CCA Master Class
12 Hours of Live Training + 21 IIBA PDUs + Study Guide + Question Bank + Video Learning + Flash cards + Audio Books + 180 days Access
Must Read - Learner Instructions Manual
Resource Locator
How to Navigate through the Course Tool
Pre-Workshop Checklist
Join your live classes by clicking on the JOIN button
Presentation - 1.1 - Overview
Presentation - 1.2 - Importance of Security
Presentation - 1.3 - IT Functions & Roles
Presentation - 1.4 - IT 101- 1 The Pieces
Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces
Presentation - 1.6 - IT 101-3 Advancement
Presentation - 1.7 - The Role of BA in Cybersecurity
Presentation - 1.8 - Governance Perspectives of Cybersecurity
Flashcards - Introduction
CCA - 1 - Intro - Questions
Introduction to Cyber Security Analysis
Mastering the Basics of IT Systems
Why Cybersecurity Matters for Business
Business Analysis in Cybersecurity
Patch Management & Web Apps
Mastering Cybersecurity Governance
Role of Business Analysts in Cybersecurity
Understanding IT Roles for BAs
Unlock Your Future with IIBA CCA Certification
Mastering Cyber Security - 9 Key Domains
Presentation - 2.1 - Security Accountability
Presentation - 2.2 - Cost of Securing an Organization
Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services
Presentation - 2.4 - Risk Tolerance
Presentation - 2.5 - Compliance
Presentation - 2.6 - Best Practices and Benchmarking
Presentation - 2.7 - Data Privacy
Presentation - 2.8 - Data Privacy Nuances
Presentation - 2.9 - Digital Rights Management (DRM)
Presentation - 2.10 - Audit- Internal and External
Flashcards - Security Concepts
CCA - 2 - Security concepts - Questions
Mastering Enterprise Security
True Cost of Securing Your Business
Outsourcing Cybersecurity
Mastering Risk Tolerance in Business Analysis
Mastering Business Analysis for Compliance and key sights
Mastering Security Best Practices & Benchmarking
Mastering Data Privacy Culture, Regulations
Mastering Digital Rights Management
Mastering Internal & External Audits - Key Insights
Presentation - 3.1 - Risk Management & Control Assurance Framework
Presentation - 3.2 - Organizational Risk Assessment
Presentation - 3.3 - Risk Analysis Threat Risk Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.5 - Business Case Development
Presentation - 3.6 - Disaster Recovery and Business Continuity
Flashcards - Enterprise Risks
CCA - 3 - Enterprise risks - Questions
Mastering Enterprise Risk Management
Mastering Organizational Risk Assessment
Mastering Threat Risk Assessments for BAs
Mastering Vulnerability Assessments - A BA's Guide
Mastering Business Case Development for Cybersecurity
Mastering Disaster Recovery and Business Continuity
Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1
Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2
Presentation - 4.3 - CIA Triad
Presentation - 4.4 - Applying Controls
Presentation - 4.5 - Cyber Threat-converted.pdf
Presentation - 4.6 - Cybersecurity Threats Part 2
Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1
Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2
Presentation - 4.9 - Adverse Impacts
Presentation - 4.10 - Risks and Controls- Putting It All Together
Flashcards - Cybersecurity Risks and Controls
CCA - 4 - Risks and Controls - Questions
Understanding Cybersecurity Risks and Controls
Understanding Security Controls and IT risk
Understanding the CIA Triad - Cybersecurity
Mastering NIST and ISO Cybersecurity
How Cyber Threats Work - A Deep Dive
Cybersecurity Threats - Understanding Likelihood and Relevance
Understanding Cybersecurity Vulnerabilities
Cybersecurity Vulnerabilities - Predisposing Conditions Explained
Understanding Adverse Impacts in Risk Management
Mastering IT Security Risks and Controls