Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. SecureCodeWarrior
  4. GDPR for Development and Project Managers

GDPR for Development and Project Managers

This intermediate course provides a thorough understanding of GDPR's requirements for personal data protection and how they affect the software development lifecycle. Lessons provide details on mapping personal data within an organization and creating data flow maps that helps identify privacy-related risks. Learners will walk away understanding how data privacy impact assessments can be used to assess privacy risks and how to determine the needed technical and organizational controls. Security mechanisms that can be used to protect personal data and International Data Transfers (IDTs) are also presented within this course. This course has a prerequisite basic familiarity with the GDPR, and you are advised to complete Introduction to GDPR ahead of taking this course.

Provider Information

More courses from this provider:
Contact Information

SecureCodeWarrior
265 Franklin Street Suite 1702
Boston, MA 02110

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

none

Training Purpose
Functional Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

By the end of this content, learners will be able to:

  • Create a personal data inventory for an application and update the records of processing activities accordingly.
  • Understand how to create a data flow map and use it to determine risks for personal data.
  • Become familiar with data subject rights and how they affect the software development lifecycle.
  • Gain a thorough understanding of the GDPR requirements that affect the design phase of software development.
  • Go through the basic steps of a data privacy impact assessment and use it to determine the necessary privacy controls for an application.
  • Understand the security mechanisms that can be used to protect personal data.
  • Understand how to engage with law enforcement requests
  • Become familiar with the processes that need to be in place to detect and report a personal data breach.
  • Define International Data Transfers (IDTs) and be able to explain proper handling of data transfers to 3rd parties.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: