IIBA®-CCA Certification Training Course - Certificate in Cybersecurity Analysis
The IIBA®-endorsed CCA® certificate validates your skills in cybersecurity, equipping you to tackle cyber threats and prepare for the IIBA®-CCA exam for global certification.
Choose Delivery Methods / Available Dates
Why Bakkah?
What are the Goals of the IIBA-CCA Course?
The IIBA-CCA is a professional certificate designated for business analysts, who seek to acquire professional expertise in tackling digital security challenges and threats in organizations through cybersecurity practices and tools.
In today’s age where cyberattacks are becoming more prevalent and may lead to sensitive and crucial data loss, cybersecurity becomes the protection shield that saves organizations against digital threats.
It’s defined as an approach, designed to safeguard organizations’ programs, networks, data, systems, and computers from threats like phishing, malware, and ransomware.
Therefore, the IIBA-CCA course is designed by industry experts to guide you to:
1- Learning Cybersecurity Fundamentals
The IIBA-CCA training targets acquiring a holistic understanding of cybersecurity analysis concepts and learning cybersecurity principles.
2- Learning Tackling Cyberattacks
This goal aims to know how to identify cyberattacks and differentiate among their different types. You’ll learn also how to apply strategies to mitigate cyber risks effectively and get ready for today’s cybersecurity challenges.
3- Reinforcing the Organization's Security
Our trainers will guide you in this course on how to utilize various types of enterprise security like physical security, network security, and product security.
This goal includes knowing how to maintain data security and deliver cyber solutions, applying cybersecurity technologies like the Internet of Things. Furthermore, you’ll be empowered to implement cybersecurity tools in real-world scenarios and user access control practices and techniques.
4- Meeting Business Needs
With IIBA-CCA training, you’ll learn how to align security strategies with business goals, adapt to changing business requirements and needs, and stay up-to-date with the latest trends in cybersecurity.
Who needs this IIBA®-CCA Course?
Certificate in Cybersecurity Analysis course is designated for:
- Business analysts.
- Project managers.
- Business system analysts.
- Anyone interested in strategic business analysis.
- Anyone interested in cybersecurity business analysis.
What are the skills Acquired from IIBA®-CCA Course?
Earning The IIBA-CCA certificate demonstrates you have in-demand skills in cybersecurity as a business analysis professional, these skills are:
- Cyber risk management.
- Communication and collaboration with the stakeholders.
- Decision making.
- Enterprise analysis.
- Requirement analysis.
- Familiarity with cybersecurity analysis fundamentals.
- Adaptability.
- Data analysis.
- Familiarity with cybersecurity regulations.
- Emerging technologies.
IIBA®-CCA Online Training
The training details include:
- Duration of training: 6 Days.
- Exam Simulation.
- Practice Test.
- Group Activity (Break-out Session) after each lesson.
- Access to additional References – Glossary/ Recommended Reading/ Syllabus.
- The material language will be English.
IIBA-CCA Certification Exam Format
You can start preparing for the exam by knowing all the exam’s required details:
- Online objective testing.
- 75 questions, each one worth 1 mark.
- Exam duration: 90 minutes.
- Exam preparation requires a PC, camera, microphone, and internet access.
Booking IIBA®-CCA Certification Exam
To book the exam: log in or create an IIBA profile and go to My Certifications and the Certification Summary page. Review the specific handbook for details and purchase your exam.
Course Inclusions
Cybersecurity Overview and Basic Concepts
- IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity
- Importance of Security
- IT Functions & Roles
- IT 101 - 1: The Pieces
- IT 101 - 2: Using & Managing the Pieces
- IT 101 - 3: Advancement
- The Role of Business Analysis in Cybersecurity
- Governance Perspectives of Cybersecurity
Enterprise Security Concepts
- Security Accountability
- Cost of Securing an Organization
- Outsourcing for Cybersecurity Expertise and Services
- Risk Tolerance
- Compliance
- Best Practices and Benchmarking
- Data Privacy
- Data Privacy Nuances
- Digital Rights Management (DRM)
- Audit – Internal and External
Enterprise Risk
- Risk Management & Control Assurance Framework
- Organizational Risk Assessment
- Risk Analysis: Threat Risk Assessments
- Risk Analysis: Vulnerability Assessments
- Business Case Development
- Disaster Recovery and Business Continuity
Cybersecurity Risks and Controls
- Understanding Security Controls and IT Risk
- CIA Triad
- Applying Controls
- Cybersecurity Threats
- Cybersecurity Vulnerabilities
- Adverse Impacts
- Risks and Controls – Putting It All Together
Securing the Layers
- Physical Security
- Endpoint Security
- Network Security: Security Architecture
- Network Security: Firewalls
- Network Security: Anti-Virus/Anti-Malware
- Network Security: Segregation
- System Security: Servers
- Platform Security
- Product Security: Threat Models
- Product Security: Embedded Systems
- Product Security: Internet of Things
Data Security
- Data Security At Rest: Information Classification & Categorization
- Data Security In Transit: Encryption and Keys
- Data Security In Transit: SSL/TLS
- Data Security In Transit: Digital Signature and Identification
User Access Control
- Directory Management
- Authorization
- Authentication and Access Control
- Privileged Account Management
- Users and Security Awareness
Solution Delivery
- SDLC and Solution Security Planning
- Requirements and Security Engineering
- Requirements and Solution Development
- Solution Security: Applications
- Solution Security: Databases
- Solution Security: Web
- Change Impact Analysis
Operations
- Incident Response, Recovery, and Remediation
- Metrics and Reporting
- Risk Logging and Mitigation Tracking
- Operational Risk Ownership
- Computer Forensics: SOC, SIEM
- Future Proofing your Security Posture
Want a training for a group?
Choose your convenient course from plenty of courses in different fields.