CSSLP 2024: Privacy, PII, & Cross-border Data Transfers Security Requirements

CSSLP 2024    |    Expert
  • 11 videos | 1h 22m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 8 users Rating 4.9 of 8 users (8)
Regulations and standards are an important source of secure software requirements and these lay special emphasis on safeguarding personally identifiable information (PII) and protecting user privacy. In this course, learn about the security requirements and privacy safeguards embedded in major regulations like PIPEDA, CCPA, GDPR, HIPAA, COPPA, and the OECD and how these frameworks enforce stringent controls over personal data. You will also study the complexities of cross-border data transfers by comparing frameworks like Privacy Shield, and the APEC Privacy Framework. Explore data access provisioning and how to categorize diverse types of data objects. Finally, discover the distinctions between misuse and abuse scenarios in security requirements and how these scenarios impact organizations. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Analyze security requirements and privacy safeguards in pipeda, ccpa, and the gdpr
    Outline security principles in hipaa, coppa, and the oecd
    Identify types of pii, security controls around pii and the gdpr "right to be forgotten"
    Describe privacy shield, schrems-ii, and the apec privacy framework and contrast data residency and data sovereignty
    Analyze data access provisioning and enumerate types of objects
  • Compare user and service accounts in a data access provisioning system
    Differentiate between misuse and abuse scenarios in security requirements
    Describe the capec dictionary and the mitre att&ck framework for use in security requirements
    Analyze the types, structure, and uses of security requirements traceability matrices (srtms)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 8s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 33s
    Upon completion of this video, you will be able to analyze security requirements and privacy safeguards in PIPEDA, CCPA, and the GDPR. FREE ACCESS
  • Locked
    3.  Additional Security Requirements Around Privacy
    7m 2s
    After completing this video, you will be able to outline security principles in HIPAA, COPPA, and the OECD. FREE ACCESS
  • Locked
    4.  Working with Personally Identifiable Information (PII)
    10m 49s
    In this video, you will learn how to identify types of PII, security controls around PII and the GDPR "right to be forgotten". FREE ACCESS
  • Locked
    5.  Cross-border Data Transfers
    9m 10s
    In this video, we will describe Privacy Shield, Schrems-II, and the APEC Privacy Framework and contrast data residency and data sovereignty. FREE ACCESS
  • Locked
    6.  Data Access Provisioning and Objects
    6m 31s
    In this video, discover how to analyze data access provisioning and enumerate types of objects. FREE ACCESS
  • Locked
    7.  Granting Data Access for Users and Service Accounts
    7m 35s
    Discover how to compare user and service accounts in a data access provisioning system. FREE ACCESS
  • Locked
    8.  Misuse vs. Abuse Scenarios
    8m 44s
    Upon completion of this video, you will be able to differentiate between misuse and abuse scenarios in security requirements. FREE ACCESS
  • Locked
    9.  The CAPEC Dictionary and the MITRE ATT&CK Frameworks
    8m 40s
    After completing this video, you will be able to describe the CAPEC Dictionary and the MITRE ATT&CK Framework for use in security requirements. FREE ACCESS
  • Locked
    10.  The Security Requirements Traceability Matrix (SRTM)
    10m 7s
    In this video, you will learn how to analyze the types, structure, and uses of Security Requirements Traceability Matrices (SRTMs). FREE ACCESS
  • Locked
    11.  Course Summary
    2m 18s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)