Course curriculum

    1. Must Read - Learner Instructions Manual

    2. Resource Locator

    1. Presentation - 1.1 - Overview

    2. Presentation - 1.2 - Importance of Security

    3. Presentation - 1.3 - IT Functions & Roles

    4. Presentation - 1.4 - IT 101- 1 The Pieces

    5. Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces

    6. Presentation - 1.6 - IT 101-3 Advancement

    7. Presentation - 1.7 - The Role of BA in Cybersecurity

    8. Presentation - 1.8 - Governance Perspectives of Cybersecurity

    9. Flashcards - Introduction

    10. CCA - 1 - Intro - Questions

    11. Introduction to Cyber Security Analysis

    12. Mastering the Basics of IT Systems

    13. Business Analysis in Cybersecurity

    14. Patch Management & Web Apps

    15. Mastering Cybersecurity Governance

    16. Role of Business Analysts in Cybersecurity

    17. Understanding IT Roles for BAs

    18. Why Cybersecurity Matters for Business

    19. Unlock Your Future with IIBA CCA Certification

    20. Mastering Cyber Security - 9 Key Domains

    1. Presentation - 2.1 - Security Accountability

    2. Presentation - 2.2 - Cost of Securing an Organization

    3. Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services

    4. Presentation - 2.4 - Risk Tolerance

    5. Presentation - 2.5 - Compliance

    6. Presentation - 2.6 - Best Practices and Benchmarking

    7. Presentation - 2.7 - Data Privacy

    8. Presentation - 2.8 - Data Privacy Nuances

    9. Presentation - 2.9 - Digital Rights Management (DRM)

    10. Presentation - 2.10 - Audit- Internal and External

    11. Flashcards - Security Concepts

    12. CCA - 2 - Security concepts - Questions

    13. Mastering Enterprise Security

    14. True Cost of Securing Your Business

    15. Outsourcing Cybersecurity

    16. Mastering Risk Tolerance in Business Analysis

    17. Mastering Business Analysis for Compliance and key sights

    18. Mastering Security Best Practices & Benchmarking

    19. Mastering Data Privacy Culture, Regulations

    20. Mastering Digital Rights Management

    21. Mastering Internal & External Audits - Key Insights

    1. Presentation - 3.1 - Risk Management & Control Assurance Framework

    2. Presentation - 3.2 - Organizational Risk Assessment

    3. Presentation - 3.3 - Risk Analysis Threat Risk Assessments

    4. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    5. Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    6. Presentation - 3.5 - Business Case Development

    7. Presentation - 3.6 - Disaster Recovery and Business Continuity

    8. Flashcards - Enterprise Risks

    9. CCA - 3 - Enterprise risks - Questions

    10. Mastering Organizational Risk Assessment

    11. Mastering Threat Risk Assessments for BA

    12. Mastering Vulnerability Assessments - A BA's Guide

    13. Mastering Business Case Development for Cybersecurity

    14. Mastering Disaster Recovery & Business Continuity

    15. Mastering Enterprise Risk Management

    1. Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1

    2. Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2

    3. Presentation - 4.3 - CIA Triad

    4. Presentation - 4.4 - Applying Controls

    5. Presentation - 4.5 - Cyber Threat-converted.pdf

    6. Presentation - 4.6 - Cybersecurity Threats Part 2

    7. Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1

    8. Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2

    9. Presentation - 4.9 - Adverse Impacts

    10. Presentation - 4.10 - Risks and Controls- Putting It All Together

    11. Flashcards - Cybersecurity Risks and Controls

    12. CCA - 4 - Risks and Controls - Questions

    13. Understanding Cybersecurity Risks and Controls

    14. Understanding Security Controls and IT risk

    15. Understanding the CIA Triad Cybersecurity

    16. Mastering NIST & ISO Cybersecurity

    17. How Cyber Threats Work_ A Deep Dive

    18. Cybersecurity Threats_ Understanding

    19. Understanding Cybersecurity Vulnerabilities

    20. Cybersecurity Vulnerabilities_ Predisposing Conditions explained

    21. Understanding Adverse Impacts in Risk Management

    22. Mastering IT Security Risks and Controls

    1. Presentation - 5.1 - Physical Security

    2. Presentation - 5.2 - Endpoint Security

    3. Presentation - 5.3 - Network Security - Security Architecture

    4. Presentation - 5.4 - Network Security - Firewalls

    5. Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware

    6. Presentation - 5.6 - Network Security - Segregation

    7. Presentation - 5.7 - System Security - Servers

    8. Presentation - 5.8 - Platform Security

    9. Presentation - 5.9 - Product Security - Threat Models-converted.pdf

    10. Presentation - 5.10 - Product Security - Embedded Systems

    11. Presentation - 5.11 - Product Security - Internet of Things

    12. Flashcards - Securing the Layers

    13. CCA - 5 - Securing the layers - Questions

    14. Securing the Layers_ Physical Security Essentials

    15. Mastering Endpoint Security_ Key Insights for businesses

    16. Mastering Network Security Architect

    17. Mastering Network Security_ Firewalls Explained

    18. Mastering Network Security Anti-Virus

    19. Mastering Network Security - Segregation

    20. Mastering Server Security - Essential Tip

    21. Platform Security - Key Insights for Business

    22. Mastering Product Security - Threat Model

    23. Securing Embedded Systems - A Business

    24. Security - Protecting Your Smart Device

About this course

  • $299.00
  • 164 lessons
  • 9.5 hours of video content