ISACA CDPSE Training Boot Camp

Transform your career in 5 days

Certified Data and Privacy Solutions Engineer (CDPSE) boot camp offers a natural progression for IT professionals who are tasked with designing, implementing and managing the technology that stores, collects and transports PII, as well as ensuring that privacy is considered in the design.

4.6 (738 ratings)

Affirm Financing available
Exam Pass Guarantee

Course essentials

ISACA CDPSE training at a glance

  • Method

    Online, in-person, team onsite

  • Duration

    5 days

  • Experience

    3-5 years of experience

What you'll learn

Training overview

Infosec’s CDPSE boot camp was created for IT professionals engaged in creating and implementing technical privacy solutions and data scientists/analysts who mine and analyze data for customer insights. CDPSE showcases your technical expertise and validates your understanding and ability to implement privacy-enhanced design working cross-functionally with legal, policy, DBAs, engineers, software developers and back-end and front-end experts. This is the only privacy certification that is experience-based and requires certification holders to maintain and add to their knowledge and skills through CPEs.

Who should attend

Who Should Attend Image
  • Data scientists
  • Data analysts
  • Lead software engineers – data and system privacy
  • IT project managers
  • Privacy analysts
  • Privacy advisors
  • Security and privacy consultants
  • Lead privacy managers
  • Security and privacy engineers
  • Software engineers – backend privacy
  • Engineering management – privacy engineering
  • Domain architect – legal care compliance, privacy
  • Privacy solutions architects
  • Information security engineers – user data protection

ISACA Accredited Training Organization (ATO)

Infosec is one of a select number of ISACA accredited Elite+ Partners in the world. When you enroll in an Infosec CISM Boot Camp, you can rest assured you are receiving the most effective and up-to-date certification prep available, including official ISACA training materials and instruction that has been independently assessed to meet ISACA’s quality standards.

Award-winning training you can trust

Don't take our word for it

Read our independent reviews via TrustRadius

  • 10 out of 10 March 04, 2024

    An excellent choice to keep up with cybersecurity education

    The field of information security is constantly evolving as new threats are discovered each day. Our consultants have to keep up with new knowledge and techniques to conduct pentesting, vulnerability remediation, computer forensic audits, and so on. Traditional training in cybersecurity is very expensive, lengthy, and lacks practical experience. When we found Infosec Skills we were impressed with the many themes available in their library, their focus, and also with the price, which is very economic in comparison with other alternatives. Also, their cyber ranges allow our employees to practice the skills needed in a very practical way. We are very happy to count on Infosec [Skills] as an educational ally.

    Karina Astudillo

    Karina Astudillo

    CEO (Chief Executive Officer)

  • 10 out of 10 March 01, 2024

    Fantastic Product

    Our security department is in its infancy and we use it daily to learn best practices and educate ourselves on tools that can be used to help secure our environment. There are a couple of staff members looking to obtain certifications and it's also used to prepare them for the test.

    Brian Shetter

    Brian Shetter

    Security Engineer / Analyst

  • 10 out of 10 August 28, 2023

    The top notch cyber security knowledge hub

    We have relied on Infosec Skills to get the latest data and information on cyber security. The company has welcoming staff that interacts freely with our members during training sessions. I have acquired top notch skills of discovering threats from internet. The frequent awareness data helps us to set policies of countering new forms of ransomware attacks. I have advanced my knowledge on modern cyber attacks and I can collaborate with my colleagues with confidence.

    Susan Davone

    Susan Davone

    Administrative Clerk

Ready to discuss your training goals? We've got you covered.

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

Sorry, we're unable to load the form at the moment. Please check your browser's settings to confirm the form is not blocked. You can contact us and report the issue here: infosec.info@cengage.com.

Step 1

Step 2

Finish

Step 1

Step 2

Finish

Thanks! We look forward to meeting with you!

What's included

Everything you need to know

 Certification Logo
  • 90-day extended access to Boot Camp components, including class recordings
  • 12-Month subscription to the ISACA Official Question, Answer & Explanation (QAE) database
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Knowledge Transfer Guarantee
  • Unlimited practice exam attempts

What makes the Infosec CDPSE prep course different?

You can rest assured that the CDPSE training materials are fully updated and synced with the latest version of the exam. With 20 years of training experience, we stand by our CDPSE training with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!

Before your boot camp

Prerequisites

Prior to enrolling in the ISACA CDPSE Training Boot Camp, you must have:

  • Five years of work experience performing the work described within the exam content outline

Experience must be earned in a minimum of two CDPSE Exam Content Outline Domains. Experience waivers: Holding one of the following certifications: CISA, CISM, CGEIT, CRISC, CSX-P, FIP reduces the work experience requirements to 3 years

Syllabus

Training schedule

Day 1
Morning session

Domain 1 - Privacy Governance

Governance

  • Personal data and information
  • Privacy laws and standards across jurisdictions
  • Privacy documentation (e.g., policies, guidelines)
  • Legal purpose, consent, and legitimate interest
  • Data subject rights

Schedule may vary from class to class

Afternoon session

Domain 1 - Privacy Governance

Management

  • Roles and responsibilities related to data
  • Privacy training and awareness
  • Vendor and third-party management
  • Audit process
  • Privacy incident management

Schedule may vary from class to class

Evening session

Domain 1 - Privacy Governance

Risk Management

  • Risk management process
  • Privacy Impact Assessment (PIA)
  • Threats, attacks and vulnerabilities related to privacy

Schedule may vary from class to class

Day 2
Morning session

Domain 1 - Privacy Governance

Risk Management

  • Risk management process
  • Privacy Impact Assessment (PIA)
  • Threats, attacks and vulnerabilities related to privacy

Schedule may vary from class to class

Afternoon session

Domain 2 - Privacy Architecture

Infrastructure

  • Technology stacks
  • Cloud-based services
  • Endpoints
  • Remote access
  • System hardening

Schedule may vary from class to class

Evening session

Domain 2 - Privacy Architecture

Applications and Software

  • Secure development lifecycle (e.g. privacy by design)
  • Applications and software hardening
  • APIs and services
  • Tracking technologies

Schedule may vary from class to class

Day 3
Morning session

Domain 2 - Privacy Architecture

Applications and Software

  • Secure development lifecycle (e.g. privacy by design)
  • Applications and software hardening
  • APIs and services
  • Tracking technologies

Schedule may vary from class to class

Afternoon session

Domain 2 - Privacy Architecture

Technical Privacy Controls

  • Communication and transport protocols
  • Encryption, hashing and de-identification
  • Key management
  • Monitoring and logging
  • Identity and access management

Schedule may vary from class to class

Evening session

Domain 2 - Privacy Architecture

Technical Privacy Controls

  • Communication and transport protocols
  • Encryption, hashing and de-identification
  • Key management
  • Monitoring and logging
  • Identity and access management

Schedule may vary from class to class

Day 4
Morning session

Domain 3 - Data Cycle

Data Purpose

  • Data inventory and classification (e.g. tagging, tracking, SOR)
  • Data quality and accuracy
  • Dataflow and useage diagrams
  • Data use limitation
  • Data analytics (e.g. aggregation, AI, machine learning, big data)

Schedule may vary from class to class

Afternoon session

Domain 3 - Data Cycle

Data Purpose

  • Data inventory and classification (e.g. tagging, tracking, SOR)
  • Data quality and accuracy
  • Dataflow and useage diagrams
  • Data use limitation
  • Data analytics (e.g. aggregation, AI, machine learning, big data)

Schedule may vary from class to class

Evening session

Domain 3 - Data Cycle

Data Purpose

  • Data inventory and classification (e.g. tagging, tracking, SOR)
  • Data quality and accuracy
  • Dataflow and useage diagrams
  • Data use limitation
  • Data analytics (e.g. aggregation, AI, machine learning, big data)

Schedule may vary from class to class

Day 5
Morning session

Domain 3 - Data Cycle

Data Persistence

  • Data minimization (e.g. deidentification, anonymization)
  • Data migration
  • Data storage
  • Data warehousing (e.g. data lake)
  • Data retention and archiving
  • Data destruction

Schedule may vary from class to class

Afternoon session

Domain 3 - Data Cycle

Data Persistence

  • Data minimization (e.g. deidentification, anonymization)
  • Data migration
  • Data storage
  • Data warehousing (e.g. data lake)
  • Data retention and archiving
  • Data destruction

Schedule may vary from class to class

Evening session

Domain 3 - Data Cycle

Data Persistence

  • Data minimization (e.g. deidentification, anonymization)
  • Data migration
  • Data storage
  • Data warehousing (e.g. data lake)
  • Data retention and archiving
  • Data destruction

Schedule may vary from class to class

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

You're in good company

EH

The instructor was able to take material that prior to the class had made no sense, and explained it in real world scenarios that were able to be understood.

Erik Heiss, United States Air Force
MJ

I really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that it could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam, but will help in all exams I take in the future.

Michelle Jemmott, Pentagon
RC

The course was extremely helpful and provided exactly what we needed to know in order to successfully navigate the exam. Without this I am not confident I would have passed.

Robert Caldwell, Salient Federal Solutions