Free CCA Trial @ USD 0
Explore Adaptive CCA Study Guide + Question Bank + Video Learning + Flash cards + Audio Books
Presentation - 1.1 - Overview
FREE PREVIEWPresentation - 1.2 - Importance of Security
FREE PREVIEWPresentation - 1.3 - IT Functions & Roles
FREE PREVIEWPresentation - 1.4 - IT 101- 1 The Pieces
FREE PREVIEWPresentation - 1.5 - IT 101- 2 Using & Managing the Pieces
FREE PREVIEWPresentation - 1.6 - IT 101-3 Advancement
FREE PREVIEWPresentation - 1.7 - The Role of BA in Cybersecurity
FREE PREVIEWPresentation - 1.8 - Governance Perspectives of Cybersecurity
FREE PREVIEWFlashcards - Introduction
FREE PREVIEWCCA - 1 - Intro - Questions
FREE PREVIEWPresentation - 2.1 - Security Accountability
Presentation - 2.2 - Cost of Securing an Organization
Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services
Presentation - 2.4 - Risk Tolerance
Presentation - 2.5 - Compliance
Presentation - 2.6 - Best Practices and Benchmarking
Presentation - 2.7 - Data Privacy
Presentation - 2.8 - Data Privacy Nuances
Presentation - 2.9 - Digital Rights Management (DRM)
Presentation - 2.10 - Audit- Internal and External
Flashcards - Security Concepts
CCA - 2 - Security concepts - Questions
Presentation - 3.1 - Risk Management & Control Assurance Framework
Presentation - 3.2 - Organizational Risk Assessment
Presentation - 3.3 - Risk Analysis Threat Risk Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
Presentation - 3.5 - Business Case Development
Presentation - 3.6 - Disaster Recovery and Business Continuity
Flashcards - Enterprise Risks
CCA - 3 - Enterprise risks - Questions
Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1
Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2
Presentation - 4.3 - CIA Triad
Presentation - 4.4 - Applying Controls
Presentation - 4.5 - Cyber Threat-converted.pdf
Presentation - 4.6 - Cybersecurity Threats Part 2
Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1
Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2
Presentation - 4.9 - Adverse Impacts
Presentation - 4.10 - Risks and Controls- Putting It All Together
Flashcards - Cybersecurity Risks and Controls
CCA - 4 - Risks and Controls - Questions
Presentation - 5.1 - Physical Security
Presentation - 5.2 - Endpoint Security
Presentation - 5.3 - Network Security - Security Architecture
Presentation - 5.4 - Network Security - Firewalls
Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware
Presentation - 5.6 - Network Security - Segregation
Presentation - 5.7 - System Security - Servers
Presentation - 5.8 - Platform Security
Presentation - 5.9 - Product Security - Threat Models-converted.pdf
Presentation - 5.10 - Product Security - Embedded Systems
Presentation - 5.11 - Product Security - Internet of Things
Flashcards - Securing the Layers
CCA - 5 - Securing the layers - Questions
Presentation - 6.1 - Data Security at Rest Information Classification & Categorization
Presentation - 6.2 - Data Security in Transit Encryption and Keys
Presentation - 6.3 - Data Security in Transit SSL-TLS
Presentation - 6.4 - Data Security in Transit Digital Signature and Identification
Flashcards - Data Security
CCA - 6 - Data security - Questions
Presentation - 7.1 - Directory Management
Presentation - 7.2 - Authorization
Presentation - 7.3 - Authentication and Access Control
Presentation - 7.4 - Privileged Account Management
Presentation - 7.5 - Users and Security Awareness
Flashcards - User Access Control
CCA - 7 - Access control - Questions
Presentation - 8.1 - SDLC and Solution Security Planning
Presentation - 8.2 - Requirements and Security Engineering
Presentation - 8.3 - Requirements and Solution Development
Presentation - 8.4 - Solution Security Applications
Presentation - 8.5 - Solution Security Databases
Presentation - 8.6 - Solution Security Web
Presentation - 8.7 - Change Impact Analysis
Flashcards - Solution Delivery
CCA - 8 - Solution Delivery - Questions
Presentation - 9.1 - Incident Response, Recovery, and Remediation
Presentation - 9.2 - Metrics and Reporting
Presentation - 9.3 - Risk Logging and Mitigation Tracking
Presentation - 9.4 - Operational Risk Ownership
Presentation - 9.5 - Computer Forensics SOC, SIEM
Presentation - 9.6 - Future Proofing Your Security Posture
CCA - 9 - Operations - Questions
Adaptive US CCA Study Guide
108 BA Techniques