Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy

CSSLP 2019    |    Intermediate
  • 7 videos | 20m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 92 users Rating 4.8 of 92 users (92)
This course explores various issues related to privacy requirements, and their importance in determining how to provide security throughout the software development lifecycle. You will learn the software requirements used to help identify privacy requirements, including data anonymization, user consent, and data disposition. You will learn how an enterprise's high-level privacy policy influences its security responsibilities for the collection, storage, use, and transfer of personal information. This 7-video course examines how organizations collect personal information during their day-to-day business operations. Next, learn the legal importance of protecting PII (personally identifiable information), which is a legal term defined in a memorandum published by the US Office of Management and Budget. You will learn how the European Union (EU) views data protection by its data protection directive, known as EUDPD. Finally, learners will explore the importance of securing data during the process of disposal. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the importance of a high-level privacy policy
    Describe information used to specifically identify an individual
    Describe the benefits of breach notifications
  • Recognize data protection principles including user consent
    Describe the importance of security during the disposal stage
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 38s
  • 2m 48s
    After completing this video, you will be able to recognize the importance of a high-level privacy policy. FREE ACCESS
  • Locked
    3.  Personally Identifiable Information
    4m 13s
    After completing this video, you will be able to describe information used to specifically identify an individual. FREE ACCESS
  • Locked
    4.  Breach Notifications
    2m 23s
    Upon completion of this video, you will be able to describe the benefits of notifications of a breach. FREE ACCESS
  • Locked
    5.  Data Protection Principles
    6m 6s
    After completing this video, you will be able to recognize data protection principles, including user consent. FREE ACCESS
  • Locked
    6.  Disposition
    2m 28s
    After completing this video, you will be able to describe the importance of security during the disposal stage. FREE ACCESS
  • Locked
    7.  Course Summary
    1m 4s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.6 of 147 users Rating 4.6 of 147 users (147)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 86 users Rating 4.5 of 86 users (86)
Rating 4.4 of 281 users Rating 4.4 of 281 users (281)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)