Course Overview

Protecting private information has vital and obvious implications for everyday life, and the only way companies can successfully do this is to create a culture of privacy. The only solution—the only way to change people’s behavior—is to embed privacy in the very fabric of the organization. That is why Privacy by Design, a decades-old application design, and development strategy, is now being discussed as a foundational strategy for entire organizations. The original goal of Privacy by Design was to develop best practices that ensured application developers were building privacy into their products from the ground up. Even if concern for customer or employee privacy was not the highest priority, there was always profit—it is very expensive to re-engineer privacy into a product following a failure. Today, these best practices are more important than ever. Increasing amounts of data have created an ever-expanding attack surface, and complex new regulations demand a foundational approach to privacy. In fact, Article 25 of the GDPR is titled “Data Protection & Privacy by Design and by Default.” Organizations face an ever-growing number of attack vectors related to privacy, including the internet of things (IoT), government and business data over-collection, and unread mobile app permissions such as allowing scanner apps to keep and sell the data they scan.

This course is not about the GDPR, though it can certainly be used as a process for data protection & privacy by design and default (Article 25 of the regulation). Most probably, you are already enrolled in my bestseller “Build EU GDPR from the scratch course” which goes for GDPR from all perspectives. This course is not meant to comply with any specific regulation, though the use of the correct privacy-by-design process herein will help organizations comply with many regulations. This course is about how to build better processes, products, and services that consider individuals’ privacy interests as a design requirement. It is about how to build things that people can trust.

There are four sections I have created. Section 2 provides introductory remarks, including an introduction to Ann Cavoukian’s 7 Foundational Principles of Privacy by Design, a short history of regulatory adoption, and past challenges that privacy-by-design practitioners have faced. Given its 10-year history in the privacy professionals’ community, many readers may already be familiar with Cavoukian’s principles. This section also contains something most privacy professionals, outside academia, may not be aware of. Here I discuss what I feel is the impetus for why companies must build privacy into their processes, products, and services and not rely on individuals’ self-help to protect their own privacy.

What You Will Learn

  • Privacy by Design
  • Privacy Interest
  • Create a Privacy Model
  • Use a Privacy by Design methodology
  • Perform risk analysis from privacy perspective

Program Curriculum

  • How Was Privacy by Design Adopted During Time?
  • Privacy by Design - Principle I
  • Privacy by Design - Principle II
  • Privacy by Design - Principle III
  • Privacy by Design - Principle IV
  • Privacy by Design - Principles V, VI, and VII
  • Are There Any Challenges?
  • It is Extremely Important to Include Privacy from Early Stages?
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • What Is This Section About?
  • Individuals
  • Important Actors
  • Links and Relationships
  • Privacy by Design - Example I
  • Privacy by Design - Example II
  • Privacy by Design - Example III
  • Violations - Overview
  • Information Collection
  • Information Processing (Part I)
  • Information Processing (Part II)
  • Information Dissemination (Part I)
  • Information Dissemination (Part II)
  • Invasions
  • Centralization
  • Identifiability
  • Chapter 2 Quiz

  • Privacy Data-Oriented Strategies - SEPARATE
  • Privacy Data-Oriented Strategies - MINIMIZE (Part I)
  • Privacy Data-Oriented Strategies - MINIMIZE (Part II)
  • Privacy Data-Oriented Strategies - HIDE
  • Privacy Data-Oriented Strategies - ABSTRACT
  • Privacy Data-Oriented Strategies - ENFORCE
  • Privacy Data-Oriented Strategies - DEMONSTRATE
  • Privacy Data-Oriented Strategies - INFORM
  • Privacy Data-Oriented Strategies - CONTROL
  • Privacy Data-Oriented Strategies - Architecture Redux
  • Information Flow
  • Domains and Subdomains
  • App Example
  • Chapter 3 Quiz

  • Risk Analysis from Privacy Perspective
  • A FAIR Method for Privacy Risk
  • What is Frequency?
  • Vulnerability
  • Magnitude
  • How to Apply Controls? (Part I)
  • How to Apply Controls? (Part II)
  • Risk at the Organization Level
  • Quantitative Risk Management - Example I (Part I)
  • Quantitative Risk Management - Example I (Part II)
  • App Example
  • Chapter 4 Quiz

  • The Purpose of This Methodology
  • Quality Attributes
  • Identify Information Needs
  • Imposing Controls - Architect and Secure
  • Imposing Controls - Supervise and Balance
  • Online Behavioral Advertising and Mobile Phone Monitoring
  • Integrating Privacy by Design into the Business
  • How the Methodology Meets the Initial Principles?
  • The App Under the Methodology
  • Chapter 5 Quiz
Load more modules

Instructor

Roland Costea

Trainer

Roland is a cybersecurity, privacy, and cloud leader and strategist with a demonstrated experience in running cybersecurity & cloud business units, practices, divisions from zero to maturity with year over year quality growth and quota over-achievement (projects of more >50 million euro/year). Roland has the following certifications: CISSP, CIPM, CIPT, CIPP/E, CRISC, CISM, CCSK v4, CCSP, LPT, CEH, ISO 27001LA, TOGAF.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8