SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
Cdpse course content infosec train
Overview
The Certified Data Privacy Solutions engineer (CDPSE) is focused on
validating the technical skills and knowledge it takes to assess, build
and implement a comprehensive privacy solution. CDPSE holders
can fill the technical privacy skills gap so that an organization has
competent privacy technologists to build and implement solutions
that mitigate risk and enhance efficiency.
www.infosectrain.com | sales@infosectrain.com 01
Why CDPSE with InfoSec Train?
The CDPSE certification training course from InfoSec Train is taught by highly
experienced and certified professionals in the privacy domain. They have
achieved the certification through years of experience and superior knowledge.
The course content is created with care and precision keeping the candidate in
mind.
Candidates who pursue our CDPSE Certification Online Training will be able to
pursue the certification and achieve it quickly.
Pre-requisite
Three (3) or more years of experience in data privacy governance, privacy
architecture, and/or data lifecycle work.
No experience waivers or substitutions are given for this certification.
• Consultant
• Data Scientist
• IS Engineer User Data Protection
• Privacy Advisor/Manager
• Privacy Solutions Architect
• Data Analyst
• Domain Architect Legal Care/
Compliance/Privacy
• IT Project Manager
• Privacy Analyst/Engineer
• Software Engineer
Target audience
The following job roles will highly benefit from obtaining the CDPSE certification
www.infosectrain.com | sales@infosectrain.com 02
Exam Information
Duration 3.5 hours (210 minutes)
Number of Questions 120
Question format
Passing grade
Languages available
Multiple Choice
You must score 450 or higher to record
a pass in the exam
English
Why Infosec Train?
Certified &
Experienced Instructor
Flexible Schedule Access to the
recorded
sessions
Tailor Made Training
Post Training
Support
4 hrs/day in
Weekend/
Weekday
www.infosectrain.com | sales@infosectrain.com 03
www.infosectrain.com | sales@infosectrain.com 04
DOMAIN 1
Privacy
Governance
Privacy
Architecture
Data
Lifecycle
DOMAIN 2
DOMAIN 3
C
D
P
S
E
C
O
U
R
S
E
C
O
N
T
E
N
T
Domain 1: Privacy Governance (34%)
• Identify the internal and external privacy requirements specific to the
organization's governance and risk management programs and practices
• Participate in the evaluation of privacy policies, programs, and policies for
their alignment with legal requirements, regulatory requirements, and/or industry
best practices
• Coordinate and/or perform privacy impact assessments (PIA) and other
privacy-focused assessments
• Participate in the development of procedures that align with privacy
policies and business needs
• Implement procedures that align with privacy policies.
• Participate in the management and evaluation of contracts, service levels,
and practices of vendors and other external parties
• Participate in the privacy incident management process
• Collaborate with cybersecurity personnel on the security risk assessment
process to address privacy compliance and risk mitigation
• Collaborate with other practitioners to ensure that privacy programs and
practices are followed during the design, development, and implementation of
systems, applications, and infrastructure
• Develop and/or implement a prioritization process for privacy practices
• Develop, monitor, and/or report performance metrics and trends related to
privacy practices
• Report on the status and outcomes of privacy programs and practices to
relevant stakeholders
• Participate in privacy training and promote awareness of privacy practices
• Identify issues requiring remediation and opportunities for process
improvement
www.infosectrain.com | sales@infosectrain.com 05
Domain 2: Privacy Architecture (36%)
• Coordinate and/or perform privacy impact assessment (PIA) and other
privacy-focused assessments to identify appropriate tracking technologies and
technical privacy controls
• Participate in the development of privacy control procedures that align with
privacy policies and business needs
• Implement procedures related to privacy architecture that aligns with
privacy policies
• Collaborate with cybersecurity personnel on the security risk assessment
process to address privacy compliance and risk mitigation
• Collaborate with other practitioners to ensure that privacy programs and
practices are followed during the design, development, and implementation of
systems, applications, and infrastructure
• Evaluate the enterprise architecture and information architecture to ensure
it supports privacy by design principles and considerations
• Evaluate advancements in privacy-enhancing technologies and changes in
the regulatory landscape
• Identify, validate, and/or implement appropriate privacy and security
controls according to data classification procedures
www.infosectrain.com | sales@infosectrain.com 06
Domain 3: Data Lifecycle (30%)
• Identify the internal and external privacy requirements relating to the
organization's data lifecycle practices
• Coordinate and/or perform privacy impact assessments (PIA) and other
privacy-focused assessments relating to the organization’s data lifecycle practices
• Participate in the development of data lifecycle procedures that align with
privacy policies and business needs
• Implement procedures related to data lifecycle that aligns with privacy
policies
• Collaborate with other practitioners to ensure that privacy programs and
practices are followed during the design, development, and implementation of
systems, applications, and infrastructure
• Evaluate the enterprise architecture and information architecture to ensure it
supports privacy by design principles and data lifecycle considerations
• Identify, validate, and/or implement appropriate privacy and security
controls according to data classification procedures
• Design, implement, and/or monitor processes and procedures to keep the
inventory and dataflow records current
www.infosectrain.com | sales@infosectrain.com 07
www.infosectrain.com | sales@infosectrain.com

More Related Content

PDF
CISA Domain 4 Information Systems Operation | Infosectrain
PDF
Information Security Analyst- Infosec train
PDF
CISA DOMAIN 2 Governance & Management of IT
PDF
Comp tia security sy0 601 domain 3 implementation
PPTX
Iso 22301 la training
PPTX
Critical Infrastructure Protection (CIP) NERC Training
PPTX
Cybersecurity Audit
PPTX
Build an Information Security Strategy
CISA Domain 4 Information Systems Operation | Infosectrain
Information Security Analyst- Infosec train
CISA DOMAIN 2 Governance & Management of IT
Comp tia security sy0 601 domain 3 implementation
Iso 22301 la training
Critical Infrastructure Protection (CIP) NERC Training
Cybersecurity Audit
Build an Information Security Strategy

What's hot (18)

PDF
CompTIA cysa+ certification changes: Everything you need to know
PPTX
CMMC rollout: How CMMC will impact your organization
PDF
CMMC case study: Inside a CMMC assessment
PPTX
What is a cybersecurity assessment 20210813
PDF
CYBER SECURITY audit course report
PPT
Supplement To Student Guide Seminar 03 A 3 Nov09
PPTX
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
PDF
Nist cybersecurity framework isc2 quantico
PPTX
Building a security strategy?
PPTX
ISO 27001 management clause 7 support - by software development company in india
PPTX
Manning Information Security Strategy
PDF
IT SECURITY ASSESSMENT PROPOSAL
PPTX
Nist 800 53 deep dive 20210813
DOC
Redspin HIPAA Security Risk Analysis RFP Template
PPTX
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
PPTX
What is the UK Cyber Essentials scheme?
PDF
Business case for information security program
PDF
10 Commandments for Achieving Operational Excellence
CompTIA cysa+ certification changes: Everything you need to know
CMMC rollout: How CMMC will impact your organization
CMMC case study: Inside a CMMC assessment
What is a cybersecurity assessment 20210813
CYBER SECURITY audit course report
Supplement To Student Guide Seminar 03 A 3 Nov09
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
Nist cybersecurity framework isc2 quantico
Building a security strategy?
ISO 27001 management clause 7 support - by software development company in india
Manning Information Security Strategy
IT SECURITY ASSESSMENT PROPOSAL
Nist 800 53 deep dive 20210813
Redspin HIPAA Security Risk Analysis RFP Template
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
What is the UK Cyber Essentials scheme?
Business case for information security program
10 Commandments for Achieving Operational Excellence
Ad

Similar to Cdpse course content infosec train (20)

PDF
How can the ISO 27701 help to design, implement, operate and improve a privac...
PPTX
Privacy Engineering in the Wild
PDF
Privacy-ready Data Protection Program Implementation
PDF
Toreon adding privacy by design in secure application development oss18 v20...
PPTX
Software development o & c
PPTX
Privacy by Design or Privacy by Re-engineering
PPTX
Security Organization/ Infrastructure
PPTX
Software Engineering Ethics
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
DOC
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
PPTX
vCISO Overview Virtual CISO Chief Information Security Officer
PPT
Developing an Information Security Program
PDF
Ethics, Testing, and Deployment - Data Visualization and Analytics
PPTX
Security Architecture
PPTX
Solution Plan for Risk Mitigation for an Organization
DOCX
Project Access Control ProposalPurposeThis course project i
PDF
Nine HIPAA Compliance Questions to ask Yourself
PPTX
CISSP - Chapter 1 - Security Concepts
PPTX
Breakdown of Microsoft Purview Solutions
DOCX
There are two general types of data dictionaries a database manag
How can the ISO 27701 help to design, implement, operate and improve a privac...
Privacy Engineering in the Wild
Privacy-ready Data Protection Program Implementation
Toreon adding privacy by design in secure application development oss18 v20...
Software development o & c
Privacy by Design or Privacy by Re-engineering
Security Organization/ Infrastructure
Software Engineering Ethics
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
vCISO Overview Virtual CISO Chief Information Security Officer
Developing an Information Security Program
Ethics, Testing, and Deployment - Data Visualization and Analytics
Security Architecture
Solution Plan for Risk Mitigation for an Organization
Project Access Control ProposalPurposeThis course project i
Nine HIPAA Compliance Questions to ask Yourself
CISSP - Chapter 1 - Security Concepts
Breakdown of Microsoft Purview Solutions
There are two general types of data dictionaries a database manag
Ad

More from ShivamSharma909 (20)

PDF
Ethical Hacking Interview Questions and Answers.pdf
PDF
CYBERSECURITY Interview Questions for Freshers.pdf
PDF
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
PDF
Top 20 Incident Responder Interview Questions and Answers (1).pdf
PDF
Top 25 Azure Architect Interview Questions and Answers.pdf
PDF
Top 20 Azure Administrator Interview Questions.pdf
PDF
Threat Hunting Professional Online Training Course
PDF
Why cloud security engineers find CCSE as a perfect fit
PDF
Top 20 certified ethical hacker interview questions and answer
PDF
Top 20 azure interview questions
PDF
Top 15 aws security interview questions
PDF
EC-Council Certified SOC Analyst
PDF
Ctia course outline
PDF
Domain 6 of CEH: Wireless Network Hacking
PDF
Domain 5 of the CEH: Web Application Hacking
PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
PDF
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
PDF
Domain 2 of CEH v11: Reconnaissance Techniques
PDF
Domain 1 of CEH v11: Information Security and Ethical Hacking
PDF
How is az 303 different from az-304
Ethical Hacking Interview Questions and Answers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 20 Azure Administrator Interview Questions.pdf
Threat Hunting Professional Online Training Course
Why cloud security engineers find CCSE as a perfect fit
Top 20 certified ethical hacker interview questions and answer
Top 20 azure interview questions
Top 15 aws security interview questions
EC-Council Certified SOC Analyst
Ctia course outline
Domain 6 of CEH: Wireless Network Hacking
Domain 5 of the CEH: Web Application Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 1 of CEH v11: Information Security and Ethical Hacking
How is az 303 different from az-304

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Pharma ospi slides which help in ospi learning
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Presentation on HIE in infants and its manifestations
PDF
Classroom Observation Tools for Teachers
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Institutional Correction lecture only . . .
PPTX
Lesson notes of climatology university.
PDF
RMMM.pdf make it easy to upload and study
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Anesthesia in Laparoscopic Surgery in India
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Pharma ospi slides which help in ospi learning
VCE English Exam - Section C Student Revision Booklet
Presentation on HIE in infants and its manifestations
Classroom Observation Tools for Teachers
STATICS OF THE RIGID BODIES Hibbelers.pdf
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
Institutional Correction lecture only . . .
Lesson notes of climatology university.
RMMM.pdf make it easy to upload and study
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Computing-Curriculum for Schools in Ghana
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?

Cdpse course content infosec train

  • 2. Overview The Certified Data Privacy Solutions engineer (CDPSE) is focused on validating the technical skills and knowledge it takes to assess, build and implement a comprehensive privacy solution. CDPSE holders can fill the technical privacy skills gap so that an organization has competent privacy technologists to build and implement solutions that mitigate risk and enhance efficiency. www.infosectrain.com | sales@infosectrain.com 01
  • 3. Why CDPSE with InfoSec Train? The CDPSE certification training course from InfoSec Train is taught by highly experienced and certified professionals in the privacy domain. They have achieved the certification through years of experience and superior knowledge. The course content is created with care and precision keeping the candidate in mind. Candidates who pursue our CDPSE Certification Online Training will be able to pursue the certification and achieve it quickly. Pre-requisite Three (3) or more years of experience in data privacy governance, privacy architecture, and/or data lifecycle work. No experience waivers or substitutions are given for this certification. • Consultant • Data Scientist • IS Engineer User Data Protection • Privacy Advisor/Manager • Privacy Solutions Architect • Data Analyst • Domain Architect Legal Care/ Compliance/Privacy • IT Project Manager • Privacy Analyst/Engineer • Software Engineer Target audience The following job roles will highly benefit from obtaining the CDPSE certification www.infosectrain.com | sales@infosectrain.com 02
  • 4. Exam Information Duration 3.5 hours (210 minutes) Number of Questions 120 Question format Passing grade Languages available Multiple Choice You must score 450 or higher to record a pass in the exam English Why Infosec Train? Certified & Experienced Instructor Flexible Schedule Access to the recorded sessions Tailor Made Training Post Training Support 4 hrs/day in Weekend/ Weekday www.infosectrain.com | sales@infosectrain.com 03
  • 5. www.infosectrain.com | sales@infosectrain.com 04 DOMAIN 1 Privacy Governance Privacy Architecture Data Lifecycle DOMAIN 2 DOMAIN 3 C D P S E C O U R S E C O N T E N T
  • 6. Domain 1: Privacy Governance (34%) • Identify the internal and external privacy requirements specific to the organization's governance and risk management programs and practices • Participate in the evaluation of privacy policies, programs, and policies for their alignment with legal requirements, regulatory requirements, and/or industry best practices • Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments • Participate in the development of procedures that align with privacy policies and business needs • Implement procedures that align with privacy policies. • Participate in the management and evaluation of contracts, service levels, and practices of vendors and other external parties • Participate in the privacy incident management process • Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development, and implementation of systems, applications, and infrastructure • Develop and/or implement a prioritization process for privacy practices • Develop, monitor, and/or report performance metrics and trends related to privacy practices • Report on the status and outcomes of privacy programs and practices to relevant stakeholders • Participate in privacy training and promote awareness of privacy practices • Identify issues requiring remediation and opportunities for process improvement www.infosectrain.com | sales@infosectrain.com 05
  • 7. Domain 2: Privacy Architecture (36%) • Coordinate and/or perform privacy impact assessment (PIA) and other privacy-focused assessments to identify appropriate tracking technologies and technical privacy controls • Participate in the development of privacy control procedures that align with privacy policies and business needs • Implement procedures related to privacy architecture that aligns with privacy policies • Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development, and implementation of systems, applications, and infrastructure • Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and considerations • Evaluate advancements in privacy-enhancing technologies and changes in the regulatory landscape • Identify, validate, and/or implement appropriate privacy and security controls according to data classification procedures www.infosectrain.com | sales@infosectrain.com 06
  • 8. Domain 3: Data Lifecycle (30%) • Identify the internal and external privacy requirements relating to the organization's data lifecycle practices • Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments relating to the organization’s data lifecycle practices • Participate in the development of data lifecycle procedures that align with privacy policies and business needs • Implement procedures related to data lifecycle that aligns with privacy policies • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development, and implementation of systems, applications, and infrastructure • Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and data lifecycle considerations • Identify, validate, and/or implement appropriate privacy and security controls according to data classification procedures • Design, implement, and/or monitor processes and procedures to keep the inventory and dataflow records current www.infosectrain.com | sales@infosectrain.com 07