Cyber Security Category Banner Image

Certified Data Privacy Solutions Engineer (CDPSE®)

  • Length 3 days
Course overview
View dates &
book now

Why study this course

Certified Data Privacy Solutions Engineer™ (CDPSE®) is focused on validating the technical skills and knowledge it takes to assess, build and implement comprehensive data privacy measures. CDPSE holders help fill the technical privacy skills gap so that your organisation has competent privacy technologists to build and implement solutions that mitigate risk and enhance efficiency. 

New regulations, data breaches and penalties for non-compliance are driving the need for organisations to have better control and management of data and implementation of privacy by design solutions. Employers need the assurance that qualified, experienced staff are in place who understand compliance requirements and have the technical know-how to implement the right privacy controls and solutions.  

CDPSE holders bring proven expertise, setting best practices and ensuring communication in a common language throughout the organisation. They have the ability to work effectively with regulators, legal professionals and back-end and front-end developers to build and implement technical privacy solutions that mitigate risks and enhance efficiency. 

The CDPSE Exam Preparation course is an intensive, three-day review program to prepare individuals who are planning to sit for the Certified Data Privacy Solutions Engineer (CDPSE) exam. The course focuses on the key points covered in the CDPSE Review Manual and includes class lectures, group discussions, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in IT and enterprise risk management. 

This course includes a digital courseware manual and access to the CDPSE Questions, Answers and Explanations (QAE) database for 12 months. 

Please note: The exam is not included in the course fee but can be purchased separately. Please contact us for a quote.

Aligns to certification

Request Course Information


What you’ll learn

CDPSE validates privacy technologists’ experience and knowledge to understand compliance requirements and implement technical privacy by design solutions into new and existing technologies and platforms.
It affirms certification holders’ experience and ability to work cross-functionally with legal, policy, database administrators, engineers, software developers, and back-end and front-end experts.  
CDPSE is backed by the credibility that ISACA certifications confer on certification holders. 


ISACA Accredited Elite Partner Logo

ISACA at Lumify Work

ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.

Lumify Work is an Accredited Elite Partner of ISACA.


Who is the course for?

  • Upper Management: Board Member, C-Suite, SVP, VP, Director 

  • IT professionals supporting upper management (primary audience for CGEIT):  Consultants, Senior Managers, Managers, Senior Engineers 


Course subjects

Domain 1: Privacy Governance (Governance, Management & Risk Management)
Identify issues requiring remediation and opportunities for process improvement.

  • Identify the internal and external privacy requirements specific to the organisation's governance and risk management programs and practices.

  • Participate in the evaluation of privacy policies, programs and policies for their alignment with legal requirements, regulatory requirements and/or industry best practices.

  • Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments.

  • Participate in the development of procedures that align with privacy policies and business needs.

  • Implement procedures that align with privacy policies.

  • Participate in the management and evaluation of contracts, service levels and practices of vendors and other external parties.

  • Participate in the privacy incident management process.

  • Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation.

  • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.

  • Develop and/or implement a prioritisation process for privacy practices.

  • Develop, monitor and/or report performance metrics and trends related to privacy practices.

  • Report on the status and outcomes of privacy programs and practices to relevant stakeholders.

  • Participate in privacy training and promote awareness of privacy practices.

  • Identify issues requiring remediation and opportunities for process improvement.

Domain 2: Privacy Architecture
Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.

  • Coordinate and/or perform privacy impact assessment (PIA) and other privacy-focused assessments to identify appropriate tracking technologies and technical privacy controls.

  • Participate in the development of privacy control procedures that align with privacy policies and business needs.

  • Implement procedures related to privacy architecture that align with privacy policies.

  • Collaborate with cybersecurity personnel on the security risk assessment process to address privacy compliance and risk mitigation

  • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.

  • Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and considerations.

  • Evaluate advancements in privacy-enhancing technologies and changes in the regulatory landscape.

  • Identify, validate and/or implement appropriate privacy and security controls according to data classification procedures.

Domain 3: Data Lifecycle
Participate in the development of data lifecycle procedures that align with privacy policies and business needs.

  • Identify the internal and external privacy requirements relating to the organisation's data lifecycle practices.

  • Coordinate and/or perform privacy impact assessments (PIA) and other privacy-focused assessments relating to the organisation’s data lifecycle practices.

  • Participate in the development of data lifecycle procedures that align with privacy policies and business needs.

  • Implement procedures related to data lifecycle that align with privacy policies.

  • Collaborate with other practitioners to ensure that privacy programs and practices are followed during the design, development and implementation of systems, applications and infrastructure.

  • Evaluate the enterprise architecture and information architecture to ensure it supports privacy by design principles and data lifecycle considerations.

  • Identify, validate and/or implement appropriate privacy and security controls according to data classification procedures.

  • Design, implement and/or monitor processes and procedures to keep the inventory and dataflow records current.


Prerequisites

Five or more years of experience in an advisory or oversight role supporting the governance of the IT related contribution to an enterprise is required if you are planning on sitting the exam to certify.


Industry Association Recognition

This course is eligible for Continuing Professional Education (CPE) hours/points to assist in maintaining your ISACA certification.

  • Contact hours: 28 hours

  • Continuing Professional Education: 28 CPEs

If you wish to claim CPEs, Lumify Work can verify your attendance. Please complete this ISACA form and email us at [email protected].


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.



Offers

  • Continue your learning experience online with Lumify Plus
    Lumify Plus (formerly DDLS Plus) is your online learning pathway to extend knowledge beyond courses. Get resources to help you practice what you learned and prepare for future courses, exams and certifications.
  • Cyber Security Executive Bundle
    Lumify Work offers cyber security training to cater for all levels of your organisation - from front-line staff to highly experienced senior cyber security professionals. We’ve partnered with the leading vendors to provide the most comprehensive cyber security training solutions in Australasia.
  • Cyber Risk and Audit Professional Bundle
    Do you want to show you have the skills to audit, control, monitor and assess your organisation’s information technology and business systems?
  • Cyber Risk and Governance Professional Bundle
    Are you interested in learning how to take a holistic approach addressing cyber threats and governing risk within organisations?