CCA Self-Paced Learning
Study Guide + 550+ CCA questions including 4 Full length simulations + Videos + Flash cards + Audio Books + 180 days Access
Must Read - Learner Instructions Manual
Resource Locator
Presentation - 1.1 - Overview
Presentation - 1.2 - Importance of Security
Presentation - 1.3 - IT Functions & Roles
Presentation - 1.4 - IT 101- 1 The Pieces
Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces
Presentation - 1.6 - IT 101-3 Advancement
Presentation - 1.7 - The Role of BA in Cybersecurity
Presentation - 1.8 - Governance Perspectives of Cybersecurity
Flashcards - Introduction
CCA - 1 - Intro - Questions
Presentation - 2.1 - Security Accountability
Presentation - 2.2 - Cost of Securing an Organization
Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services
Presentation - 2.4 - Risk Tolerance
Presentation - 2.5 - Compliance
Presentation - 2.6 - Best Practices and Benchmarking
Presentation - 2.7 - Data Privacy
Presentation - 2.8 - Data Privacy Nuances
Presentation - 2.9 - Digital Rights Management (DRM)
Presentation - 2.10 - Audit- Internal and External
Flashcards - Security Concepts
CCA - 2 - Security concepts - Questions
Presentation - 3.1 - Risk Management & Control Assurance Framework
Presentation - 3.2 - Organizational Risk Assessment
Presentation - 3.3 - Risk Analysis Threat Risk Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.5 - Business Case Development
Presentation - 3.6 - Disaster Recovery and Business Continuity
Flashcards - Enterprise Risks
CCA - 3 - Enterprise risks - Questions
Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1
Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2
Presentation - 4.3 - CIA Triad
Presentation - 4.4 - Applying Controls
Presentation - 4.5 - Cyber Threat-converted.pdf
Presentation - 4.6 - Cybersecurity Threats Part 2
Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1
Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2
Presentation - 4.9 - Adverse Impacts
Presentation - 4.10 - Risks and Controls- Putting It All Together
Flashcards - Cybersecurity Risks and Controls
CCA - 4 - Risks and Controls - Questions
Presentation - 5.1 - Physical Security
Presentation - 5.2 - Endpoint Security
Presentation - 5.3 - Network Security - Security Architecture
Presentation - 5.4 - Network Security - Firewalls
Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware
Presentation - 5.6 - Network Security - Segregation
Presentation - 5.7 - System Security - Servers
Presentation - 5.8 - Platform Security
Presentation - 5.9 - Product Security - Threat Models-converted.pdf
Presentation - 5.10 - Product Security - Embedded Systems
Presentation - 5.11 - Product Security - Internet of Things
Flashcards - Securing the Layers
CCA - 5 - Securing the layers - Questions