% Discount
New

IIBA®-CCA Certification Training Course - Certificate in Cybersecurity Analysis

The IIBA®-endorsed CCA® certificate validates your skills in cybersecurity, equipping you to tackle cyber threats and prepare for the IIBA®-CCA exam for global certification.

5.0
(5)

Choose Delivery Methods / Available Dates

Duration
--
PDUs
20
Exam
Exam
--

Why Bakkah?

Money Guaranteed
Global Accreditation
Flexible Learning

What are the Goals of the IIBA-CCA Course?

The IIBA-CCA is a professional certificate designated for business analysts, who seek to acquire professional expertise in tackling digital security challenges and threats in organizations through cybersecurity practices and tools.

In today’s age where cyberattacks are becoming more prevalent and may lead to sensitive and crucial data loss, cybersecurity becomes the protection shield that saves organizations against digital threats.

It’s defined as an approach, designed to safeguard organizations’ programs, networks, data, systems, and computers from threats like phishing, malware, and ransomware.  

Therefore, the IIBA-CCA course is designed by industry experts to guide you to:

1- Learning Cybersecurity Fundamentals

The IIBA-CCA training targets acquiring a holistic understanding of cybersecurity analysis concepts and learning cybersecurity principles.

2- Learning Tackling Cyberattacks

This goal aims to know how to identify cyberattacks and differentiate among their different types. You’ll learn also how to apply strategies to mitigate cyber risks effectively and get ready for today’s cybersecurity challenges.

3- Reinforcing the Organization's Security

Our trainers will guide you in this course on how to utilize various types of enterprise security like physical security, network security, and product security.

This goal includes knowing how to maintain data security and deliver cyber solutions, applying cybersecurity technologies like the Internet of Things. Furthermore, you’ll be empowered to implement cybersecurity tools in real-world scenarios and user access control practices and techniques.

4- Meeting Business Needs

With IIBA-CCA training, you’ll learn how to align security strategies with business goals, adapt to changing business requirements and needs, and stay up-to-date with the latest trends in cybersecurity.

Who needs this IIBA®-CCA Course?

Certificate in Cybersecurity Analysis course is designated for:

  • Business analysts.
  • Project managers.
  • Business system analysts.
  • Anyone interested in strategic business analysis.
  • Anyone interested in cybersecurity business analysis.

What are the skills Acquired from IIBA®-CCA Course?

Earning The IIBA-CCA certificate demonstrates you have in-demand skills in cybersecurity as a business analysis professional, these skills are:

  • Cyber risk management.
  • Communication and collaboration with the stakeholders.
  • Decision making.
  • Enterprise analysis.
  • Requirement analysis.
  • Familiarity with cybersecurity analysis fundamentals.
  • Adaptability.
  • Data analysis.
  • Familiarity with cybersecurity regulations.
  • Emerging technologies.

IIBA®-CCA Online Training

The training details include:

  • Duration of training: 6 Days.
  • Exam Simulation.
  • Practice Test.
  • Group Activity (Break-out Session) after each lesson.
  • Access to additional References – Glossary/ Recommended Reading/ Syllabus.
  • The material language will be English.

IIBA-CCA Certification Exam Format 

You can start preparing for the exam by knowing all the exam’s required details:

  • Online objective testing.
  • 75 questions, each one worth 1 mark.
  • Exam duration: 90 minutes.
  • Exam preparation requires a PC, camera, microphone, and internet access.

Booking IIBA®-CCA Certification Exam

To book the exam: log in or create an IIBA profile and go to My Certifications and the Certification Summary page. Review the specific handbook for details and purchase your exam.

 

 

Course Inclusions

Cybersecurity Overview and Basic Concepts
  • IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity
  • Importance of Security
  • IT Functions & Roles
  • IT 101 - 1: The Pieces
  • IT 101 - 2: Using & Managing the Pieces
  • IT 101 - 3: Advancement
  • The Role of Business Analysis in Cybersecurity
  • Governance Perspectives of Cybersecurity

Enterprise Security Concepts
  •  Security Accountability
  •  Cost of Securing an Organization
  •  Outsourcing for Cybersecurity Expertise and Services
  •  Risk Tolerance
  •  Compliance
  •  Best Practices and Benchmarking
  •  Data Privacy
  •  Data Privacy Nuances
  •  Digital Rights Management (DRM)
  •  Audit – Internal and External

Enterprise Risk
  • Risk Management & Control Assurance Framework
  • Organizational Risk Assessment
  • Risk Analysis: Threat Risk Assessments
  • Risk Analysis: Vulnerability Assessments
  • Business Case Development
  • Disaster Recovery and Business Continuity

Cybersecurity Risks and Controls
  • Understanding Security Controls and IT Risk
  • CIA Triad
  • Applying Controls
  • Cybersecurity Threats
  • Cybersecurity Vulnerabilities
  • Adverse Impacts
  • Risks and Controls – Putting It All Together

Securing the Layers
  • Physical Security
  • Endpoint Security
  • Network Security: Security Architecture
  • Network Security: Firewalls
  • Network Security: Anti-Virus/Anti-Malware
  • Network Security: Segregation
  • System Security: Servers
  • Platform Security
  • Product Security: Threat Models
  • Product Security: Embedded Systems
  • Product Security: Internet of Things

Data Security
  • Data Security At Rest: Information Classification & Categorization
  • Data Security In Transit: Encryption and Keys
  • Data Security In Transit: SSL/TLS
  • Data Security In Transit: Digital Signature and Identification

User Access Control
  • Directory Management
  • Authorization
  • Authentication and Access Control
  • Privileged Account Management
  • Users and Security Awareness

Solution Delivery
  • SDLC and Solution Security Planning
  • Requirements and Security Engineering
  • Requirements and Solution Development
  • Solution Security: Applications
  • Solution Security: Databases
  • Solution Security: Web
  • Change Impact Analysis

Operations
  • Incident Response, Recovery, and Remediation
  • Metrics and Reporting
  • Risk Logging and Mitigation Tracking
  • Operational Risk Ownership
  • Computer Forensics: SOC, SIEM
  • Future Proofing your Security Posture

Want a training for a group?

Choose your convenient course from plenty of courses in different fields.

FAQs

Through Bakkah, you can easily purchase the exam voucher. However, the registration and examination processes are handled directly between the trainee and the accreditation body. As an accredited partner, we can provide support whenever needed, but are not responsible for issues related to technical problems, scheduling, or your exam readiness.

Generally Yes. But you always get confirmation of the session's date one week before the selected date, and based on that, communication is established with the registered participants.

Although there are no prerequisites for the specialized certifications, we highly recommend business analysis experience and some experience working in the specialized area. Refer to the certification pages on the IIBA website for details.

YES, by IIBA.

No

Online

No

90 minutes

You will see your exam results immediately after you submit your exam. Confirmation of your exam result will also be emailed to you by IIBA within 2 business days.

IIBA does not provide scores or scoring percentages for any of our certification exams. This is quite common practice for professional certifications provided by professional member associations like IIBA. Performance indicators are provided to help candidates target either their preparation for an exam retake or, their plans to improve performance on the job. They are intended for the candidates’ support not for comparison with other candidates.

You must wait for IIBA to receive your exam result from the testing provider and upload it to your IIBA profile before you can pay and schedule your rewrite exam. This may take up to 24 hours from your exam day. As soon as your score is uploaded into your IIBA profile account, you will receive an e-mail from IIBA instructing you on your next steps to pay the exam rewrite fee and to schedule your rewrite of the exam. To schedule your rewrite, you are required to pay the rewrite fee to IIBA first.

Please review our exam cancellation and rescheduling policy within our Exam Information page

From your exam date, it can take up to 2 business day for IIBA to process your result from the testing provider. Once this is done, you will receive a confirmation e-mail from IIBA.

Yes

 Bakkah has an array of certified practitioners with several years in teaching.

English

English

Online classes are delivered using our Learning Management System (LMS). We provide access to pre-course reading, pre-post assessment, chapter exercises, practice test, case studies and to additional references Glossary/Recommended Reading in our LMS.

Yes, there are group activities after each lesson where you can interact with other online students.

WhatsApp