CISSP® Training

The Certified Information Systems Security Professional (CISSP) certification is considered the gold standard in the field of information security. This CISSP training is aligned with (ISC)² CBK 2018 requirements and will train you to become an information assurance professional who defines all aspects of IT security, including architecture, design, management, and controls. Most IT security positions require or prefer a CISSP certification, so get started with your CISSP training today.

  • Course Overview
  • program highlights
  • Pre Requisites
  • Projects
  • Tools Covered
  • Career Centre
  • Syllabus
  • FAQ
 

 Program Highlights 

 

Why Choose CISSP Program?

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Program Highlights 

 

Why Choose CISSP Program?

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Pre Requisites 

 

Learners taking the DevOps online training course must be from a technical background with an understanding of Linux fundamentals, Web Development fundamentals, and Java fundamentals.

 

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 Tools Covered 

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Syllabus 

Week 1

Module 1:  Security and Risk Management
Module 2: Information Security Management
Module 3: Security Controls
Module 4: Information Security Management and Governance
Module 5: Goals, Mission, and Objectives
Module 6: Due Care
Module 7: Security Policy
Module 8: Compliance
Module 9: Computer Crimes
Module 10: Legal Systems
Module 11: Intellectual Property (IP) Law
Module 12: Privacy
Module 13: General Data Protection Regulation
Module 14: Security
Module 15: Risk Analysis
Module 16: Types of Risk Analysis
Module 17: Security Control Assessment
Module 18: Threat Modeling
Module 19: Supply-Chain Risk Management
Module 20: Third-Party Management
Module 21: Business Continuity Planning
Module 22: Business Continuity Planning Phases
Module 23: Managing Personnel Security
Module 24: Security Awareness Training
Module 25: Program Effectiveness Evaluation

Week 2

Module 27: Asset Security
Module 28: Information Classification
Module 29: Data Classification
Module 30: Data Life Cycle
Module 31: Data Management
Module 32: Different Roles
Module 33: Data Remanence
Module 34: Privacy
Module 35: States of Data
Module 36: Data Loss Prevention

Week 3

Module 37: Security Engineering
Module 38: Security Engineering
Module 39: Security Architecture
Module 40: Security Models
Module 41: Evaluation Criteria
Module 42: System Security
Module 43: CPU
Module 44: Memory
Module 45: Security Mode
Module 46: Cloud Computing
Module 47: IOT
Module 48: Industrial Control System (ICS)
Module 49: Cryptography
Module 50: Encryption Methods
Module 51: DES
Module 52: Asymmetric Cryptography
Module 53: Public Key Infrastructure
Module 54: Cryptanalysis
Module 55: Key Management
Module 56: Critical Path Analysis
Module 57: Site Location
Module 58: Fire
Module 59: HVAC

Week 4

Module 60: Communications and Network Security
Module 61: Network Architecture and Design
Module 62: IP Addressing
Module 63: Network Protocols
Module 64: Transmission Media
Module 65: Firewall
Module 66: Intrusion Detection System and Intrusion Prevention System
Module 67: Network Access Control (NAC)
Module 68: Content Delivery Network (CDN)
Module 69: Networks
Module 70: Software-Defined Networking (SDN)
Module 71: Remote Access
Module 72: Internet Security Protocol (IPsec)
Module 73: Voice over Internet Protocol (VoIP)
Module 74: Phreaking
Module 75: Secure Access Protocols
Module 76: Wireless Technologies
Module 77: Network Attacks

Week 5

Module 78: Identity and Access Management
Module 79: Identity and Access Management
Module 80: Identity Management
Module 81: Biometrics
Module 82: Passwords
Module 83: Tokens
Module 84: Memory Cards and Smart Cards
Module 85: Access and Authorization Concepts
Module 86: Identity Management Implementation
Module 87: Kerberos
Module 88: Access Control Types
Module 89: Access Control Models
Module 90: Access Control Tools and Techniques
Module 91: Accountability
Module 92: Access Control Monitoring
Module 93: Identity Proofing
Module 94: Markup Languages
Module 95: Identity as a Service (IDaaS)

Week 6

Module 96: Security Assessment and Testing
Module 97: Security Assessment
Module 98: Vulnerability Assessment
Module 99: Penetration Testing
Module 100: Audits
Module 101: Log Management
Module 102: Synthetic Transaction and Real Transaction
Module 103: Testing
Module 104: Software Testing
Module 105: Interface
Module 106: Key Performance Indicators (KPI)

Week 7

Module 107: Security Operations
Module 108: Investigation
Module 109: Forensic Investigation
Module 110: Evidence
Module 111: Electronic Discovery
Module 112: Incident Management
Module 113: Security Operations Management
Module 114: Identity and Access Management
Module 115: Assets
Module 116: Malware
Module 117: Management
Module 118: Recovery and Backup
Module 119: Disaster Recovery
Module 120: Perimeter Security

Week 8

Module 120: Software Development Security
Module 121: Importance of Software Development Security
Module 122: Programming Concepts
Module 123: Systems Development Life Cycle
Module 124: Application Program Interface
Module 125: Software Security and Assurance
Module 126: Database and Data Warehouse Environments
Module 127: Knowledge Management
Module 128: Web Application Environment
Module 129: Security Threats and Attacks

 

 

 FAQ 

Where and when do the classes takes place?

All the courses are instructor-led and take place online. The online interface lets you and the faculty have a two-way interaction. It’s as good as sitting in a physical classroom.

All classes take place over the weekends in the mornings. There’ll be one class of 2 to 2.5 hours on Saturdays and Sundays each. This means that you can now acquire in-demand skills without compromising on your schedule.

Can i watch recording of the trail sections before enrolling?

Yes, the recordings of the trial classes are uploaded.

What is the benefit of taking online instructor-led courses?

In physical classrooms, students generally feel hesitant to ask questions. If you miss any class or didn’t understand some concepts, you can’t go through the class again. However, in online courses, it’s possible to do that. We share the recordings of all our classes after each class with the student. Also, there’s no hassle of long distance commuting and disrupting your schedule.

what kind of projects will i be working on?

We believe that unless you implement the concepts studied in the classes, you are unable to join the dots and hence can’t see the entire picture. Our capstone projects let you apply the learned concepts to real-world data sets. You’ll be working on real-time data-sets (which can run in 100s of MBs or possibly in GBs!) which you get to choose from a variety of domains such as retail, finance, social media, healthcare, etc. These datasets have been curated from top sources such as World Bank, US Health Department, Carnegie Mellon, Stanford and many more.

Where & how will i practice?

You’ll get access to our virtual computing lab through the login credentials provided to you. The virtual machines will enable you to work on “Big Data” sets for your projects and practice hands-on too.

Do i get a certificate of completion or certification?

We provide certification of completion to students who attend at least 70% of the classes. After the course ends, we conduct a certification exam that evaluates them on the skills they have learnt. Certification from Hatigen is provided to only those who clear the exam. The exam is purely case-based and not even a single theory question is asked.

Do you provide career assistance?

We provide career workshops and industry immersion sessions to help you become ready for roles you are aspiring for. We also help you in resume review and interview preparation. If you diligently follow our advice, you should start getting interview calls as soon as you finish the course.

1
Hello
How can we Help You
Powered by