IIBA®-CCA Certification Training Course - Certificate in Cybersecurity Analysis

IIBA®-CCA Certification is a certification presented by the IIBA® and IEEE Computer Society which have partnered to offer a robust learning and certification program on what business analysis professionals need to know to be prepared for today’s cybersecurity challenges.

Bakkah learning introduction

Want a training for a group?

Register Group

Who Needs this Course

Skills & Competencies

Delivery Method

Exam Details

Who needs this IIBA®-CCA Course?

Business analysis professionals working in the cybersecurity space.

What are the skills Acquired from IIBA®-CCA Course?

IIBA and IEEE Computer Society’s program provides the credibility of a joint certification and the opportunity to learn key cybersecurity concepts and tools business analysis professionals need to demonstrate core competencies.

 

IIBA®-CCA Online Training

  • Duration: 6 Days
  • Exam Simulation
  • Practice Test
  • Group Activity (Break-out Session) after each lesson
  • Access to additional References – Glossary/ Recommended Reading/ Syllabus
  • The material language will be English

IIBA-CCA Certification Exam Format 

  • Objective testing
  • 75 questions, each worth 1 mark
  • 90 minutes

IIBA®-CCA Certifications

Log in or create an IIBA profile and go to My Certifications and the Certification Summary page. Review the specific handbook for details and purchase your exam.

Course Outline

+
  • IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity
  • Importance of Security
  • IT Functions & Roles
  • IT 101 - 1: The Pieces
  • IT 101 - 2: Using & Managing the Pieces
  • IT 101 - 3: Advancement
  • The Role of Business Analysis in Cybersecurity
  • Governance Perspectives of Cybersecurity
+
  •  Security Accountability
  •  Cost of Securing an Organization
  •  Outsourcing for Cybersecurity Expertise and Services
  •  Risk Tolerance
  •  Compliance
  •  Best Practices and Benchmarking
  •  Data Privacy
  •  Data Privacy Nuances
  •  Digital Rights Management (DRM)
  •  Audit – Internal and External
+
  • Risk Management & Control Assurance Framework
  • Organizational Risk Assessment
  • Risk Analysis: Threat Risk Assessments
  • Risk Analysis: Vulnerability Assessments
  • Business Case Development
  • Disaster Recovery and Business Continuity
+
  • Understanding Security Controls and IT Risk
  • CIA Triad
  • Applying Controls
  • Cybersecurity Threats
  • Cybersecurity Vulnerabilities
  • Adverse Impacts
  • Risks and Controls – Putting It All Together
+
  • Physical Security
  • Endpoint Security
  • Network Security: Security Architecture
  • Network Security: Firewalls
  • Network Security: Anti-Virus/Anti-Malware
  • Network Security: Segregation
  • System Security: Servers
  • Platform Security
  • Product Security: Threat Models
  • Product Security: Embedded Systems
  • Product Security: Internet of Things
+
  • Data Security At Rest: Information Classification & Categorization
  • Data Security In Transit: Encryption and Keys
  • Data Security In Transit: SSL/TLS
  • Data Security In Transit: Digital Signature and Identification
+
  • Directory Management
  • Authorization
  • Authentication and Access Control
  • Privileged Account Management
  • Users and Security Awareness
+
  • SDLC and Solution Security Planning
  • Requirements and Security Engineering
  • Requirements and Solution Development
  • Solution Security: Applications
  • Solution Security: Databases
  • Solution Security: Web
  • Change Impact Analysis
+
  • Incident Response, Recovery, and Remediation
  • Metrics and Reporting
  • Risk Logging and Mitigation Tracking
  • Operational Risk Ownership
  • Computer Forensics: SOC, SIEM
  • Future Proofing your Security Posture
Priceles

Save Your Priceless Time and Efforts

Bakkah offers all what you need in one place

WhatsApp