4
H
7
M
Time
intermediate
difficulty
4
ceu/cpe
Course Content
Hypothetical Use Case #2
How to Adopt NIST Privacy Framework
Hypothetical Use Case #1
How to Adopt NIST Privacy Framework
Ready, Set, Go
How to Adopt NIST Privacy Framework
Implementation Tiers
NIST Privacy Framework Implementation Tiers
Industry Specific Profiles
NIST Privacy Framework Profiles
Profiles
NIST Privacy Framework Profiles
Protective Technology
NIST Privacy Framework Core: Protect
Maintenance
NIST Privacy Framework Core: Protect
Data Security
NIST Privacy Framework Core: Protect
Identity Management, Authentication and Access Control
NIST Privacy Framework Core: Protect
Data Protection Policies, Processes & Procedures
NIST Privacy Framework Core: Protect
Data Processing Awareness
NIST Privacy Framework Core: Communicate
Communication Policies, Processes & Procedures
NIST Privacy Framework Core: Communicate
Disassociated Processing
NIST Privacy Framework Core: Control
Data Processing Management
NIST Privacy Framework Core: Control
Data Processing Policies, Processes & Procedures
NIST Privacy Framework Core: Control
Monitoring and Review
NIST Privacy Framework Core: Govern
Awareness and Training
NIST Privacy Framework Core: Govern
Risk Management Strategy
NIST Privacy Framework Core: Govern
Governance Policies, Processes & Procedures
NIST Privacy Framework Core: Govern
Data Processing Ecosystem Risk Management
NIST Privacy Framework Core: Identify
Risk Assessment
NIST Privacy Framework Core: Identify
Business Environment
NIST Privacy Framework Core: Identify
Inventory Mapping
NIST Privacy Framework Core: Identify
Breakdown of the NIST Privacy Framework
Overview of the NIST Privacy Framework
Course Description
The NIST Privacy Framework courseprovides students with an understanding of how to implement privacy protections into their services and operations and products and handle and manage privacy risks. Although many security professionals are familiar with cybersecurity best practices, privacy issues can present different challenges based on products or services that potentially violate privacy, varying approaches to managing privacy risks, and an ever-changing regulatory landscape.