The rise of privacy engineers

Data Protocol’s Privacy Engineering program provides engineers the foundational skills to build privacy and data security into their products and processes.  The curriculum for this certification program teaches and tests developers’ ability to design secure data processes and address pre-existing vulnerabilities.

Led by visionary privacy technologist Nishant Bhajaria, Data Protocol’s Privacy Engineering certification validates design skills, technical knowledge, and topical proficiency. The eight course certification program and hands-on labs lay the foundation for effective data management and provide valuable situational experience. The future will value data management and privacy more with each year and each innovation. Privacy engineers are rising to meet the challenge. Join them by signing up today as a Launch Partner.

Our ALL-STAR instructors

Nishant Bhajaria

Head of Privacy Architecture & Strategy, UBER

Nishant Bhajaria is an executive leader and industry-expert in the privacy and security space and currently serves as the Head of Privacy Engineering and Governance at Uber.

He plays the critical role connecting engineering, legal, and leadership to ensure data protection for both the user and the business. Prior to Uber, Nishant spearheaded compliance and privacy engineering programs at Google, Netflix and Nike.
In addition to speaking extensively in this space and hosting a data privacy learning series on LinkedIn, Nishant has a forthcoming book titled Data Privacy: A Runbook for Engineers - a deep dive into strategies on effectively identifying, communicating and addressing privacy risks using technical strategies.

Engin Bozdag

Senior Privacy Architect

Kim Emiru

Director of Legal Privacy

a new approach to


Data Protocol trains and certifies software builders in responsible data management. The time to apply privacy training and data best practices is before there is a problem, not after.

Accelerate Growth
Minimize Risk
Confidence to Build Fast
Designed for Developers

why data protocol?

Data Protocol enables developers and developer-centric companies to build and ship products faster with less risk of mistakes and penalties.
Why Data Protocol

Happening now at Data Protocol


The privacy engineering curriculum is structured in three modules: governance, systems, and execution.

Data Classification

Data classification is the foundation of privacy engineering. If you can’t identify and measure the risk profile of your data, you can’t manage its value, its flow, or its security. This course will teach you how to classify and map data throughout your systems according to its risk level, retention requirements, and access policies.

Data Categorization

With a strong foundation of data categorization in place, this course will teach you the techniques to optimize data flow in support of privacy and business operations. Specifically, you will learn about tagging data, building a system architecture to discover data, and measuring the success of your categorization program. These techniques will enable you to identify all of your data and automate privacy. 

Privacy Tech

The importance of data privacy and the rise of privacy engineering has driven innovation and availability of privacy technologies. As a privacy engineer, you have options. Determining what tools to use for your specific needs is an important part of the job. In this course, you will begin to consider what tools you will need to execute your plan, and why. Specifically, you will learn some of the key players in the privacy tooling space, the criteria you should use when shopping for solutions, and the pros and cons of building versus buying. 

Beyond Privacy Review - Technical Privacy Consulting

You have learned how - and why - privacy should be designed into your systems, your processes, and your products. As a privacy engineer, you work to limit risk as early as possible with both a strategic plan and the right tools. It is also your job to maintain the program you’ve designed and built by continually assessing risks and protections.  In this course, you will learn a new approach to the traditional privacy review, a process that often occurs too late. Implementing ongoing technical privacy consulting throughout your existing program will reduce risks and avoid costly mitigations.

Data Sharing

Data is most at risk when it is motion, but data sharing is a necessity to support customer engagement, business continuity, and product innovation. Effective privacy engineering eliminates the need to choose between the two. In this course, you will learn to prioritize data minimization, anonymization, and channel segmentation to protect data in motion while ensuring it is available when and how it is needed. Finally, you will learn how to quantify the impact of your efforts to manage privacy risk.

Consent Management

Data management should start at the source. Implementing an effective consent management system is critical to protecting and operationalizing data. In this course, you will learn the proper way to  secure and maintain informed, granular consent in compliance with data regulations and to promote user trust. You will learn how to implement a flexible Consent Management Platform and manage the common complexities created by  multiple variables, such as features, locations, and version control.

Data Deletion

Data deletion is critical to regulatory compliance and overall privacy protection. Effective data classification and categorization enable data deletion upon request or once it is no longer required. In this course, you will learn about implementing, automating, and scaling deletion in a distributed environment. This includes the basics of deletion, how designing a process for deletion relies on understanding the data collection architecture, and the tools and processes you will use from implementation to scaling.

Security & Privacy

A privacy engineer does not need to be a security expert, but you do need to understand how to manage and use data securely. In this course, you will learn how to build a framework that reduces the attack surface for sensitive data and how to implement tools for the  management of access control and monitoring, such as Access Control Lists (ACLs) and encryption keys.

Why is this program structured this way?

For most companies, privacy only becomes a priority after an incident has occurred. When that happens, there’s an urgency to find a solution to fix that incident without doing the work that is needed to prevent it from occurring again. This program is designed to first teach developers how to create sound data governance that provides a solid foundation to inform privacy controls.


Privacy Engineering courses and the final assessment for certification will be available to launch partners in late March 2022.

become a launch partner
> Up to Ten (10) Complimentary Seats and assignments
> Ten (10) Privacy Engineering Textbooks
> Discount on Future Seats and Certification (20% off)
> Provide Feedback on Learning Experience
> Provide a logo and name to be presented as a launch partner
> Share Certification with Your Network
© All Rights Reserved 2021
Terms of ServicePrivacy Policy