Course Overview

Privacy is a fundamental right, and at the organizational level, information assets like personal data, sensitive information, and intellectual property are vital to business value. This makes them attractive targets for malicious actors seeking to exploit them. A successful attack compromising confidentiality, integrity, or availability can harm business operations, damage reputation, and lead to fines or regulatory actions. To mitigate these risks, it's essential to understand the key issues in handling information assets from creation to destruction, allowing for effective preventative controls and countermeasures. 

This course will provide you with the knowledge and mindset to identify threats to privacy that could affect your organization, the vulnerabilities that could be exploited (by both insiders and external entities), and effective ways to reduce the risks. The course aims to give you a comprehensive view of the topic, which lies at the confluence of privacy, data protection, and ethical considerations, all within the current legal and regulatory framework. This course begins with an overview of its content, structure, and objectives. You will then explore essential definitions of cybersecurity, followed by a historical context of human rights and data protection laws. Next, you will dive into topics like data classification, life cycle management, and the handling of digital and physical data. Additionally, the course covers the threat landscape, common vulnerabilities, risks of compromised data, and techniques to mitigate these risks. Ethical considerations and the operationalization of best practices in an organizational context round out the course. 

By the end of this course, you will have a clear understanding of the key factors at play when considering privacy, the risks related to it, the context where it sits, and the practical controls to reduce negative consequences. 

What You Will Learn

  • Learn about the historical background and context of privacy and human rights
  • from a legal and ethical perspective.
  • Gain information on the importance of information assets
  • their classification
  • and an overview of the data lifecycle.
  • Learn about information systems that support processing of data
  • and their vulnerabilities
  • associated with existing threats.
  • Analyze data aggregation
  • inference
  • anonymization
  • and pseudonymization techniques.
  • Find out what takes part in the perception of privacy
  • including nudging
  • behavioral economics and cyber psychology
  • and how to integrate these into the organizational culture.
  • Analyze the conditions for lawful consent
  • cookies
  • data being sold in bulk for marketing campaigns
  • the role of AI in automated decision making
  • etc.

Program Curriculum

  • Course Welcome and Brief Introduction
  • Course Content and Elements

  • Key Definitions: Privacy, Data Protection, Security, and Safety
  • CIA, AAA, Threat, Vulnerability, Attack, Exploit, (Information) Asset
  • FIPP, OECD Privacy Principles, and GDPR Principles
  • Chapter 2 Quiz

  • European Convention on Human Rights (ECHR)
  • Convention 108
  • European General Data Protection Regulation (GDPR)
  • Chapter 3 Quiz

  • Not All Data is Created Equal
  • Data, Information, Knowledge, Wisdom
  • Sensitivity and Clearance Levels
  • Stages in the Data Life Cycle
  • Data Inventories and Data Flow Diagrams
  • Cross-border Data Flows, a Case Study
  • Chapter 4 Quiz

  • Digital vs. Physical
  • Data Format Types & Metadata
  • Data Mapping for Discovery
  • Sub-processing and 3rd Party Management of Data
  • Deletion and Retention Schedule
  • Chapter 5 Quiz

  • Threat Actors and Threat Vectors
  • Motivation, Sophistication, and Persistence
  • Recent Case and a Discussion on Detection and Containment
  • Chapter 6 Quiz

  • Types of Vulnerabilities
  • Common Flaws and Deficiencies
  • Chapter 7 Quiz

  • Types of Risk
  • Recent Examples of Attacks and Their Impacts
  • Chapter 8 Quiz

  • Detection and Dwell Time
  • Types of Controls (Administrative, Physical, and Technical)
  • Controls in Action: Preventive, Detective, and Corrective
  • Control Design vs. Operational Effectiveness
  • Tools and Techniques for System Hardening
  • Chapter 9 Quiz

  • What is Bias and Bias in AI?
  • Biometric Recognition
  • The Privacy Paradox
  • Privacy Conceptualizations: Westin, Altman, Petronio, and Nissenbaum
  • Chapter 10 Quiz

  • Privacy by Design and by Default
  • How to Entice Employees to Adhere to Policies
  • Provision of Training vs. Influence on Behavior
  • Chapter 11 Quiz
Load more modules

Instructor

Anselmo Diaz Valiente

Anselmo Diaz Valiente is a consultant specializing in data protection and information security, with vast experience in auditing and assessing the risk of client organizations in diverse sectors, including finance, Critical National Infrastructure (CNI), healthcare, pharmaceutical, manufacturing, aviation, retail, and digital services. Anselmo also works in academia, as an Associate Lecturer, teaching at both undergraduate and postgraduate levels and acting as an independent assessor for apprentice students. He holds degrees and Masters from The Open University, The Royal Holloway, Edinburgh Napier, and Strathclyde University. Anselmo is a Fellow of Information Privacy (FIP) by the International Association of Privacy Professionals (IAPP), where he is also an Advisory Board Member. Some of his privacy-related certifications include CIPP/E, CIPT, CIPM, and CDPSE. For information security, he has attained CISSP, CISM, CISA, SSCP, PCI DSS QSA, CASP+, ISO/IEC 27001 Lead Implementer and Lead Auditor, and SWIFT Smart. 

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8