Exclusive Discounts - Pay Online and Grab Up to 40% Discount on Certified Courses Across 15 Knowledge Areas HERE.
Partner
Exam Preparation

CDPSE
Certified Data Privacy Solutions Engineer

Rating:
0.0
English
Intermediate
Video preview
FACE 2 FACE
ON SITE TRAINING
LIVE VIRTUAL
TRAINING
COACHING
& MENTORING
SELF-PACED
TRAINING
Select Date
Download Brochure

Course Overview

Certified Data Privacy Solutions Engineer (CDPSE®) by ISACA is a globally recognized certification designed to equip professionals with the knowledge and skills to design, implement, and manage technical privacy solutions.

This course is focused on validating the technical skills and knowledge it takes to assess, build and implement comprehensive data privacy measures. CDPSE holders help fill the technical privacy skills gap so that your organization has competent privacy technologists to build and implement solutions that mitigate risk and enhance efficiency.

Participants will learn to navigate complex privacy challenges, adhere to global regulations, and implement privacy-by-design principles. This course combines theoretical foundations, practical applications, and case studies to ensure participants are well-prepared to address privacy risks, secure data, and align technical solutions with organizational goals.

Key Takeaways

1
Comprehend the principles of privacy governance, architecture, and data lifecycle management to support organizational compliance and strategic goals.
2
Analyze privacy requirements and risks to implement effective privacy-by-design and privacy-by-default methodologies.
3
Develop privacy architectures and technical solutions that align with regulatory frameworks and organizational needs.
4
Implement privacy-enhancing technologies, such as encryption and de-identification, to secure sensitive data and mitigate vulnerabilities.
5
Manage data throughout its lifecycle, ensuring proper discovery, classification, retention, and protection to uphold privacy standards.

Information Systems Audit and Control Association
Brand Logo
ISACA was incorporated in 1969 by a small group of individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems. Today, ISACA serves 140,000 professionals in 180 countries. As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

Course Outline

DAY 1
Privacy Governance
  • Personal Data and Information
  • Privacy Laws and Standards across Jurisdictions
  • Privacy Documentation
  • Legal Purpose, Consent, and Legitimate Interest
  • Data Subject Rights
  • Roles and Responsibilities Related to Data
  • Privacy Training and Awareness
  • Vendor and Third-Party Management
  • Audit Process
  • Privacy Incident Management
  • Risk Management Process
  • Privacy Impact Assessment
DAY 2
Privacy Architecture
  • Privacy Architecture
  • Problematic Data Actions Affecting Privacy
  • Self-Managed Infrastructure, Including Technology Stacks
  • Cloud Computing
  • Remote Access
  • Endpoints
  • System Hardening
  • Secure Development Lifecycle
  • Application and Software Hardening
  • Secure Applications, APIs, and Services
  • Privacy Risks in Tracking Technologies
  • Communications and Transport Protocols
  • Encryption, Hashing, and De-identification
  • Key Management
  • Monitoring and Logging
  • Identity and Access Management
DAY 3
Data Lifecycle
  • Data Inventory and Classification
  • Data Quality
  • Data Use Limitation
  • Artificial Intelligence and Machine Learning
  • Data Minimization
  • Data Analytics
  • Data Migration
  • Data Storage and Warehousing
  • Data Retention and Destruction

Who Should Attend?

This highly practical and interactive course has been specifically designed for

Privacy Engineers and Technologists

Data Protection Officers (DPOs)

IT Professionals and Security Engineers

Risk Management Professionals

Professionals involved in implementing privacy solutions

Related Courses

FAQ

Reviews