TRENDS is authorized to promote and deliver ISACA courses in partnership with Trainocate. 'ISACA Logo is a registered trademark of ISACA. All rights reserved.

Certified Data Privacy Solutions Engineer

Schedule

Start End Duration Location Details

Course Details

Certified Data Privacy Solutions Engineer

Course code: CDPSE

Duration: 3 Days

Prerequisite:

•    Have 5 years of work experience performing the work described within the exam content outline.
•    Experience must be earned in a minimum of two CDPSE Exam Content Outline Domains
•    Experience waivers: Holding one of the following certifications: CISA, CISM, CGEIT, CRISC, CSX-P, FIP reduces the work experience requirements to 3 years.

Course Description:

This Certified Data Privacy Solutions Engineer CDPSE course is the first experience-based, technical certification of its kind. Learning to design and boost privacy technology platforms and products will provide advantages to your customers build trust and advance data privacy.

In this Data Privacy Solutions Engineer course, participants will be learning how to create privacy solutions and be responsible for your business' privacy strategies to support its unimpeached growth.

Participants will be learning the required technical skill set of privacy-enhanced designs in order to build a common understanding of best practices throughout your organization.  Participants will also learn to implement: Privacy Impact Assessment (PIA), Strategies against threats, attacks, and vulnerabilities related to privacy - including encryption, hashing, and de-identification, Data Inventory, and classification (e.g., tagging, tracking, SOR).

Course Objectives:

Upon Completion of this Course, you will accomplish following:
•    Ability to Build and Implement Privacy Solutions
•    Ability to manage the data lifecycle and advise technologists on privacy compliance
•    Ability to implement privacy by design which results in privacy technology platforms and products that build trust and advance data privacy.
•    Ensure that privacy solutions match the organization's risk appetite and mitigate risks of noncompliance
•    Improve the end user experience while preserving privacy and retaining trust.

Intended Audience:

•    Privacy engineer
•    Privacy analyst
•    Privacy advisor
•    Consultant - security and privacy
•    Lead privacy manager
•    Security and privacy engineer
•    Software engineer backend privacy engineering
•    Engineer management - privacy engineering
•    Domain architect – legal care compliance, privacy
•    Privacy solutions architect
•    Information security engineer user data protection    

Course Outlines:

Domain 1: Privacy Governance
A. Governance
1. Personal Data and Information
2. Privacy Laws and Standards across Jurisdictions
3. Privacy Documentation (e.g., Policies, Guidelines)
4. Legal Purpose, Consent, and Legitimate Interest
5. Data Subject Rights

B. Management
1. Roles and Responsibilities related to Data
2. Privacy Training and Awareness
3. Vendor and Third-Party Management
4. Audit Process
5. Privacy Incident Management

C. Risk Management
1. Risk Management Process
2. Privacy Impact Assessment (PIA)
3. Threats, Attacks, and Vulnerabilities related to Privacy

Domain 2: Privacy Architecture
A. Infrastructure
1. Technology Stacks
2. Cloud-based Services
3. Endpoints
4. Remote Access
5. System Hardening

B. Applications and Software
1. Secure Development Lifecycle (e.g., Privacy by Design)
2. Applications and Software Hardening
3. APIs and Services
4. Tracking Technologies

C. Technical Privacy Controls
1. Communication and Transport Protocols
2. Encryption, Hashing, and De-identification
3. Key Management
4. Monitoring and Logging
5. Identity and Access Management

Domain 3: Data Cycle (30%)
A. Data Purpose
1. Data Inventory and Classification (e.g., Tagging, Tracking, SOR)
2. Data Quality and Accuracy
3. Dataflow and Usage Diagrams
4. Data Use Limitation
5. Data Analytics (e.g., Aggregation, AI, Machine Learning, Big Data)

B. Data Persistence
1. Data Minimization (e.g., De-identification, Anonymization)
2. Data Migration
3. Data Storage
4. Data Warehousing (e.g., Data Lake)
5. Data Retention and Archiving
6. Data Destruction