IIBA®-CCA Certification Training Course - Certificate in Cybersecurity Analysis
The IIBA-endorsed certificate in cybersecurity analysis validates your knowledge and skills in facing today’s cyber challenges by understanding key concepts, along with applying tools of cybersecurity.
IIBA CCA is a much-needed certificate for tech-based companies which encounter different potential cyber risks and search for proficient cybersecurity analysts who can manage these threats efficiently.
With CCA training, you’ll be a professional cybersecurity analyst who can meet the security needs of corporates, fortify their security, gain customers’ trust, and prepare to ace the IIBA-CCA exam to earn global certification.
Want a training for a group?
Register GroupWhat to Expect From This Course
Who Needs this Course
Skills & Competencies
Delivery Method
Exam Details
Course Outline
- IIBA and IEEE Perspective: Overview of Concepts and Approach to Improving Cybersecurity
- Importance of Security
- IT Functions & Roles
- IT 101 - 1: The Pieces
- IT 101 - 2: Using & Managing the Pieces
- IT 101 - 3: Advancement
- The Role of Business Analysis in Cybersecurity
- Governance Perspectives of Cybersecurity
- Security Accountability
- Cost of Securing an Organization
- Outsourcing for Cybersecurity Expertise and Services
- Risk Tolerance
- Compliance
- Best Practices and Benchmarking
- Data Privacy
- Data Privacy Nuances
- Digital Rights Management (DRM)
- Audit – Internal and External
- Risk Management & Control Assurance Framework
- Organizational Risk Assessment
- Risk Analysis: Threat Risk Assessments
- Risk Analysis: Vulnerability Assessments
- Business Case Development
- Disaster Recovery and Business Continuity
- Understanding Security Controls and IT Risk
- CIA Triad
- Applying Controls
- Cybersecurity Threats
- Cybersecurity Vulnerabilities
- Adverse Impacts
- Risks and Controls – Putting It All Together
- Physical Security
- Endpoint Security
- Network Security: Security Architecture
- Network Security: Firewalls
- Network Security: Anti-Virus/Anti-Malware
- Network Security: Segregation
- System Security: Servers
- Platform Security
- Product Security: Threat Models
- Product Security: Embedded Systems
- Product Security: Internet of Things
- Data Security At Rest: Information Classification & Categorization
- Data Security In Transit: Encryption and Keys
- Data Security In Transit: SSL/TLS
- Data Security In Transit: Digital Signature and Identification
- Directory Management
- Authorization
- Authentication and Access Control
- Privileged Account Management
- Users and Security Awareness
- SDLC and Solution Security Planning
- Requirements and Security Engineering
- Requirements and Solution Development
- Solution Security: Applications
- Solution Security: Databases
- Solution Security: Web
- Change Impact Analysis
- Incident Response, Recovery, and Remediation
- Metrics and Reporting
- Risk Logging and Mitigation Tracking
- Operational Risk Ownership
- Computer Forensics: SOC, SIEM
- Future Proofing your Security Posture
Save Your Priceless Time and Efforts
Bakkah offers all what you need in one place