Certified Cloud Security Professional

The Certified Cloud Security Professional (CCSP) training course is the leading certification by (ISC)² and will teach you to negate security threats to your cloud storage by understanding information security risks and strategies to maintain data security. Covering the six sections of the Official (ISC)² CCSP Common Body of Knowledge (CBK®), this course will help you pass the exam obtaining your CCSP.

  • Course Overview
  • program highlights
  • Pre Requisites
  • Projects
  • Tools Covered
  • Career Centre
  • Syllabus
  • FAQ
 

 Program Highlights 

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Program Highlights 

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Pre Requisites 

 

Learners taking the DevOps online training course must be from a technical background with an understanding of Linux fundamentals, Web Development fundamentals, and Java fundamentals.

 

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 Tools Covered 

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Syllabus 

Week 1

Module 1: Cloud Concepts, Architecture, and Design
Module 2: Security Concepts
Module 3: Key Security Concepts, Defense in Depth, Due Care and Due Dilligence
Module 4: Security Controls and Functionalities
Module 5: Cloud Computing
Module 6: Business Drivers
Module 7: Scalability, Elasticity, Vendor Lock-in, and Vendor Lock-out
Module 8: Cloud Computing Concepts Advantages
Module 9: The Conceptual Reference Model
Module 10: Cloud Computing Roles and Actors
Module 11: Cloud Service Categories Infrastructure as a Service (IaaS)
Module 12: Cloud Service Categories Platform as a Service (PaaS)
Module 13: Cloud Service Categories Software as a Service (SaaS)
Module 14: Cloud Service Categories Management
Module 15: Cloud Deployment Models Public Cloud
Module 16: Cloud Deployment Models Private Cloud
Module 17: Cloud Deployment Models Hybrid Cloud
Module 18: Cloud Deployment Models Community Cloud
Module 19: Models and Characteristics
Module 20: Comparison of Cloud Deployment Models
Module 21: Case Study hybrid Cloud
Module 22: Cloud Technology Roadmap
Module 23: Impact of Related Technologies
Module 24: Cryptography
Module 25: Key Management
Module 26: IAM and IAM Phases
Module 27: Data Remanence
Module 28: Virtualization
Module 29: Common Threats
Module 30: Design Principles of Secure Cloud Computing
Module 31: Cost-Benefit Analysis
Module 32: Evaluate Cloud Service Providers
Module 33: SOC
Module 34: IT Security EvaluationIT Security Evaluation
Module 35: FIPS
Module 36: Scenario

Week 2

Module 36 Cloud Data Security
Module 37 Cloud Data Life Cycle
Module 38 Cloud Data Life Cycle: Create, Store, Use, and Share
Module 39 Real-World Scenario
Module 40 Cloud Data Life Cycle Archive
Module 41 Cloud Data Life Cycle Destroy, Business Scenario, and Key Data Functions
Module 42 Cloud Data Storage Architectures
Module 43 Cloud Data Storage Architectures: Storage Types for IaaS
Module 44 Cloud Data Storage Architectures: Storage Types for PaaS
Module 45 Cloud Data Storage Architectures: Storage Types for SaaS
Module 46 Cloud Data Storage Architectures: Threats to Storage Types
Module 47 Real-World Scenario
Module 48 Data Security Strategies
Module 49 Data Security Strategies Encryption (Use Cases)
Module 50 Data Security Strategies Encryption Challenges
Module 51 Data Security Strategies Encryption in IaaS
Module 52 Data Security Strategies Database Encryption
Module 53 Data Security Strategies Key Management
Module 54 Data Security Strategies Key Storage in the Cloud
Module 55 Data Security Strategies Masking
Module 56 Data Security Strategies Data Anonymization
Module 57 Data Security Strategies Tokenization
Module 58 Data Security Strategies Homomorphic Encryption and Bit Splitting
Module 59 Real-World Scenario
Module 60 Data Security Strategies Data Loss Prevention
Module 61 Scenario
Module 62 Data Discovery and Classification Technology
Module 63 Data Discovery and Classification Technology Data Classification
Module 64 Data Discovery and Classification Technology Challenges with Cloud Data
Module 65 Jurisdictional Data Protections for Personally Identifiable Information (PII)
Module 66 Privacy Acts GDPR
Module 67 Privacy Acts GDPR Data Protection
Module 68 Privacy Acts United States
Module 69 Privacy Acts HIPAA, FISMA, and SOX
Module 70 Jurisdictional Data Protections for PII Responsibilites of Cloud Services
Module 71 Data Rights Management
Module 72 Data Retention, Deletion, and Archiving Policies
Module 73 Data Retention
Module 74 Data Deletion
Module 75 Real World Scenario
Module 76 Data Archiving
Module 77 Real World Scenario
Module 78 Legal Hold
Module 79 Auditability, Traceability, and Accountability of Data Events
Module 80 SIEM
Module 81 Chain of Custody
Module 82 Nonrepudation
Module 83 Real World Scenario

Week 3

Module 84: Cloud Platform and Infrastructure Security
Module 85: Cloud Infrastructure Components
Module 86: Network and Communications
Module 87: Management Plane and Virtualization
Module 88: Factors That Impact Datacenter Design
Module 89: Physical Design - Buy or Build
Module 90: Physical Design - Datacenter Design Standards
Module 91: Physical Design - Uptime Institute
Module 92: Physical Design - Tiers
Module 93: Physical Design Features of Tiers
Module 94: Real-World Scenario
Module 95: Environmental Design Considerations
Module 96: Connectivity
Module 97: Hypervisor and Resource Allocation
Module 98: Risks Associated with Cloud Infrastructure
Module 99: Policy General and Virtualization Risks
Module 100: Cloud-Specific Legal and Non-Cloud Specific Risks
Module 101: Cloud Attack Vectors and Compensating Controls
Module 102: Business Scenario
Module 103: Design and Plan Security Controls
Module 104: Real-World Scenario
Module 105: Plan Disaster Recovery and Business Continuity
Module 106: Real-World Scenario
Module 107: BCDR Planning Factors and Disruptive Events
Module 108: Characteristics of Cloud Infrastructure
Module 109: BCDR strategies and Returning to Normal
Module 110: Real-World Scenario
Module 111: BCDR Creation
Module 112: BCDR Creation Test
Module 113: Business Requirements
Module 114: BCDR Creation Report and Revise
Module 115: Testing Types Uptime Availability Activity and Case Study
Module 116: Security Training and Awareness
Module 117: Real-World Scenario

Week 4

Module 118: Cloud Application Security
Module 119: Advocate Training and Awareness for Application Security
Module 120: Real-World Scenario
Module 121: Common Pitfalls
Module 122: Encryption Dependencies
Module 123: Business Scenario
Module 124: Understanding Software Development Lifecycle Process
Module 125: Real World Scenario
Module 126: Vulnerabilities and Risks
Module 127: Threat Modeling
Module 128: Real World Scenario
Module 129: Encryption
Module 130: Sandboxing and Application Virtualization
Module 131: Federated Identity Management
Module 132: SAML Authentication
Module 133: Identity and Access Management
Module 134: Multi Factor Authentication
Module 135: Real world Scenario
Module 136: Cloud Access Security Broker
Module 137: Application Security Testing
Module 138: Software Supply Chain Management
Module 139: Real World Scenario

Week 5

Module 140: Cloud Security Operations
Module 141: Secure Configuration of Hardware: Servers
Module 142: Secure Configuration of Hardware: Storage Controllers
Module 143: Real-World Scenario
Module 144: Secure Configuration of Hardware: Storage Controllers- ISCSI, Initiators and Targets, and Oversubscription02:26
Module 145: Secure Configuration of Hardware: Virtual Switches
Module 146: Configuration of VM Tools
Module 147: Configuration of VM Tools Running a Physical Infrastructure Part
Module 151: Real-World Scenario
Module 152: Securing Network Configuration Part
Module 153: Real-World Scenario
Module 154: Clustered Host
Module 155: Dynamic Optimization and Clustered Storage
Module 156: Maintenance Mode and Patch Management
Module 159: Network Security Controls Layered Security and Honeypots
Module 160: Network Security Controls SIEM
Module 161: Log Management
Module 162: Orchestration
Module 163: Availability of Guest OS
Module 164: Operations Management Part
Module 165: Real World Scenario
Module 166: Operations Management Part
Module 167: Risk Management Process Framing Risk and Risk Assessment
Module 168: Quantitative Risk Analysis
Module 169: Scenario
Module 170: Risk Response and Risk Monitoring
Module 171: Collection and Preservation of Digital Evidence
Module 172: Communication with Relevant Parties
Module 173: Real World Scenario
Module 174: Security Operations Center

Week 6

Module 175: Legal Risk and Compliance
Module 176: Case Study
Module 177: Legislative Concepts
Module 178: Intellectual Property Laws
Module 179: Case Study
Module 180: Business Scenario
Module 181: Acts and Agreements
Module 182: Case Study
Module 183: NERC
Module 184: Privacy Shield and Generally Accepted Privacy Principles (GAPP)
Module 185: Jurisdictional Differences in Data Privacy
Module 186: Terminologies and eDiscovery
Module 187: Forensic Requirements and PII
Module 188: Gap Analysis SOC Reports and Chain of Custody
Module 189: Vendor Management
Module 190: Cloud Computing Policies and Risk Attitude
Module 191: SLA
Module 192: Quality of Service
Module 193: Risk Mitigation
Module 194: Risk Management Metrics and ISO 28000 2007
Module 195: Real-World Scenario

 

 

 FAQ 

Where and when do the classes takes place?

All the courses are instructor-led and take place online. The online interface lets you and the faculty have a two-way interaction. It’s as good as sitting in a physical classroom.

All classes take place over the weekends in the mornings. There’ll be one class of 2 to 2.5 hours on Saturdays and Sundays each. This means that you can now acquire in-demand skills without compromising on your schedule.

Can i watch recording of the trail sections before enrolling?

Yes, the recordings of the trial classes are uploaded.

What is the benefit of taking online instructor-led courses?

In physical classrooms, students generally feel hesitant to ask questions. If you miss any class or didn’t understand some concepts, you can’t go through the class again. However, in online courses, it’s possible to do that. We share the recordings of all our classes after each class with the student. Also, there’s no hassle of long distance commuting and disrupting your schedule.

what kind of projects will i be working on?

We believe that unless you implement the concepts studied in the classes, you are unable to join the dots and hence can’t see the entire picture. Our capstone projects let you apply the learned concepts to real-world data sets. You’ll be working on real-time data-sets (which can run in 100s of MBs or possibly in GBs!) which you get to choose from a variety of domains such as retail, finance, social media, healthcare, etc. These datasets have been curated from top sources such as World Bank, US Health Department, Carnegie Mellon, Stanford and many more.

Where & how will i practice?

You’ll get access to our virtual computing lab through the login credentials provided to you. The virtual machines will enable you to work on “Big Data” sets for your projects and practice hands-on too.

Do i get a certificate of completion or certification?

We provide certification of completion to students who attend at least 70% of the classes. After the course ends, we conduct a certification exam that evaluates them on the skills they have learnt. Certification from Hatigen is provided to only those who clear the exam. The exam is purely case-based and not even a single theory question is asked.

Do you provide career assistance?

We provide career workshops and industry immersion sessions to help you become ready for roles you are aspiring for. We also help you in resume review and interview preparation. If you diligently follow our advice, you should start getting interview calls as soon as you finish the course.

1
Hello
How can we Help You
Powered by