BCS Practitioner Certificate in Data Protection Training Course
Who is it for:
- This course is designed for individuals who already have some responsibility for data protection within their organization.
- It is also beneficial for those seeking to expand their basic knowledge in this field and gain a thorough understanding of the practical applications of data protection laws.
- Although the certificate is based on the UK Data Protection Act, many other jurisdictions have enacted similar data protection laws. Therefore, international candidates may find this course useful as well.
What will I learn:
Upon completion of this course, candidates will be able to:
- Understand the key changes and implications introduced by the GDPR and the UK Data Protection Act 2018.
- Grasp the responsibilities of individuals and organizations under the GDPR and the UK Data Protection Act, with a focus on effective record keeping.
- Apply the new rights available to data subjects and understand the implications of these rights.
- Demonstrate an understanding of the role, position, and tasks of a data protection officer.
- Prepare organizations to manage and handle personal data in compliance with the GDPR and the UK Data Protection Act.
Course Outline
The syllabus includes training objectives, details of modules and a recommended reading list:
Please note: This certification is being refreshed in line with legislative updates in this space as of 30 April 2021.
Summary outline:
- Context of data protection legislation.
- Principles of data protection and applicable terminology
- Lawful basis for processing of personal data
- Governance and accountability of data protection within organisations
- Interaction between Controller and Processor, and role of third parties
- Transfers of personal data to third countries or international organisations
- Data Subject Rights
- The role of the Information Commissioner’s Office (ICO) and Independent Supervisory Authorities (ISAs)
- Breaches, enforcement and liability
- Processing of personal data in relation to children
- Privacy and Electronic Communications (EC Directive) Regulations (PECR) 2003
NobleProg is a BCS Accredited Training Provider.
This course will be delivered by an expert NobleProg trainer approved by BCS.
The price includes delivery of the full course syllabus by an approved BCS trainer and the BCS Practioner Data Protection exam (which can be taken remotely in your own time and is invigilated centrally by BCS). Subject to successfully passing the exam (multiple choice, requiring a score of at least 65% to pass) participants will hold the accredited BCS Practitioner Certificate in Data Protection.
Requirements
It's ideal if you hold the BCS Foundation Certificate in Data Protection, though this is not mandatory.
We strongly recommended that candidates attend an accredited training course and are fully familiar with GDPR and the syllabus and any recommended reading outlined in the syllabus.
Open Training Courses require 5+ participants.
BCS Practitioner Certificate in Data Protection Training Course - Booking
BCS Practitioner Certificate in Data Protection Training Course - Enquiry
BCS Practitioner Certificate in Data Protection - Consultancy Enquiry
Testimonials (1)
Really enjoyed the topics covered and the way that the trainer ran the session
Richard
Course - BCS Practitioner Certificate in Data Protection
Upcoming Courses
Related Courses
BCS Practitioner Certificate in Business Continuity Management
21 HoursWho is it for:
This certification is designed for anyone involved in the fields of information security and information assurance.
It is also relevant to individuals who require a comprehensive understanding of Business Continuity Management, as well as those working in areas related to information security and information assurance.
What will I learn:
Candidates will be able to demonstrate:
- The importance and role of business continuity management within an organization
- The stages involved in the business continuity management life cycle
- The key components of a business continuity management program
- The significance of risk assessment in business continuity management
- The various options for developing a business continuity management strategy
- How to prepare and develop plans for responding to business continuity challenges
- The importance of testing, maintaining, and reviewing these plans
- The necessity of fostering awareness and understanding of business continuity management within the organization
BCS Practitioner Certificate in Information Assurance Architecture (CIAA)
35 HoursWho is it for:
This program is designed for security professionals who aim to gain a comprehensive understanding of both the technical and business dimensions of the field, as well as anyone aspiring to work in security architecture.
- System administrators looking to transition into the role of security architects
- Technical architects interested in shifting their focus to security architecture
The certificate also serves as a valuable addition for individuals who have or are pursuing CCP status in Information Assurance (IA).
What will I learn:
Upon completion, candidates should be able to:
- Explain the business context and the information risks associated with various systems.
- Articulate and implement security design principles.
- Identify information risks that may arise from different solution architectures.
- Create alternative architectures or countermeasures to address identified information risks.
- Verify that proposed architectures and countermeasures effectively mitigate the identified information risks.
- Apply standard security techniques and architectures to reduce security risks.
- Develop new architectures to manage risks introduced by emerging technologies and business practices.
- Offer consultancy and guidance on Information Assurance and architectural challenges.
- Configure ICT systems in accordance with their approved security architectures.
BCS Foundation Certificate in Information Security Management Principles (CISMP)
21 HoursWho is it for:
This certificate is ideal for anyone with an interest in information security, whether they are considering it as a career path or seeking to enhance their general business knowledge.
The course is particularly relevant for individuals who need a solid understanding of Information Security Management Principles. It caters to those interested in pursuing a career in information security and those who want to integrate this knowledge into their existing professional roles. The certificate provides a strong foundation that can be built upon with further qualifications or used to ensure that organizations effectively protect their information.
What will I learn:
Candidates will gain the following competencies:
- An understanding of the key concepts related to information security management.
- A clear grasp of current national laws and regulations that affect information security management.
- Familiarity with relevant national and international standards, frameworks, and organizations that support information security management.
- An awareness of the contemporary business and technical environments where information security management is crucial.
- Knowledge of how to categorize, operate, and assess the effectiveness of various types of controls.
BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
28 HoursWho is it for:
This certificate is designed for anyone with an interest in information security, whether they are pursuing it as a career or seeking general business knowledge.
The course is relevant to individuals who need a solid understanding of Information Security Management Principles. It caters to those interested in information security as a potential career path or as an additional aspect of their general business knowledge. This certificate serves as a strong foundation for further qualifications and provides a comprehensive overview to help organizations ensure their information is appropriately protected.
What will I learn:
Candidates should be able to demonstrate:
- An understanding of the concepts related to information security management.
- Familiarity with current national legislation and regulations that impact information security management.
- Awareness of national and international standards, frameworks, and organizations that support the management of information security.
- An understanding of the business and technical environments in which information security management must operate.
- Knowledge of the categorization, operation, and effectiveness of various types of controls.
Note: This is a four-day course that includes an additional day for exam preparation and practice exercises, beyond the standard delivery schedule.
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursWho is it for:
This course is designed for anyone involved in the fields of information security and information assurance.
What will I learn:
Upon completion, participants will be able to:
- Demonstrate how managing information risk can bring significant benefits to a business.
- Explain and effectively use the terminology associated with information risk management.
- Conduct thorough threat and vulnerability assessments, as well as business impact analyses and risk evaluations.
- Understand the principles of controls and risk treatment strategies.
- Present assessment results in a format that can serve as the foundation for a risk treatment plan.
- Utilize information classification schemes effectively.
BCS Foundation Level Certificate in DevOps
14 HoursWho is it for:
This course is designed for individuals who are involved in or implementing the DevOps process. It caters to roles such as DevOps evangelists, automation architects, cloud infrastructure engineers, software developers, software testers, security engineers, database administrators, and product owners. For a more comprehensive list of roles, please refer to the syllabus below.
What will I learn:
By the end of this training, participants will be able to demonstrate their knowledge, understanding, and basic application of various aspects of DevOps, including:
- The origins of DevOps
- The benefits of adopting DevOps practices
- The importance of culture and teamwork in DevOps
- Automation techniques and tools
- Lean principles in the context of DevOps
- Measurement strategies for continuous improvement
- The value of sharing knowledge and best practices
- Common roles within a DevOps environment
- Practices and techniques used in DevOps
- Methods and approaches for effective team collaboration
Format of the Course:
- Interactive lectures and discussions to engage participants.
- A variety of exercises and practical activities to reinforce learning.
- Hands-on implementation in a live-lab environment to apply concepts in real-world scenarios.
BCS Essentials Certificate in Artificial Intelligence Preparation
7 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at beginner-level IT professionals who wish to learn about the potential benefits, risks, and challenges of implementing AI projects.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, techniques, and ethical considerations of AI.
- Be familiar with real-world applications and challenges in AI.
- Gain confidence to take the BCS Essentials Certificate in Artificial Intelligence exam.
- Develop a practical approach to AI implementation in their professional environments.
NobleProg is a BCS Accredited Training Provider.
This course will be delivered by an expert NobleProg trainer approved by BCS.
BCS Foundation Certificate in Data Protection
21 HoursThis course is designed for anyone who needs to understand data protection, with a particular focus on the General Data Protection Regulation (GDPR).
By the end of the course, participants should be able to:
- Hold a recognized qualification in data protection.
- Understand the key changes introduced by the GDPR and the Data Protection Act (2018) to data protection practices.
- Grasp the new rights afforded to data subjects and the implications of these rights under the GDPR and the Data Protection Act (2018).
- Comprehend individual and organizational responsibilities under the GDPR and the Data Protection Act (2018), with a particular emphasis on effective record-keeping.
- Understand the increased obligations for data controllers and data processors that have come into effect with the implementation of the GDPR and the enactment of the Data Protection Act (2018).
- Better support their organization in processing customer data in compliance with the GDPR and the Data Protection Act (2018).
BCS Foundation Certificate in Artificial Intelligence
21 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at beginner-level IT professionals who wish to learn both theoretical knowledge and practical understanding of AI concepts, ensuring they are well-prepared to pass the BCS Foundation Certificate exam and apply AI solutions effectively in their professional roles.
By the end of this training, participants will be able to:
- Understand core concepts of artificial intelligence (AI).
- Learn about AI applications, techniques, and tools.
- Identify the benefits, risks, and challenges associated with AI.
- Gain insights into ethics and governance in AI.
- Be prepared to take the BCS Foundation Certificate in AI exam.
NobleProg is a BCS Accredited Training Provider.
This course will be delivered by an expert NobleProg trainer approved by BCS.
GDPR Workshop
7 HoursThis one-day course is designed for individuals seeking a concise overview of the GDPR – the General Data Protection Regulation that came into effect on May 25, 2018. It is particularly suitable for managers, department heads, and employees who need to grasp the fundamental principles of the GDPR.
How to Audit GDPR Compliance
14 HoursThis course is primarily designed for auditors and other administrative professionals who are responsible for ensuring that their control systems and IT environments comply with current laws and regulations. The course will start by providing a thorough understanding of key GDPR concepts and how they impact the work of auditors. Participants will delve into the rights of data subjects, the obligations of data controllers and processors, and the enforcement and compliance mechanisms outlined in the Regulation. Additionally, the training will cover the audit program provided by ISACA, which equips auditors to review GDPR governance and response strategies, as well as supporting processes that can help manage the risks associated with non-compliance.
GDPR Advanced
21 HoursThis course delves deeper into the General Data Protection Regulation (GDPR) and is tailored for individuals who work extensively with it, particularly those who may be part of the GDPR team. It is especially suitable for IT, human resources, and marketing professionals who will be heavily involved in GDPR compliance.
PECB GDPR - Certified Data Protection Officer
35 HoursThe PECB Certified Data Protection Officer training course equips you with the essential knowledge and skills needed to effectively perform the role of a data protection officer in implementing a GDPR compliance program.
Why should you attend?
As data protection becomes increasingly important, organizations are under growing pressure to safeguard this information. Non-compliance with data protection regulations not only infringes on individuals' fundamental rights and freedoms but can also result in significant risks that may damage an organization's credibility, reputation, and financial standing. This is where your skills as a data protection officer play a crucial role.
The PECB Certified Data Protection Officer training course will provide you with the knowledge and skills necessary to serve as a Data Protection Officer (DPO), helping organizations ensure they meet General Data Protection Regulation (GDPR) requirements.
Through practical exercises, you will gain mastery over the DPO role and become proficient in informing, advising, and monitoring GDPR compliance, as well as collaborating with supervisory authorities.
After completing the training course, you can take the exam. If you pass successfully, you can apply for the “PECB Certified Data Protection Officer” credential. This internationally recognized certificate will demonstrate your professional capabilities and practical knowledge in guiding controllers and processors on how to fulfill their GDPR compliance obligations.
Who should attend?
- Managers or consultants aiming to assist organizations in planning, implementing, and maintaining a GDPR-based compliance program
- Data Protection Officers (DPOs) and individuals responsible for ensuring GDPR compliance
- Members of information security, incident management, and business continuity teams
- Technical and compliance experts preparing to take on a data protection officer role
- Expert advisors focused on personal data security
Learning objectives
- Gain a comprehensive understanding of GDPR concepts and interpret its requirements
- Understand the content and interrelation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134
- Acquire the competence to perform the role and daily tasks of a data protection officer within an organization
- Develop the ability to inform, advise, and monitor GDPR compliance and collaborate with supervisory authorities
Personal Data Protection Officer - Basic Level
21 HoursPurpose of the Training
- Acquainting the audience with systematized, comprehensive issues of the functioning of personal data protection on the basis of Polish and European law
- Providing practical knowledge about the new rules for the processing of personal data
- Presentation of the areas of the greatest legal risks in connection with the entry into force of the GDPR
- Practical preparation for independent performance of the duties of a Personal Data Protection Officer
Personal Data Protection Officer - Advanced Level
14 HoursPurpose of the Training
- Gaining practical knowledge on how to perform the tasks of the Inspector
- Gaining practical knowledge of how to audit and how to assess risk
- Providing practical knowledge about the new rules for the processing of personal data