Course curriculum

    1. Must Read - Learner Instructions Manual

    2. Resource Locator

    3. How to Navigate through the Course Tool

    4. Pre-Workshop Checklist

    1. Join your live classes by clicking on the JOIN button

    1. Presentation - 1.1 - Overview

    2. Presentation - 1.2 - Importance of Security

    3. Presentation - 1.3 - IT Functions & Roles

    4. Presentation - 1.4 - IT 101- 1 The Pieces

    5. Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces

    6. Presentation - 1.6 - IT 101-3 Advancement

    7. Presentation - 1.7 - The Role of BA in Cybersecurity

    8. Presentation - 1.8 - Governance Perspectives of Cybersecurity

    9. Flashcards - Introduction

    10. CCA - 1 - Intro - Questions

    11. Introduction to Cyber Security Analysis

    12. Mastering the Basics of IT Systems

    13. Why Cybersecurity Matters for Business

    14. Business Analysis in Cybersecurity

    15. Patch Management & Web Apps

    16. Mastering Cybersecurity Governance

    17. Role of Business Analysts in Cybersecurity

    18. Understanding IT Roles for BAs

    19. Unlock Your Future with IIBA CCA Certification

    20. Mastering Cyber Security - 9 Key Domains

    1. Presentation - 2.1 - Security Accountability

    2. Presentation - 2.2 - Cost of Securing an Organization

    3. Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services

    4. Presentation - 2.4 - Risk Tolerance

    5. Presentation - 2.5 - Compliance

    6. Presentation - 2.6 - Best Practices and Benchmarking

    7. Presentation - 2.7 - Data Privacy

    8. Presentation - 2.8 - Data Privacy Nuances

    9. Presentation - 2.9 - Digital Rights Management (DRM)

    10. Presentation - 2.10 - Audit- Internal and External

    11. Flashcards - Security Concepts

    12. CCA - 2 - Security concepts - Questions

    13. Mastering Enterprise Security

    14. True Cost of Securing Your Business

    15. Outsourcing Cybersecurity

    16. Mastering Risk Tolerance in Business Analysis

    17. Mastering Business Analysis for Compliance and key sights

    18. Mastering Security Best Practices & Benchmarking

    19. Mastering Data Privacy Culture, Regulations

    20. Mastering Digital Rights Management

    21. Mastering Internal & External Audits - Key Insights

    1. Presentation - 3.1 - Risk Management & Control Assurance Framework

    2. Presentation - 3.2 - Organizational Risk Assessment

    3. Presentation - 3.3 - Risk Analysis Threat Risk Assessments

    4. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    5. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    6. Presentation - 3.5 - Business Case Development

    7. Presentation - 3.6 - Disaster Recovery and Business Continuity

    8. Flashcards - Enterprise Risks

    9. CCA - 3 - Enterprise risks - Questions

    10. Mastering Enterprise Risk Management

    11. Mastering Organizational Risk Assessment

    12. Mastering Threat Risk Assessments for BAs

    13. Mastering Vulnerability Assessments - A BA's Guide

    14. Mastering Business Case Development for Cybersecurity

    15. Mastering Disaster Recovery and Business Continuity

    1. Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1

    2. Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2

    3. Presentation - 4.3 - CIA Triad

    4. Presentation - 4.4 - Applying Controls

    5. Presentation - 4.5 - Cyber Threat-converted.pdf

    6. Presentation - 4.6 - Cybersecurity Threats Part 2

    7. Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1

    8. Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2

    9. Presentation - 4.9 - Adverse Impacts

    10. Presentation - 4.10 - Risks and Controls- Putting It All Together

    11. Flashcards - Cybersecurity Risks and Controls

    12. CCA - 4 - Risks and Controls - Questions

    13. Understanding Cybersecurity Risks and Controls

    14. Understanding Security Controls and IT risk

    15. Understanding the CIA Triad - Cybersecurity

    16. Mastering NIST and ISO Cybersecurity

    17. How Cyber Threats Work - A Deep Dive

    18. Cybersecurity Threats - Understanding Likelihood and Relevance

    19. Understanding Cybersecurity Vulnerabilities

    20. Cybersecurity Vulnerabilities - Predisposing Conditions Explained

    21. Understanding Adverse Impacts in Risk Management

    22. Mastering IT Security Risks and Controls

About this course

  • $699.00
  • 167 lessons
  • 9.5 hours of video content