100 likes | 200 Views
The concept of u2018Privacyu2019 has gained more traction due to increased awareness in the digital world. The CDPSE certification or Certified Data Privacy Solutions Engineer certification from ISACA is designed for those experienced in the governance, architecture, and lifecycle of data privacy at a technical level.<br><br>https://www.infosectrain.com/courses/cdpse-certification-training/<br>
E N D
Overview The Certified Data Privacy Solutions engineer (CDPSE) is focused on validating the technical skills and knowledge it takes to assess, build and implement a comprehensive privacy solution. CDPSE holders can fill the technical privacy skills gap so that an organization has competent privacy technologists to build and implement solutions that mitigate risk and enhance efficiency. www.infosectrain.com | sales@infosectrain.com 01
Why CDPSE with InfoSec Train? The CDPSE certification training course from InfoSec Train is taught by highly experienced and certified professionals in the privacy domain. They have achieved the certification through years of experience and superior knowledge. The course content is created with care and precision keeping the candidate in mind. Candidates who pursue our CDPSE Certification Online Training will be able to pursue the certification and achieve it quickly. Target audience The following job roles will highly benefit from obtaining the CDPSE certification • Consultant • Domain Architect Legal Care/ Compliance/Privacy • Data Scientist • IS Engineer User Data Protection • IT Project Manager • Privacy Advisor/Manager • Privacy Analyst/Engineer • Privacy Solutions Architect • Software Engineer • Data Analyst Pre-requisite Three (3) or more years of experience in data privacy governance, privacy architecture, and/or data lifecycle work. No experience waivers or substitutions are given for this certification. www.infosectrain.com | sales@infosectrain.com 02
Exam Information Duration 3.5 hours (210 minutes) Number of Questions 120 Question format Multiple Choice Passing grade You must score 450 or higher to record a pass in the exam Languages available English Why Infosec Train? Certified & Experienced Instructor Flexible Schedule Access to the recorded sessions 4 hrs/day in Weekend/ Weekday Post Training Support Tailor Made Training www.infosectrain.com | sales@infosectrain.com 03
CDPSE COURSE CONTENT DOMAIN 1 Privacy Governance DOMAIN 2 Privacy Architecture DOMAIN 3 Data Lifecycle www.infosectrain.com | sales@infosectrain.com 04
Domain 1: Privacy Governance (34%) • Identify the internal and external privacy requirements specific to the organization's governance and risk management programs and practices • Participate in the evaluation of privacy policies, programs, and policies for their alignment with legal requirements, regulatory requirements, and/or industry best practices • Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments • Participate in the development of procedures that align with privacy policies and business needs • Implement procedures that align with privacy policies. • Participate in the management and evaluation of contracts, service levels, and practices of vendors and other external parties • Participate in the privacy incident management process • Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development, and implementation of systems, applications, and infrastructure • Develop and/or implement a prioritization process for privacy practices • Develop, monitor, and/or report performance metrics and trends related to privacy practices • Report on the status and outcomes of privacy programs and practices to relevant stakeholders • Participate in privacy training and promote awareness of privacy practices • Identify issues requiring remediation and opportunities for process improvement www.infosectrain.com | sales@infosectrain.com 05
Domain 2: Privacy Architecture (36%) • Coordinate and/or perform privacy impact assessment (PIA) and other privacy-focused assessments to identify appropriate tracking technologies and technical privacy controls • Participate in the development of privacy control procedures that align with privacy policies and business needs • Implement procedures related to privacy architecture that aligns with privacy policies • Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development, and implementation of systems, applications, and infrastructure • Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and considerations • Evaluate advancements in privacy-enhancing technologies and changes in the regulatory landscape • Identify, validate, and/or implement appropriate privacy and security controls according to data classification procedures www.infosectrain.com | sales@infosectrain.com 06
Domain 3: Data Lifecycle (30%) • Identify the internal and external privacy requirements relating to the organization's data lifecycle practices • Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments relating to the organization’s data lifecycle practices • Participate in the development of data lifecycle procedures that align with privacy policies and business needs • Implement procedures related to data lifecycle that aligns with privacy policies • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development, and implementation of systems, applications, and infrastructure • Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and data lifecycle considerations • Identify, validate, and/or implement appropriate privacy and security controls according to data classification procedures • Design, implement, and/or monitor processes and procedures to keep the inventory and dataflow records current www.infosectrain.com | sales@infosectrain.com 07