CCA Guided Learning
12 Tutorials + Study Guide + Question Bank + Video Learning + Flash cards + Audio Books + 180 days Access
Must Read - Learner Instructions Manual
Resource Locator
Join your live office hours/Q&A Classes by clicking on the JOIN button
Presentation - 1.1 - Overview
Presentation - 1.2 - Importance of Security
Presentation - 1.3 - IT Functions & Roles
Presentation - 1.4 - IT 101- 1 The Pieces
Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces
Presentation - 1.6 - IT 101-3 Advancement
Presentation - 1.7 - The Role of BA in Cybersecurity
Presentation - 1.8 - Governance Perspectives of Cybersecurity
Flashcards - Introduction
CCA - 1 - Intro - Questions
Introduction to Cyber Security Analysis
Mastering the Basics of IT Systems
Business Analysis in Cybersecurity
Patch Management & Web Apps
Mastering Cybersecurity Governance
Role of Business Analysts in Cybersecurity
Understanding IT Roles for BAs
Why Cybersecurity Matters for Business
Unlock Your Future with IIBA CCA Certification
Mastering Cyber Security - 9 Key Domains
Presentation - 2.1 - Security Accountability
Presentation - 2.2 - Cost of Securing an Organization
Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services
Presentation - 2.4 - Risk Tolerance
Presentation - 2.5 - Compliance
Presentation - 2.6 - Best Practices and Benchmarking
Presentation - 2.7 - Data Privacy
Presentation - 2.8 - Data Privacy Nuances
Presentation - 2.9 - Digital Rights Management (DRM)
Presentation - 2.10 - Audit- Internal and External
Flashcards - Security Concepts
CCA - 2 - Security concepts - Questions
Mastering Enterprise Security
True Cost of Securing Your Business
Outsourcing Cybersecurity
Mastering Risk Tolerance in Business Analysis
Mastering Business Analysis for Compliance and key sights
Mastering Security Best Practices & Benchmarking
Mastering Data Privacy Culture, Regulations
Mastering Digital Rights Management
Mastering Internal & External Audits - Key Insights
Presentation - 3.1 - Risk Management & Control Assurance Framework
Presentation - 3.2 - Organizational Risk Assessment
Presentation - 3.3 - Risk Analysis Threat Risk Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.5 - Business Case Development
Presentation - 3.6 - Disaster Recovery and Business Continuity
Flashcards - Enterprise Risks
CCA - 3 - Enterprise risks - Questions
Mastering Organizational Risk Assessment
Mastering Threat Risk Assessments for BA
Mastering Vulnerability Assessments - A BA's Guide
Mastering Business Case Development for Cybersecurity
Mastering Disaster Recovery & Business Continuity
Mastering Enterprise Risk Management
Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1
Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2
Presentation - 4.3 - CIA Triad
Presentation - 4.4 - Applying Controls
Presentation - 4.5 - Cyber Threat-converted.pdf
Presentation - 4.6 - Cybersecurity Threats Part 2
Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1
Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2
Presentation - 4.9 - Adverse Impacts
Presentation - 4.10 - Risks and Controls- Putting It All Together
Flashcards - Cybersecurity Risks and Controls
CCA - 4 - Risks and Controls - Questions
Understanding Cybersecurity Risks and Controls
Understanding Security Controls and IT risk
Understanding the CIA Triad Cybersecurity
Mastering NIST & ISO Cybersecurity
How Cyber Threats Work_ A Deep Dive
Cybersecurity Threats_ Understanding
Understanding Cybersecurity Vulnerabilities
Cybersecurity Vulnerabilities_ Predisposing Conditions explained
Understanding Adverse Impacts in Risk Management
Mastering IT Security Risks and Controls