Data Protocol’s Privacy Engineering program provides engineers the foundational skills to build privacy and data security into their products and processes. The curriculum for this certification program teaches and tests developers’ ability to design secure data processes and address pre-existing vulnerabilities.
Led by visionary privacy technologist Nishant Bhajaria, Data Protocol’s Privacy Engineering certification validates design skills, technical knowledge, and topical proficiency. The eight course certification program and hands-on labs lay the foundation for effective data management and provide valuable situational experience. The future will value data management and privacy more with each year and each innovation. Privacy engineers are rising to meet the challenge. Join them by signing up today as a Launch Partner.
Head of Privacy Architecture & Strategy, UBER
Nishant Bhajaria is an executive leader and industry-expert in the privacy and security space and currently serves as the Head of Privacy Engineering and Governance at Uber.
He plays the critical role connecting engineering, legal, and leadership to ensure data protection for both the user and the business. Prior to Uber, Nishant spearheaded compliance and privacy engineering programs at Google, Netflix and Nike.
In addition to speaking extensively in this space and hosting a data privacy learning series on LinkedIn, Nishant has a forthcoming book titled Data Privacy: A Runbook for Engineers - a deep dive into strategies on effectively identifying, communicating and addressing privacy risks using technical strategies.
Data Protocol trains and certifies software builders in responsible data management. The time to apply privacy training and data best practices is before there is a problem, not after.
The privacy engineering curriculum is structured in three modules: governance, systems, and execution.
Data classification is the foundation of privacy engineering. If you can’t identify and measure the risk profile of your data, you can’t manage its value, its flow, or its security. This course will teach you how to classify and map data throughout your systems according to its risk level, retention requirements, and access policies.
With a strong foundation of data categorization in place, this course will teach you the techniques to optimize data flow in support of privacy and business operations. Specifically, you will learn about tagging data, building a system architecture to discover data, and measuring the success of your categorization program. These techniques will enable you to identify all of your data and automate privacy.
The importance of data privacy and the rise of privacy engineering has driven innovation and availability of privacy technologies. As a privacy engineer, you have options. Determining what tools to use for your specific needs is an important part of the job. In this course, you will begin to consider what tools you will need to execute your plan, and why. Specifically, you will learn some of the key players in the privacy tooling space, the criteria you should use when shopping for solutions, and the pros and cons of building versus buying.
You have learned how - and why - privacy should be designed into your systems, your processes, and your products. As a privacy engineer, you work to limit risk as early as possible with both a strategic plan and the right tools. It is also your job to maintain the program you’ve designed and built by continually assessing risks and protections. In this course, you will learn a new approach to the traditional privacy review, a process that often occurs too late. Implementing ongoing technical privacy consulting throughout your existing program will reduce risks and avoid costly mitigations.
For most companies, privacy only becomes a priority after an incident has occurred. When that happens, there’s an urgency to find a solution to fix that incident without doing the work that is needed to prevent it from occurring again. This program is designed to first teach developers how to create sound data governance that provides a solid foundation to inform privacy controls.