GDPR Data Privacy Technologist

The training course on the information security of personal data and data protection by design and by default.


4 days of training from 9:00-13:00

Open and corporate formats

Online, Minsk, Moscow, Kiev

English, Russian

Trained by us


Ensuring the security and privacy of data at all stages of their life cycle is one of the main tasks in the modern world. This course offers the main aspects of ensuring data privacy in IT products and IT services.

The course does not rely on a specific standard or legal document. It aims to build processes for the active provision of privacy by observing the basic principles of ensuring data privacy in the development and use of modern technologies and services.

The course examines the basic requirements for privacy by the competent authorities of different countries, the principles and problems of ensuring privacy in the most popular technologies and services.

The course prepares specialists responsible for the technical support of data privacy in companies during the development and operation of software and other services or technologies.



Trainer in data protection technology and information security management
Certified Information Privacy Technologist (CIPT), GDPR Data Privacy Professional (GDPR DPP). Professional in the field of IT infrastructure, information security, risk management, and business continuity. Chief Information & Data Protection Officer, and member of the Directors Council at Intetics Inc.

Member of the International Association of Privacy Professionals (IAPP)

After the course you can answer the following questions

privacy student
What is privacy in technologies and why do you need it?
What is Privacy by Design?
privacy student
privacy student
What are proactive approach and embedded privacy in practice?
What principles and techniques you can use to incorporate privacy in technologies?
privacy student
privacy student
How does privacy in technologies can help you comply with the GDPR?
How to provide privacy in dealing with contractors and partners?
privacy student
privacy student
How to manage data privacy in cloud services and the Internet of Things?


Sergei Tchernyshenko
Open format
12 January - 15 January 09:00-13:00
34500 RUB 31050 RUB to 12 December
Sergei Tchernyshenko
Open format
18 May - 21 May 09:00-13:00
34500 RUB 31050 RUB to 18 April


Clicking on "" will open a description of each item.

Privacy vs Security
Connection between information privacy and security
What is information security
Assessing information security risks
What is privacy
Assessing privacy risks (Taxonomy of Privacy)
Privacy vs. security incidents
Privacy and infosec differences
Privacy regulation
Brief introduction into history of European privacy legislation
Technical data protection requirements under GDPR
Technical privacy requirements under ePrivacy Directive
Privacy protection in the USA
Data protection in other regions
Data protection trends
Brief introduction into technical infrastructure
Physical environment (Ethernet, Wi-Fi, Bluetooth etc)
Major network protocols
Databases and SQL-servers
Active Directory and Single Sign-On
SSO, SAML and AD federation services
Symmetric and asymmetric cryptography. Secure protocols
Cloud systems and services
Protection against technical privacy and security risks
Information infrastructure of organization: local systems, local and global networks, cloud systems
Risks to information systems (SQL-injections, XSS-attacks, OWASP etc)
How to protect information systems
Risks to local networks (network attacks, viruses, botnets etc)
How to protect local networks
Risks to global networks (traffic interception, loss of mobile devices etc)
How to protect global networks
Cloud system risks
How to protect cloud systems
Architecture of secure systems (examples)
Protection against organizational privacy and securityrisks
Organization components (departments, clients, remote users, vendors, subcontractors)
Production related risks on the case of software development
Risks at sales and marketing departments
Risks at recruitment departments
Risks at HR departments
Other departments risks (finance, legal, IT etc)
Risks related to remote users and entities (inc. BYOD)
Risks related to contractors and vendors
Information life cycle and full cycle protection
Secure system design
Privacy by Design
Data protection by Design and by Default
What is State of the Art
State of the Art in practice
Privacy enhancing technologies (PETs)
OWASP Top 10 Privacy Risks 2015
Information security and privacy frameworks
Demonstrating GDPR compliance to clients
Nymity Privacy Management Accountability Framework
ISO/IEC 27001:2013 Standard
ISO/IEC 27701:2019 Standard
Choosing right framework
Privacy issues in modern technologies
Cookies and tracking
Online Ads
Social networks button
IoT devices
Wi-Fi, NFS, Bluetooth, RFID
CCTV and facial recognition
Tips for protecting privacy

Training format

4 full days
The combination of theory and real cases
9 informative blocks

Hurry up

Online, Russian, Sergei Tchernyshenko, 12 January - 15 January,
34500 RUB *
Early bird
31050 RUB *
Save money by registering today!
*Minus VAT

Certificate on completion

Certificate in English recognizable in CIS. Attachment to certificate include the course program. Training is an organizational measure, and is a duty reflected in the General Data Protection Regulation, Articles 24, 25, 28, 32 and 39

Sample Certificate GDPR Data Privacy Professional - GDPR DPT



    The course is loading, wait a few seconds