The rise of privacy engineering

Privacy engineering skills make you invaluable to fast-growing companies. Get the resources and support you need to become a privacy engineer. Reduce risk for your company. Fast-track your career.

Data Protocol’s Privacy Engineering Certification is your opportunity to learn from trailblazer and industry leader Nishant Bhajaria. Now’s the time to skill up – quickly, and in a platform designed for you. For a full overview, click here.

Our ALL-STAR instructors

Nishant Bhajaria

Director of Privacy Engineering, Architecture, and Analytics

Nishant Bhajaria is an executive leader and industry-expert in the privacy and security space and currently serves as the Director of Privacy Engineering, Architecture, and Analytics at Uber.

He plays the critical role connecting engineering, legal, and leadership to ensure data protection for both the user and the business. Prior to Uber, Nishant spearheaded compliance and privacy engineering programs at Google, Netflix, and Nike.

In addition to speaking extensively in this space and hosting a data privacy learning series on LinkedIn, Nishant has published a book titled Data Privacy: A Runbook for Engineers - a deep dive into strategies on effectively identifying, communicating, and addressing privacy risks using technical strategies.

Engin Bozdag

Sr. Staff Privacy Architect

a new approach to

DATA PRIVACY

Data Protocol trains and certifies software builders in responsible data management. The time to apply privacy training and data best practices is before there is a problem, not after.

Accelerate Growth
Minimize Risk
Confidence to Build Fast
Designed for Developers

why data protocol?

Data Protocol enables developers and developer-centric companies to build and ship products faster with less risk of mistakes and penalties.
LEARN MORE>
Why Data Protocol

Happening now at Data Protocol

  • /> LEARN FROM THE BEST
    Your instructor is Nishant Bhajaria, the head of privacy engineering at Uber and formerly with Google, Nike, Netflix, and Intel.  He has designed this program with his own team's hiring needs in mind.
  • /> UNLOCK DOORS
    While you’re wired in coding the latest release, you’re missing out on major strategic discussions. This program unlocks the door for you to translate your hard skills into boardroom decisions.
  • /> SKILL UP & LEARN FASTER
    The entire program is taught in a live terminal environment that combines Nishant’s expertise with hands-on labs and with real-world scenarios.
FOR YOUR TEAMS: Interested in customizing this program for your company? 
GET IN TOUCH
Your submission has been received. You will receive an email in your inbox shortly.
Oops! Something went wrong while submitting the form.

Privacy ENgineering: Short codes

Rules, Resources, and Tips When You Need Them

PROGRAM OVERVIEW

This certification consists of three modules: Governance, Systems, and Execution. After successfully completing each module, you will receive a shareable badge. Once all three modules are complete, you will be eligible to purchase the comprehensive final assessment to earn your Privacy Engineering certification. The fee for the final assessment is $495.

GOVERNANCE
Data Classification
plus

Data classification is the foundation of privacy engineering. If you can’t identify and measure the risk profile of your data, you can’t manage its value, its flow, or its security. This course will teach you how to classify and map data throughout your systems according to its risk level, retention requirements, and access policies.

Data Categorization
plus

With a strong foundation of data categorization in place, this course will teach you the techniques to optimize data flow in support of privacy and business operations. Specifically, you will learn about tagging data, building a system architecture to discover data, and measuring the success of your categorization program. These techniques will enable you to identify all of your data and automate privacy. 

EXECUTION
Privacy Tech
plus

The importance of data privacy and the rise of privacy engineering has driven innovation and availability of privacy technologies. As a privacy engineer, you have options. Determining what tools to use for your specific needs is an important part of the job. In this course, you will begin to consider what tools you will need to execute your plan, and why. Specifically, you will learn some of the key players in the privacy tooling space, the criteria you should use when shopping for solutions, and the pros and cons of building versus buying. 

From Beyond Privacy Review - Technical Privacy Consulting
plus

You have learned how - and why - privacy should be designed into your systems, your processes, and your products. As a privacy engineer, you work to limit risk as early as possible with both a strategic plan and the right tools. It is also your job to maintain the program you’ve designed and built by continually assessing risks and protections.  In this course, you will learn a new approach to the traditional privacy review, a process that often occurs too late. Implementing ongoing technical privacy consulting throughout your existing program will reduce risks and avoid costly mitigations.

SYSTEMS
Consent Management
plus

Data management should start at the source. Implementing an effective consent management system is critical to protecting and operationalizing data. You will learn how to secure and maintain informed, granular consent to comply with data regulations and promote user trust. You will also learn how to implement a flexible Consent Management Platform and manage the common complexities created by multiple variables, such as features, locations, and version control.

Security & Privacy
plus

A privacy engineer does not need to be a security expert, but you do need to understand how to manage and use data securely. In this course, you will learn how to build a framework that reduces the attack surface for sensitive data and how to implement tools for the management of access control and monitoring, such as Access Control Lists (ACLs) and encryption keys.

Data Deletion
plus

Data deletion is critical to regulatory compliance and overall privacy protection. Effective data classification and categorization enable data deletion upon request or once it is no longer required. In this course, you will learn about implementing, automating, and scaling deletion in a distributed environment. This includes the basics of deletion, how designing a process for deletion relies on understanding the data collection architecture, and the tools and processes you will use from implementation to scaling.

Data Sharing
plus

Data is most at risk when it’s in motion, but data sharing is a necessity to support customer engagement, business continuity, and product innovation. Effective privacy engineering eliminates the need to choose between the two. In this course, you will learn to prioritize data minimization, anonymization, and channel segmentation to protect data in motion while maintaining its availability. Finally, you will learn how to quantify the impact of your efforts to manage privacy risk.

FINAL ASSESSMENT

Once all three modules are complete, you will be eligible to purchase the final assessment and earn your Privacy Engineering certification and badge. The fee for the final assessment is $495.

Launch

Learn more about PRIvacy engineering

LEARN MORE