Audience
- Privacy engineer
- Privacy analyst
- Privacy advisor
- Consultant - security and privacy
- Lead privacy manager
- Security and privacy engineer
- Software engineer backend privacy engineering
- Engineer management - privacy engineering
- Domain architect – legal care compliance, privacy
- Privacy solutions architect
- Information security engineer user data protection
This Certified Data Privacy Solutions Engineer CDPSE course is the first experience-based, technical certification of its kind. Learning to design and boost privacy technology platforms and products will provide advantages to your customers build trust and advance data privacy
In this Data Privacy Solutions Engineer course, participants will be learning how to create privacy solutions and be responsible for your business' privacy strategies to support its unimpeached growth.
Participants will be learning the required technical skill set of privacy-enhanced designs in order to build a common understanding of best practices throughout your organization. Participants will also learn to implement: Privacy Impact Assessment (PIA), Strategies against threats, attacks, and vulnerabilities related to privacy - including encryption, hashing, and de-identification, Data Inventory, and classification (e.g., tagging, tracking, SOR).
Audience
- Privacy engineer
- Privacy analyst
- Privacy advisor
- Consultant - security and privacy
- Lead privacy manager
- Security and privacy engineer
- Software engineer backend privacy engineering
- Engineer management - privacy engineering
- Domain architect – legal care compliance, privacy
- Privacy solutions architect
- Information security engineer user data protection
Module 1: Privacy Governance (34%)
- Personal Data and Information
- Privacy Laws and Standards across Jurisdictions
- Privacy Documentation (e.g., Policies, Guidelines)
- Legal Purpose, Consent, and Legitimate Interest
- Data Subject Rights
- Roles and Responsibilities related to Data
- Privacy Training and Awareness
- Vendor and Third-Party Management
- Audit Process
- Privacy Incident Management
- Risk Management Process
- Privacy Impact Assessment (PIA)
- Threats, Attacks, and Vulnerabilities related to Privacy
Module 2: Privacy Architecture (36%)
- Technology Stacks
- Cloud-based Services
- Endpoints
- Remote Access
- System Hardening
- Secure Development Lifecycle (e.g., Privacy by Design)
- Applications and Software Hardening
- APIs and Services
- Tracking Technologies
- Communication and Transport Protocols
- Encryption, Hashing, and De-identification
- Key Management
- Monitoring and Logging
- Identity and Access Management
Module 3: 3: Data Cycle (30%)
- Data Inventory and Classification (e.g., Tagging, Tracking, SOR)
- Data Quality and Accuracy
- Dataflow and Usage Diagrams
- Data Use Limitation
- Data Analytics (e.g., Aggregation, AI, Machine Learning, Big Data)
- Data Minimization (e.g., De-identification, Anonymization)
- Data Migration
- Data Storage
- Data Warehousing (e.g., Data Lake)
- Data Retention and Archiving
- Data Destruction