriculum includes

privacy-by-design principles; implementing data- and process-oriented strategies to support privacy policies; and managing threats from AI, location tracking, etc.


Who is this CIPT Course by IAPP for?

Software developers, information security professionals, data architects, privacy engineers, network and cloud engineers responsible for incorporating privacy controls into technology operations and product development. Training helps with career advancement and preparing for CIPT certification testing.

Modules

AIGP.png

Module 1 : Identifying Security Compliance Measures

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 2 : Recognizing and Addressing Social Engineering Attack

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 3 : Securing Devices

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 4 : Using the Internet Securely

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

Soft Gradient Background

Receive an Official ISACA Certificate

LinkedIn_logo_initials.png

Receive a LinkedIn Badge

Gain a Certificate After Completion

Highlight your achievement by adding this credential to your LinkedIn profile, CV, or résumé. Your digital certificate will be awarded upon successful completion of the programme, giving you a recognised credential to share with employers, colleagues, and clients.

Course Certificate.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png

Exam Details

  • Format: 90 multiple-choice questions

  • Delivery: Computer-based testing at over 6,000 Pearson VUE test centers worldwide or Online


Certification Process


  1. Purchase the Exam: Register for the CIPT exam through the IAPP website.

  2. Schedule the Exam: After purchase, schedule your exam via Pearson VUE, choosing between in-person or remote proctoring options.

  3. Prepare for the Exam: Utilize the BoK, Exam Blueprint, and other study resources provided by the IAPP.

  4. Take the Exam: Complete the 2.5-hour exam within one year of purchase.

  5. Maintain Certification: Upon passing, maintain your certification by adhering to the IAPP's Continuing Privacy Education (CPE) requirements and paying the Certification Maintenance Fee.

Course Study Options

Self Study

Online Study at Your Own Pace

In-Person Training

12 Locations in Middle East. View

Live Online Training

Course Duration : Flexible

Soft Gradient Background
sandra 1.png

Discuss This Course With Us

Hello, I’m Sandra, a Business Development Manager at MENA Executive Training.

I'm here to talk you through the details of this course, answer any questions you may have and help get you booked in!

You May Also Be Interested In

Rock Logo
IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Soft Gradient Background
Qatari Man.png
a.jpg

CIPT | Certified Information Privacy Technologist by IAPP

Taught : Online & In-Person & Self-Study

Official Training

Language : English, Arabic

Duration : Flexible

Rock Logo
bottom of page