CSSLP 2024: Privacy, PII, & Cross-border Data Transfers Security Requirements
CSSLP 2024
| Expert
- 11 videos | 1h 22m 38s
- Includes Assessment
- Earns a Badge
Regulations and standards are an important source of secure software requirements and these lay special emphasis on safeguarding personally identifiable information (PII) and protecting user privacy. In this course, learn about the security requirements and privacy safeguards embedded in major regulations like PIPEDA, CCPA, GDPR, HIPAA, COPPA, and the OECD and how these frameworks enforce stringent controls over personal data. You will also study the complexities of cross-border data transfers by comparing frameworks like Privacy Shield, and the APEC Privacy Framework. Explore data access provisioning and how to categorize diverse types of data objects. Finally, discover the distinctions between misuse and abuse scenarios in security requirements and how these scenarios impact organizations. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseAnalyze security requirements and privacy safeguards in pipeda, ccpa, and the gdprOutline security principles in hipaa, coppa, and the oecdIdentify types of pii, security controls around pii and the gdpr "right to be forgotten"Describe privacy shield, schrems-ii, and the apec privacy framework and contrast data residency and data sovereigntyAnalyze data access provisioning and enumerate types of objects
-
Compare user and service accounts in a data access provisioning systemDifferentiate between misuse and abuse scenarios in security requirementsDescribe the capec dictionary and the mitre att&ck framework for use in security requirementsAnalyze the types, structure, and uses of security requirements traceability matrices (srtms)Summarize the key concepts covered in this course
IN THIS COURSE
-
2m 8sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 33sUpon completion of this video, you will be able to analyze security requirements and privacy safeguards in PIPEDA, CCPA, and the GDPR. FREE ACCESS
-
7m 2sAfter completing this video, you will be able to outline security principles in HIPAA, COPPA, and the OECD. FREE ACCESS
-
10m 49sIn this video, you will learn how to identify types of PII, security controls around PII and the GDPR "right to be forgotten". FREE ACCESS
-
9m 10sIn this video, we will describe Privacy Shield, Schrems-II, and the APEC Privacy Framework and contrast data residency and data sovereignty. FREE ACCESS
-
6m 31sIn this video, discover how to analyze data access provisioning and enumerate types of objects. FREE ACCESS
-
7m 35sDiscover how to compare user and service accounts in a data access provisioning system. FREE ACCESS
-
8m 44sUpon completion of this video, you will be able to differentiate between misuse and abuse scenarios in security requirements. FREE ACCESS
-
8m 40sAfter completing this video, you will be able to describe the CAPEC Dictionary and the MITRE ATT&CK Framework for use in security requirements. FREE ACCESS
-
10m 7sIn this video, you will learn how to analyze the types, structure, and uses of Security Requirements Traceability Matrices (SRTMs). FREE ACCESS
-
2m 18sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.