Certified: The ISACA CDPSE Audio Course

Ukupno trajanje:11 h 33 min
Episode 1 — Decode what the CDPSE exam actually tests across real privacy engineering work
Certified: The ISACA CDPSE Audio Course
17:27
Episode 2 — Build a spoken 30-day CDPSE study plan that tracks every tested objective
Certified: The ISACA CDPSE Audio Course
15:05
Episode 3 — Exam Acronyms: High-Yield Audio Reference for Fast CDPSE Recall
Certified: The ISACA CDPSE Audio Course
16:59
Episode 4 — Recognize personal information precisely across systems, contexts, and data types
Certified: The ISACA CDPSE Audio Course
16:06
Episode 5 — Apply privacy principles like Privacy by Design, consent, and transparency end-to-end (Domain 1A-2 Privacy Principles)
Certified: The ISACA CDPSE Audio Course
15:54
Episode 6 — Interpret privacy laws and regulations as concrete, testable engineering requirements (Domain 1A-3 Privacy Laws and Regulations)
Certified: The ISACA CDPSE Audio Course
17:04
Episode 7 — Handle cross-border and sector rules without losing control of privacy obligations (Domain 1A-3 Privacy Laws and Regulations)
Certified: The ISACA CDPSE Audio Course
16:34
Episode 8 — Build privacy documentation that survives audits, incidents, and organizational change (Domain 1A-4 Privacy Documentation)
Certified: The ISACA CDPSE Audio Course
15:40
Episode 9 — Define privacy roles, culture, and responsibilities so accountability is real (Domain 1B-1 Organizational Culture, Structure, and Responsibilities)
Certified: The ISACA CDPSE Audio Course
14:52
Episode 10 — Engineer vendor and supply chain privacy controls that hold up under pressure (Domain 1B-2 Vendor and Supply Chain Management)
Certified: The ISACA CDPSE Audio Course
15:37
Episode 11 — Run privacy incident management with clear triggers, evidence, and remediation flow (Domain 1B-3 Incident Management)
Certified: The ISACA CDPSE Audio Course
19:53
Episode 12 — Deliver data subject rights, requests, and notification with speed and correctness (Domain 1B-4 Data Subject Rights, Requests, and Notification)
Certified: The ISACA CDPSE Audio Course
21:58
Episode 13 — Spaced Retrieval Review: Rapid recall for Domain 1 governance and operations essentials (Domain 1A-1 to 1B-4)
Certified: The ISACA CDPSE Audio Course
18:21
Episode 14 — Build a privacy risk management process that stays consistent and repeatable (Domain 2A-1 Risk Management Process and Policies)
Certified: The ISACA CDPSE Audio Course
18:26
Episode 15 — Perform privacy-focused assessments like PIAs with practical scope and outputs (Domain 2A-2 Privacy-Focused Assessment)
Certified: The ISACA CDPSE Audio Course
16:51
Episode 16 — Make privacy training and awareness stick in real teams and workflows (Domain 2A-3 Privacy Training and Awareness)
Certified: The ISACA CDPSE Audio Course
16:22
Episode 17 — Identify privacy threats and vulnerabilities before they become operational failures (Domain 2A-4 Threats and Vulnerabilities)
Certified: The ISACA CDPSE Audio Course
17:55
Episode 18 — Choose risk responses that balance privacy, delivery, and business reality (Domain 2A-5 Risk Response)
Certified: The ISACA CDPSE Audio Course
17:47
Episode 19 — Use privacy frameworks to structure controls, evidence, and governance decisions (Domain 2B-1 Privacy Frameworks)
Certified: The ISACA CDPSE Audio Course
16:13
Episode 20 — Produce evidence and artifacts that prove privacy controls actually work (Domain 2B-2 Evidence and Artifacts)
Certified: The ISACA CDPSE Audio Course
17:44
Episode 21 — Build a data inventory you can trust and keep it current (Domain 2C-1 Data Inventory)
Certified: The ISACA CDPSE Audio Course
16:02
Episode 22 — Map data flows end-to-end so privacy risk is visible, not guessed (Domain 2C-2 Data Flow)
Certified: The ISACA CDPSE Audio Course
14:57
Episode 23 — Classify data properly to drive the right privacy safeguards (Domain 2C-3 Data Classification)
Certified: The ISACA CDPSE Audio Course
16:16
Episode 24 — Use data minimization to reduce exposure without breaking the business (Domain 2C-4 Data Minimization)
Certified: The ISACA CDPSE Audio Course
17:36
Episode 25 — Define retention and disposal that is enforceable across systems and vendors (Domain 2C-5 Retention and Disposal)
Certified: The ISACA CDPSE Audio Course
17:45
Episode 26 — Build consent management that is measurable, reversible, and reliable (Domain 2C-6 Consent Management)
Certified: The ISACA CDPSE Audio Course
16:20
Episode 27 — Apply purpose limitation so data use stays aligned with promises and approvals (Domain 2C-7 Purpose Limitation)
Certified: The ISACA CDPSE Audio Course
14:57
Episode 28 — Manage privacy in third-party data sharing with clear boundaries and controls (Domain 2C-8 Data Sharing and Third Parties)
Certified: The ISACA CDPSE Audio Course
14:42
Episode 29 — Protect privacy in monitoring, logging, and observability without losing visibility (Domain 2C-9 Monitoring and Logging)
Certified: The ISACA CDPSE Audio Course
16:11
Episode 30 — Spaced Retrieval Review: Data inventory, flows, classification, minimization, and retention (Domain 2C-1 to 2C-9)
Certified: The ISACA CDPSE Audio Course
15:21
Episode 31 — Spaced Retrieval Review: Data life cycle management from collection to destruction (Domain 3A-1 to 3B-4)
Certified: The ISACA CDPSE Audio Course
18:15
Episode 32 — Choose infrastructure and platform approaches for privacy across legacy and cloud (Domain 4A-1 Infrastructure and Platform Technology)
Certified: The ISACA CDPSE Audio Course
18:55
Episode 33 — Secure devices and endpoints so personal information exposure stays contained (Domain 4A-2 Devices and Endpoints)
Certified: The ISACA CDPSE Audio Course
19:22
Episode 34 — Design connectivity choices that reduce privacy risk across networks and services (Domain 4A-3 Connectivity)
Certified: The ISACA CDPSE Audio Course
19:28
Episode 35 — Embed privacy into the secure development life cycle without slowing delivery (Domain 4A-4 Secure Development Life Cycle)
Certified: The ISACA CDPSE Audio Course
19:01
Episode 36 — Engineer APIs and cloud-native services to prevent silent privacy failure modes (Domain 4A-5 APIs and Cloud-Native Services)
Certified: The ISACA CDPSE Audio Course
18:13
Episode 37 — Operationalize asset management so data assets and owners are never ambiguous (Domain 4B-1 Asset Management)
Certified: The ISACA CDPSE Audio Course
18:25
Episode 38 — Implement identity and access management that enforces least privilege for privacy (Domain 4B-2 Identity and Access Management)
Certified: The ISACA CDPSE Audio Course
19:34
Episode 39 — Maintain patching and hardening discipline that protects privacy at scale (Domain 4B-3 Patch Management and Hardening)
Certified: The ISACA CDPSE Audio Course
20:48
Episode 40 — Select transport protocols that protect privacy across modern and legacy paths (Domain 4B-4 Communication and Transport Protocols)
Certified: The ISACA CDPSE Audio Course
18:04