CCA Self-Paced Learning
Study Guide + 550+ CCA questions including 4 Full length simulations + Videos + Flash cards + Audio Books + 180 days Access
Must Read - Learner Instructions Manual
Resource Locator
Presentation - 1.1 - Overview
Presentation - 1.2 - Importance of Security
Presentation - 1.3 - IT Functions & Roles
Presentation - 1.4 - IT 101- 1 The Pieces
Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces
Presentation - 1.6 - IT 101-3 Advancement
Presentation - 1.7 - The Role of BA in Cybersecurity
Presentation - 1.8 - Governance Perspectives of Cybersecurity
Flashcards - Introduction
CCA - 1 - Intro - Questions
Introduction to Cyber Security Analysis
Mastering the Basics of IT Systems
Business Analysis in Cybersecurity
Patch Management & Web Apps
Mastering Cybersecurity Governance
Role of Business Analysts in Cybersecurity
Understanding IT Roles for BAs
Why Cybersecurity Matters for Business
Unlock Your Future with IIBA CCA Certification
Mastering Cyber Security - 9 Key Domains
Presentation - 2.1 - Security Accountability
Presentation - 2.2 - Cost of Securing an Organization
Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services
Presentation - 2.4 - Risk Tolerance
Presentation - 2.5 - Compliance
Presentation - 2.6 - Best Practices and Benchmarking
Presentation - 2.7 - Data Privacy
Presentation - 2.8 - Data Privacy Nuances
Presentation - 2.9 - Digital Rights Management (DRM)
Presentation - 2.10 - Audit- Internal and External
Flashcards - Security Concepts
CCA - 2 - Security concepts - Questions
Mastering Enterprise Security
True Cost of Securing Your Business
Outsourcing Cybersecurity
Mastering Risk Tolerance in Business Analysis
Mastering Business Analysis for Compliance and key sights
Mastering Security Best Practices & Benchmarking
Mastering Data Privacy Culture, Regulations
Mastering Digital Rights Management
Mastering Internal & External Audits - Key Insights
Presentation - 3.1 - Risk Management & Control Assurance Framework
Presentation - 3.2 - Organizational Risk Assessment
Presentation - 3.3 - Risk Analysis Threat Risk Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.5 - Business Case Development
Presentation - 3.6 - Disaster Recovery and Business Continuity
Flashcards - Enterprise Risks
CCA - 3 - Enterprise risks - Questions
Mastering Organizational Risk Assessment
Mastering Threat Risk Assessments for BA
Mastering Vulnerability Assessments - A BA's Guide
Mastering Business Case Development for Cybersecurity
Mastering Disaster Recovery & Business Continuity
Mastering Enterprise Risk Management
Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1
Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2
Presentation - 4.3 - CIA Triad
Presentation - 4.4 - Applying Controls
Presentation - 4.5 - Cyber Threat-converted.pdf
Presentation - 4.6 - Cybersecurity Threats Part 2
Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1
Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2
Presentation - 4.9 - Adverse Impacts
Presentation - 4.10 - Risks and Controls- Putting It All Together
Flashcards - Cybersecurity Risks and Controls
CCA - 4 - Risks and Controls - Questions
Understanding Cybersecurity Risks and Controls
Understanding Security Controls and IT risk
Understanding the CIA Triad Cybersecurity
Mastering NIST & ISO Cybersecurity
How Cyber Threats Work_ A Deep Dive
Cybersecurity Threats_ Understanding
Understanding Cybersecurity Vulnerabilities
Cybersecurity Vulnerabilities_ Predisposing Conditions explained
Understanding Adverse Impacts in Risk Management
Mastering IT Security Risks and Controls
Presentation - 5.1 - Physical Security
Presentation - 5.2 - Endpoint Security
Presentation - 5.3 - Network Security - Security Architecture
Presentation - 5.4 - Network Security - Firewalls
Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware
Presentation - 5.6 - Network Security - Segregation
Presentation - 5.7 - System Security - Servers
Presentation - 5.8 - Platform Security
Presentation - 5.9 - Product Security - Threat Models-converted.pdf
Presentation - 5.10 - Product Security - Embedded Systems
Presentation - 5.11 - Product Security - Internet of Things
Flashcards - Securing the Layers
CCA - 5 - Securing the layers - Questions
Securing the Layers_ Physical Security Essentials
Mastering Endpoint Security_ Key Insights for businesses
Mastering Network Security Architect
Mastering Network Security_ Firewalls Explained
Mastering Network Security Anti-Virus
Mastering Network Security - Segregation
Mastering Server Security - Essential Tip
Platform Security - Key Insights for Business
Mastering Product Security - Threat Model
Securing Embedded Systems - A Business
Security - Protecting Your Smart Device