Comprehensive Privacy Certification Training CDPSE - Privacy Solutions Engineer
What you'll learn
Prepare for CDPSE, CIPP, CIPT, CIPM Exams
Understand Key Privacy Control
Understand Privacy Risks and how to navigate them
Learn how to ensure compliance with Privacy Regulations
Requirements
Requirements
No specific knowledge is required, the course start from Basics up to Advanced Concepts.
Description
Master Data Privacy Engineering with the CDPSE CertificationAre you ready to elevate your career in data privacy and become a Certified Data Privacy Solutions Engineer (CDPSE)? Our comprehensive CDPSE training course is designed to equip you with the essential skills and knowledge to excel in data privacy engineering and management.Course HighlightsPrivacy Governance: Understand the principles of privacy governance, risk management, and compliance.Privacy Architecture: Learn how to design and implement privacy solutions within organizational frameworks.Data Lifecycle Management: Gain expertise in managing data throughout its lifecycle, from collection to disposal.Regulatory Compliance: Stay updated on global privacy laws and regulations, including GDPR, CCPA, and more.Risk Assessment: Master the techniques for identifying, assessing, and mitigating privacy risks.Privacy Technologies: Explore the latest technologies and tools used in data privacy protection.Who Should Attend?Data Privacy ProfessionalsIT and Security ProfessionalsRisk Management OfficersCompliance OfficersData Protection OfficersAnyone aspiring to build a career in data privacy engineeringTake the next step in your career by enrolling in our Certified Data Privacy Solutions Engineer (CDPSE) training course. Gain the expertise and certification needed to excel in the dynamic field of data privacy.Enrol to our Course and Become Data Privacy Engineer!
Overview
Section 1: Privacy Governance and Management
Lecture 1 Privacy Governance
Lecture 2 Privacy and Security and Key Privacy Frameworks and Regulations
Lecture 3 Understand Metrics and SMART Metrics
Lecture 4 Understand Strategy and Goals
Lecture 5 Privacy Control Frameworks
Lecture 6 Privacy Program Development
Lecture 7 Gap Analysis
Lecture 8 Strategy Constraints
Lecture 9 Risk Management
Lecture 10 Privacy Risks
Lecture 11 Privacy Impact Assessment
Lecture 12 Third Party Risk
Lecture 13 Privacy Policy
Section 2: Privacy Operations
Lecture 14 Privacy Roles and Responsibilities
Lecture 15 RACI Matrix
Lecture 16 E-Discovery and Identify Data
Lecture 17 Data Subject and Their Rights
Lecture 18 Dealing with Authorities for Privacy Related Matters
Lecture 19 Privacy Training
Lecture 20 The Three Lines of Defense
Lecture 21 Privacy Auditing
Lecture 22 Information System Auditing Audit Overview
Lecture 23 IT Assurance Framework
Lecture 24 Code of Ethics
Lecture 25 Incident Response and Management
Lecture 26 Continues Improvement and PDCA
Section 3: Technology and Privacy
Lecture 27 System Architecture
Lecture 28 Computing Hardware
Lecture 29 Operating Systems
Lecture 30 Virtualization Layer
Lecture 31 Databases Overview
Lecture 32 Database Security
Lecture 33 Shadow IT and its problems
Lecture 34 Front End and Back End and Middleware
Lecture 35 API - Application Programmable Interfaces
Lecture 36 Endpoints and Best Practices to Secure them
Lecture 37 Architectual Concepts
Lecture 38 Endpoint Hardening Overview
Lecture 39 Common Application Attacks
Lecture 40 Network Access, Wireless Access and BYOD Policies
Lecture 41 What is Network?
Lecture 42 VPN Service - IPSEC & SSL & Split Tunnel
Lecture 43 Split Tunnel KT
Lecture 44 Cloud Computing
Lecture 45 Cloud Deployment Models
Lecture 46 Cloud Shared Responsibility Matrix
Lecture 47 SASE & CASB
Section 4: Architectural and Design Concepts
Lecture 48 Zero Trust
Lecture 49 Privacy by Design
Lecture 50 Acquisition of New Technologies or Controls
Lecture 51 Software Development Lifecycle
Lecture 52 Threat Model Process
Lecture 53 Abuse Case and Use Case
Lecture 54 Risks related to Software Development Process
Lecture 55 DevOPS & CI/CD
Lecture 56 DevSecOps
Lecture 57 Integrated Development Environment
Lecture 58 Software Testing Tools
Lecture 59 Secure Code Practices
Lecture 60 Penetration Testing
Lecture 61 Bug Bounty Programs
Section 5: Privacy Protection
Lecture 62 Security Controls Overview?
Lecture 63 The Control Objective
Lecture 64 Best Practices in Control Selection, Design, Operations
Lecture 65 Control Self Assessment
Lecture 66 Cryptography Overview
Lecture 67 Symmetric Encryption
Lecture 68 Asymmetric Encryption
Lecture 69 Key Management Techniques and Solutions and LifeCycle
Lecture 70 Public Key Infrastructure - PKI
Lecture 71 Log Management
Lecture 72 Access Control
Lecture 73 Digital Rights Management - DRM
Lecture 74 Tracking of Data Subject and Profiling
Section 6: Data Security
Lecture 75 Data Governance
Lecture 76 Data Inventory and Data Governance Tools
Lecture 77 Data Classification
Lecture 78 Data Lifecycle
Lecture 79 Data Security Controls 1
Lecture 80 Data Security Controls 2
Lecture 81 Data Security Protection - Hiding
Lecture 82 DLP - Static and Dynamic DLP Deep Dive
Lecture 83 Data Usage Controls
Lecture 84 Data Minimization
Lecture 85 Data Minimization - KT
Lecture 86 De-Identification Controls
Lecture 87 Data Migration Key Considerations
Lecture 88 Data Storage vs Data Warehousing
Lecture 89 Retention and Archieve KT
Lecture 90 Data Retention and Archival
Lecture 91 Data Destruction
Privacy Engineers,IT Administrators, Security Administrators, System Administrators,Compliance Officers, Risk Management Officers,CDPSE, CIPT, CIPP, CIPM Learners