Certified Data Protection Officer (C-DPO) Training

The Certified DPO training course enables you to develop the necessary knowledge, skills and competence to effectively implement and manage a compliance framework with regard to the protection of personal data.

Description

How will you benefit?

  • Acquire a thorough understanding of the basic concepts and components of the Data Protection Regulation
  • Understand the goal, content of and the correlation between the GDPR and other regulatory frameworks
  • Gain a thorough understanding of the concepts, approaches, methods and techniques for the effective protection of data
  • Interpret the data protection requirements in the specific context of an organisation
  • Develop the expertise to support an organisation to plan, implement, manage, monitor and maintain ongoing compliance to the GDPR

 

What will you learn?

The programme is broken into four modules:

  • Module 1: Introduction to the GDPR and initiation of the GDPR compliance
  • Module 2: Plan the implementation of the GDPR
  • Module 3: Deploying the GDPR
  • Module 4: Monitoring and continuous improvement of GDPR compliance

Please note that the exam is included, students can book the exam through PECB’s system which is remotely invigilated at a time convenient to you.

 

Who Should Attend?

  • Project managers or consultants seeking to prepare and support an organisation in planning, implementing, and maintaining a compliance program based on the GDPR
  • DPO and Senior Managers responsible for the personal data protection of an enterprise and the management of its risks
  • Members of an information security, incident management and business continuity team
  • Expert advisors involved in security of personal data
  • Technical experts and compliance experts seeking to prepare for a DPO role

Similar events

The Certified Information Security Manager (CISM) qualification is an international professional certification offered by ISACA for Information Security Managers. The certification recognises an individual's ability to design, implement and manage an information security programme.

More Information

The Practitioners Certificate in Information Assurance Architecture (PCIAA) course prepares the student for a career in security architecture. A Security Architect (SA) is a senior-level enterprise architect role, either within a dedicated security team or as part of a more general Enterprise Architecture (EA) team.

More Information

The Practitioner Certificate in Information Risk Management (PCiIRM) provides thorough guidance on building a business focused ISMS strategy. Demonstrate your ability to deliver a robust system in line with ISO 17799, ISO 27001 and BS 7799-3 standards and make sure you are up-to-date with UK legislation, as well as international frameworks. Over five days you will work with BCS qualified professionals, learning how to understand and prevent threats to data within specific technical business environments.

More Information

NCSC Certified consultant training course will provide the latest understanding of the scope and requirements of the Cyber Essentials Standard. This will enable you to become a fully certified Cyber Essentials Consultant. The workshop-style training tasks and tips to ensure the participant leaves with practical knowledge to implement Cyber Essentials into businesses from within any industry and of any size.

More Information

The NIST Cybersecurity Framework 800-53 Practitioner course, is an overlay course, based on the NIST Cyber Security Framework, a publication of the National Institute of Standards and Technology.

More Information

The NIST Cybersecurity Framework Foundation course, is an overlay course, based on the NIST Cyber Security Framework (NIST-CSF), a publication of the National Institute of Standards and Technology.

More Information

Gain core knowledge and experience to successfully implement and manage security programs and prepare for the 2024 CISSP certification. This 2024 updated course is the most comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that are covered in the CISSP exam.

More Information