Course curriculum

  • 1

    INSTRUCTIONS

    • How to Use Thinkific Learning Portal

  • 2

    Live Office Hour + Past Recording

    • Join Your Live Office Hour by Clicking on the JOIN Button + Watch Past Recording

  • 3

    Chapter 1 - Introduction

    • Presentation - 1.1 - Overview

    • Presentation - 1.2 - Importance of Security

    • Presentation - 1.3 - IT Functions & Roles

    • Presentation - 1.4 - IT 101- 1 The Pieces

    • Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces

    • Presentation - 1.6 - IT 101-3 Advancement

    • Presentation - 1.7 - The Role of BA in Cybersecurity

    • Presentation - 1.8 - Governance Perspectives of Cybersecurity

    • Flashcards - Introduction

    • CCA - 1 - Intro - Questions

  • 4

    Chapter 2 - Security Concepts

    • Presentation - 2.1 - Security Accountability

    • Presentation - 2.2 - Cost of Securing an Organization

    • Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services

    • Presentation - 2.4 - Risk Tolerance

    • Presentation - 2.5 - Compliance

    • Presentation - 2.6 - Best Practices and Benchmarking

    • Presentation - 2.7 - Data Privacy

    • Presentation - 2.8 - Data Privacy Nuances

    • Presentation - 2.9 - Digital Rights Management (DRM)

    • Presentation - 2.10 - Audit- Internal and External

    • Flashcards - Security Concepts

    • CCA - 2 - Security concepts - Questions

  • 5

    Chapter 3 - Enterprise Risks

    • Presentation - 3.1 - Risk Management & Control Assurance Framework

    • Presentation - 3.2 - Organizational Risk Assessment

    • Presentation - 3.3 - Risk Analysis Threat Risk Assessments

    • Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    • Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    • Presentation - 3.5 - Business Case Development

    • Presentation - 3.6 - Disaster Recovery and Business Continuity

    • Flashcards - Enterprise Risks

    • CCA - 3 - Enterprise risks - Questions

  • 6

    Chapter 4 - Cybersecurity Risks and Controls

    • Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1

    • Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2

    • Presentation - 4.3 - CIA Triad

    • Presentation - 4.4 - Applying Controls

    • Presentation - 4.5 - Cyber Threat-converted.pdf

    • Presentation - 4.6 - Cybersecurity Threats Part 2

    • Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1

    • Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2

    • Presentation - 4.9 - Adverse Impacts

    • Presentation - 4.10 - Risks and Controls- Putting It All Together

    • Flashcards - Cybersecurity Risks and Controls

    • CCA - 4 - Risks and Controls - Questions

  • 7

    Chapter 5 - Securing the Layers

    • Presentation - 5.1 - Physical Security

    • Presentation - 5.2 - Endpoint Security

    • Presentation - 5.3 - Network Security - Security Architecture

    • Presentation - 5.4 - Network Security - Firewalls

    • Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware

    • Presentation - 5.6 - Network Security - Segregation

    • Presentation - 5.7 - System Security - Servers

    • Presentation - 5.8 - Platform Security

    • Presentation - 5.9 - Product Security - Threat Models-converted.pdf

    • Presentation - 5.10 - Product Security - Embedded Systems

    • Presentation - 5.11 - Product Security - Internet of Things

    • Flashcards - Securing the Layers

    • CCA - 5 - Securing the layers - Questions

  • 8

    Chapter 6 - Data Security

    • Presentation - 6.1 - Data Security at Rest Information Classification & Categorization

    • Presentation - 6.2 - Data Security in Transit Encryption and Keys

    • Presentation - 6.3 - Data Security in Transit SSL-TLS

    • Presentation - 6.4 - Data Security in Transit Digital Signature and Identification

    • Flashcards - Data Security

    • CCA - 6 - Data security - Questions

  • 9

    Chapter 7 - Access Control

    • Presentation - 7.1 - Directory Management

    • Presentation - 7.2 - Authorization

    • Presentation - 7.3 - Authentication and Access Control

    • Presentation - 7.4 - Privileged Account Management

    • Presentation - 7.5 - Users and Security Awareness

    • Flashcards - User Access Control

    • CCA - 7 - Access control - Questions

  • 10

    Chapter 8 - Solution Delivery

    • Presentation - 8.1 - SDLC and Solution Security Planning

    • Presentation - 8.2 - Requirements and Security Engineering

    • Presentation - 8.3 - Requirements and Solution Development

    • Presentation - 8.4 - Solution Security Applications

    • Presentation - 8.5 - Solution Security Databases

    • Presentation - 8.6 - Solution Security Web

    • Presentation - 8.7 - Change Impact Analysis

    • Flashcards - Solution Delivery

    • CCA - 8 - Solution Delivery - Questions

  • 11

    Chapter 9 - Operations

    • Presentation - 9.1 - Incident Response, Recovery, and Remediation

    • Presentation - 9.2 - Metrics and Reporting

    • Presentation - 9.3 - Risk Logging and Mitigation Tracking

    • Presentation - 9.4 - Operational Risk Ownership

    • Presentation - 9.5 - Computer Forensics SOC, SIEM

    • Presentation - 9.6 - Future Proofing Your Security Posture

    • CCA - 9 - Operations - Questions

    • Flashcards - Operations

  • 12

    Workshop Materials

    • Adaptive US CCA Study Guide

  • 13

    Reference Materials

    • 108 BA Techniques

  • 14

    Exam Prep Help

    • Study Tips for IIBA Cert. Exams-17th Jun 2020-IIBA Webinar

    • CCA Prep Plan

    • The Ultimate IIBA Exams Info Guide

  • 15

    Simulations

    • CCA Simulations