Exam is Available
Exam is Available

IIBA®-CCA Certification Training Course - Certificate in Cybersecurity Analysis

IIBA®-CCA Certification is a certification presented by the IIBA® and IEEE Computer Society which have partnered to offer a robust learning and certification program on what business analysis professionals need to know to be prepared for today’s cybersecurity challenges.

Bakkah learning introduction

6 Days


20 Hours

Nearest Session

12 May 2024



This course includes:

  • Interactive Training Method
  • 100+ Practice Questions
  • Certified Trainer
  • Convenient Delivery Option
  • 24/7 Learner Support
  • Content Designed by Industry Experts
  • One Year Subscription

Want a training for a group?

Choose your convenient course from plenty of courses in different fields.

Register Group

Live Online Schedule

Who Needs this Course

Skills & Competencies

Delivery Method

Exam Details

Who needs this IIBA®-CCA Course?

Business analysis professionals working in the cybersecurity space.

What are the skills Acquired from IIBA®-CCA Course?

IIBA and IEEE Computer Society’s program provides the credibility of a joint certification and the opportunity to learn key cybersecurity concepts and tools business analysis professionals need to demonstrate core competencies.


IIBA®-CCA Online Training

  • Duration: 6 Days
  • Exam Simulation
  • Practice Test
  • Group Activity (Break-out Session) after each lesson
  • Access to additional References – Glossary/ Recommended Reading/ Syllabus
  • The material language will be English

IIBA-CCA Certification Exam Format 

  • Objective testing
  • 75 questions, each worth 1 mark
  • 90 minutes

IIBA®-CCA Certifications

Log in or create an IIBA profile and go to My Certifications and the Certification Summary page. Review the specific handbook for details and purchase your exam.

Course Outline

  • IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity
  • Importance of Security
  • IT Functions & Roles
  • IT 101 - 1: The Pieces
  • IT 101 - 2: Using & Managing the Pieces
  • IT 101 - 3: Advancement
  • The Role of Business Analysis in Cybersecurity
  • Governance Perspectives of Cybersecurity
  •  Security Accountability
  •  Cost of Securing an Organization
  •  Outsourcing for Cybersecurity Expertise and Services
  •  Risk Tolerance
  •  Compliance
  •  Best Practices and Benchmarking
  •  Data Privacy
  •  Data Privacy Nuances
  •  Digital Rights Management (DRM)
  •  Audit – Internal and External
  • Risk Management & Control Assurance Framework
  • Organizational Risk Assessment
  • Risk Analysis: Threat Risk Assessments
  • Risk Analysis: Vulnerability Assessments
  • Business Case Development
  • Disaster Recovery and Business Continuity
  • Understanding Security Controls and IT Risk
  • CIA Triad
  • Applying Controls
  • Cybersecurity Threats
  • Cybersecurity Vulnerabilities
  • Adverse Impacts
  • Risks and Controls – Putting It All Together
  • Physical Security
  • Endpoint Security
  • Network Security: Security Architecture
  • Network Security: Firewalls
  • Network Security: Anti-Virus/Anti-Malware
  • Network Security: Segregation
  • System Security: Servers
  • Platform Security
  • Product Security: Threat Models
  • Product Security: Embedded Systems
  • Product Security: Internet of Things
  • Data Security At Rest: Information Classification & Categorization
  • Data Security In Transit: Encryption and Keys
  • Data Security In Transit: SSL/TLS
  • Data Security In Transit: Digital Signature and Identification
  • Directory Management
  • Authorization
  • Authentication and Access Control
  • Privileged Account Management
  • Users and Security Awareness
  • SDLC and Solution Security Planning
  • Requirements and Security Engineering
  • Requirements and Solution Development
  • Solution Security: Applications
  • Solution Security: Databases
  • Solution Security: Web
  • Change Impact Analysis
  • Incident Response, Recovery, and Remediation
  • Metrics and Reporting
  • Risk Logging and Mitigation Tracking
  • Operational Risk Ownership
  • Computer Forensics: SOC, SIEM
  • Future Proofing your Security Posture


Generally Yes. But you always get confirmation of the session's date one week before the selected date, and based on that, communication is established with the registered participants.

Although there are no prerequisites for the specialized certifications, we highly recommend business analysis experience and some experience working in the specialized area. Refer to the certification pages on the IIBA website for details.










90 minutes


You will see your exam results immediately after you submit your exam. Confirmation of your exam result will also be emailed to you by IIBA within 2 business days.


IIBA does not provide scores or scoring percentages for any of our certification exams. This is quite common practice for professional certifications provided by professional member associations like IIBA. Performance indicators are provided to help candidates target either their preparation for an exam retake or, their plans to improve performance on the job. They are intended for the candidates’ support not for comparison with other candidates.


You must wait for IIBA to receive your exam result from the testing provider and upload it to your IIBA profile before you can pay and schedule your rewrite exam. This may take up to 24 hours from your exam day. As soon as your score is uploaded into your IIBA profile account, you will receive an e-mail from IIBA instructing you on your next steps to pay the exam rewrite fee and to schedule your rewrite of the exam. To schedule your rewrite, you are required to pay the rewrite fee to IIBA first.


Please review our exam cancellation and rescheduling policy within our Exam Information page


From your exam date, it can take up to 2 business day for IIBA to process your result from the testing provider. Once this is done, you will receive a confirmation e-mail from IIBA.




 Bakkah has an array of certified practitioners with several years in teaching.






Online classes are delivered using our Learning Management System (LMS). We provide access to pre-course reading, pre-post assessment, chapter exercises, practice test, case studies and to additional references Glossary/Recommended Reading in our LMS.


Yes, there are group activities after each lesson where you can interact with other online students.


Save Your Priceless Time and Efforts

Bakkah offers all what you need in one place