IIBA CCA ON-DEMAND TRAINING COURSE

LEARN AT YOUR OWN PACE AND PLACE.

Study Guide. 300 CCA prep questions. 
4 Simulations. Video Learnings.

1750+ IIBA Certifications.

Start Free Trial Book Advisory Call
  • Overview
  • Eligibility
  • Enroll
  • Deliverables
  • Resources
  • Reviews
  • Trainers
  • FAQ

IIBA CCA Certification On-demand Training

BECOME A RECOGNIZED AND EXPERT CYBER SECURITY ANALYST WITH IIBA-CCA

Set your own pace of learning with Adaptive US CCA On-demand Self Learning course. Designed by experts and distinguished professionals in the BA Domain, this product has curated BA resources specifically to aid your exam preparation and help you get CCA certified in the very first attempt!

Trusted by professionals globally to pass their CCA exam in the first attempt.

Over the course of the live training, CCA aspirants will

  • Understand and learn the established cyber security practices that are outlined in the IIBA CCA Guide.
  • Gain competence in all the domains essential for CCA certification.
  • Master the terminologies used in the CCA Guide.
  • Acquire sound understanding of the role, competencies and skill sets required to become an effective and result-oriented cyber-security analyst.
  • Gain practical insights into the principles and practices of cyber security analysis.
  • Learn how to identify and apply various tools and techniques in cyber-security analysis scenarios. 
  • Interact with instructors and learn how to tackle the CCA questions through CCA practice tests and feedback.
  • Gain access to join live exam prep tutorials for 6 months, where participants can clarify all their doubts with instructors. 

Be An Internationally Certified Security Analyst

 Endorsed Course high res logo

Target Audience

The CCA certification training is suitable for individuals who work in secured application development projects or want to learn about best practices in application security. This course is highly valuable for
 
1. Business Analysis Professional
2. Current ECBAs / CCBAs and CBAPs
3. Business analysis trainers and consultants

 

Training Program Eligibility

  • Good command over English language and good knowledge of business and IT
  • Computer with mic and speaker
  • High speed internet (> 2 Mbps) and noise-free stationary environment
  • Residents of Cuba, Iran, Syria, North Korea, Crimea Region of Ukraine are not eligible to take IIBA exams

Be An Internationally Certified Security Analyst

CCA On-demand Training
  • CCA Study Guide
  • 500+ Model Questions
  • Video Learning
  • Flashcards
  • Audio Books
  • Exam tips
USD 249 USD 199 ($50 OFF)
CCA On-demand Training + CCA Exam Voucher
  • All the above Benefits
  • 1 Year IIBA Membership
  • CCA Exam Fee
USD 588 USD 549 ($39 OFF)

The prices mentioned in the website are valid for online purchases. Prices vary for invoiced courses.

Terms & conditions regarding Exam Bundle
For corporate group training, send us request.

Be An Internationally Certified Security Analyst

icon-2
Exhaustive 550 CCA Practice Questions
icon-3
IIBA Approved Courseware
icon-4
IIBA CCA based Study Guide
icon-6
Access to faculty presentation
icon-8
Learn on the go with Audiobooks!
icon-12
180 Days AdaptiveLMS Access
icon-10
Make learning fun with Flashcards
6+ hours of CCA Video learning
We support you till you Succeed

Be An Internationally Certified Security Analyst

  • 1

    INSTRUCTIONS

    • How to Use Thinkific Learning Portal

  • 2

    Live Office Hour + Past Recording

    • Join Your Live Office Hour by Clicking on the JOIN Button + Watch Past Recording

  • 3

    Chapter 1 - Introduction

    • Presentation - 1.1 - Overview

    • Presentation - 1.2 - Importance of Security

    • Presentation - 1.3 - IT Functions & Roles

    • Presentation - 1.4 - IT 101- 1 The Pieces

    • Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces

    • Presentation - 1.6 - IT 101-3 Advancement

    • Presentation - 1.7 - The Role of BA in Cybersecurity

    • Presentation - 1.8 - Governance Perspectives of Cybersecurity

    • Flashcards - Introduction

    • CCA - 1 - Intro - Questions

  • 4

    Chapter 2 - Security Concepts

    • Presentation - 2.1 - Security Accountability

    • Presentation - 2.2 - Cost of Securing an Organization

    • Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services

    • Presentation - 2.4 - Risk Tolerance

    • Presentation - 2.5 - Compliance

    • Presentation - 2.6 - Best Practices and Benchmarking

    • Presentation - 2.7 - Data Privacy

    • Presentation - 2.8 - Data Privacy Nuances

    • Presentation - 2.9 - Digital Rights Management (DRM)

    • Presentation - 2.10 - Audit- Internal and External

    • Flashcards - Security Concepts

    • CCA - 2 - Security concepts - Questions

  • 5

    Chapter 3 - Enterprise Risks

    • Presentation - 3.1 - Risk Management & Control Assurance Framework

    • Presentation - 3.2 - Organizational Risk Assessment

    • Presentation - 3.3 - Risk Analysis Threat Risk Assessments

    • Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    • Presentation - 3.4 - Risk Analysis Vulnerability Assessments

    • Presentation - 3.5 - Business Case Development

    • Presentation - 3.6 - Disaster Recovery and Business Continuity

    • Flashcards - Enterprise Risks

    • CCA - 3 - Enterprise risks - Questions

  • 6

    Chapter 4 - Cybersecurity Risks and Controls

    • Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1

    • Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2

    • Presentation - 4.3 - CIA Triad

    • Presentation - 4.4 - Applying Controls

    • Presentation - 4.5 - Cyber Threat-converted.pdf

    • Presentation - 4.6 - Cybersecurity Threats Part 2

    • Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1

    • Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2

    • Presentation - 4.9 - Adverse Impacts

    • Presentation - 4.10 - Risks and Controls- Putting It All Together

    • Flashcards - Cybersecurity Risks and Controls

    • CCA - 4 - Risks and Controls - Questions

  • 7

    Chapter 5 - Securing the Layers

    • Presentation - 5.1 - Physical Security

    • Presentation - 5.2 - Endpoint Security

    • Presentation - 5.3 - Network Security - Security Architecture

    • Presentation - 5.4 - Network Security - Firewalls

    • Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware

    • Presentation - 5.6 - Network Security - Segregation

    • Presentation - 5.7 - System Security - Servers

    • Presentation - 5.8 - Platform Security

    • Presentation - 5.9 - Product Security - Threat Models-converted.pdf

    • Presentation - 5.10 - Product Security - Embedded Systems

    • Presentation - 5.11 - Product Security - Internet of Things

    • Flashcards - Securing the Layers

    • CCA - 5 - Securing the layers - Questions

  • 8

    Chapter 6 - Data Security

    • Presentation - 6.1 - Data Security at Rest Information Classification & Categorization

    • Presentation - 6.2 - Data Security in Transit Encryption and Keys

    • Presentation - 6.3 - Data Security in Transit SSL-TLS

    • Presentation - 6.4 - Data Security in Transit Digital Signature and Identification

    • Flashcards - Data Security

    • CCA - 6 - Data security - Questions

  • 9

    Chapter 7 - Access Control

    • Presentation - 7.1 - Directory Management

    • Presentation - 7.2 - Authorization

    • Presentation - 7.3 - Authentication and Access Control

    • Presentation - 7.4 - Privileged Account Management

    • Presentation - 7.5 - Users and Security Awareness

    • Flashcards - User Access Control

    • CCA - 7 - Access control - Questions

  • 10

    Chapter 8 - Solution Delivery

    • Presentation - 8.1 - SDLC and Solution Security Planning

    • Presentation - 8.2 - Requirements and Security Engineering

    • Presentation - 8.3 - Requirements and Solution Development

    • Presentation - 8.4 - Solution Security Applications

    • Presentation - 8.5 - Solution Security Databases

    • Presentation - 8.6 - Solution Security Web

    • Presentation - 8.7 - Change Impact Analysis

    • Flashcards - Solution Delivery

    • CCA - 8 - Solution Delivery - Questions

  • 11

    Chapter 9 - Operations

    • Presentation - 9.1 - Incident Response, Recovery, and Remediation

    • Presentation - 9.2 - Metrics and Reporting

    • Presentation - 9.3 - Risk Logging and Mitigation Tracking

    • Presentation - 9.4 - Operational Risk Ownership

    • Presentation - 9.5 - Computer Forensics SOC, SIEM

    • Presentation - 9.6 - Future Proofing Your Security Posture

    • CCA - 9 - Operations - Questions

    • Flashcards - Operations

  • 12

    Workshop Materials

    • Adaptive US CCA Study Guide

  • 13

    Reference Materials

    • 108 BA Techniques

  • 14

    Exam Prep Help

    • Study Tips for IIBA Cert. Exams-17th Jun 2020-IIBA Webinar

    • CCA Prep Plan

    • The Ultimate IIBA Exams Info Guide

  • 15

    Simulations

    • CCA Simulations



Be An Internationally Certified Security Analyst

Adaptive US CCA Training Reviews

review-star

"I was in the first CCA cohort, and even though the course was new, it was still very high quality. Adaptive offered excellent material for learning new content and revising and building on existing knowledge. This is great, you don't need to be a knowledge expert from the start, their training material assists in filling the gaps.I passed the CCA first go without any problem, and well above the averages."

Jeremy Roach-1
Jeremy Roach
review-star

Thrilled to have achieved my Certificate in Cybersecurity Analysis (CCA) with the International Institute of Business Analysis (IIBA), it’s been on the hit list for a while.First of all, I'd like to thank Adaptive US for their excellent training materials.They make the journey extremely easy for you.Thanks to IIBA for the opportunity to learn key cybersecurity concepts in the context of Business Analysis.

Gareths
GARETH O'DRISCOLL

Adaptive US AAC Certificate of Achievement & Badge 

  • Showcase your achievement and let the world know that you are a trained BA with Adaptive’s digital certificate of completion!
  • Post your certificate instantly to your LinkedIn professional network, Facebook, Twitter, WhatsApp, and More!
  • Available in an online format so that you can retrieve it anywhere, at any time
  • Download and print the certificate at your convenience
Adaptive US AAC Certificate

Be An Internationally Certified Security Analyst

LN Mishra-1
LN Mishra CBAP

Mentor to 1500+ IIBA Certified Business Analysts. 25+ years of BA experience.

Be An Internationally Certified Security Analyst

What is CCA On-demand Training?

Adaptive's CCA On-demand Training provides all digital resources for CCA certification - Study Guide, Question Bank, Video Learning, Audio books and flashcards.

What is the difference between CCA Guided training and CCA On-demand training?

Adaptive’s CCA Guided training offers all the takeaways that comes in CCA On-demand training and you also get additional support like 1 Free retake, and fortnightly live tutorials.

What resources are provided for CCA On-demand training?

There will be 300+ practice questions and 4 full length simulators for practice ; IIBA PD hours, Study Guide, Flashcards, Audio books, e-learning videos, Tutorials, Mind Maps, and 6 Months Learning Portal Access.

Is the CCA On-demand training course approved by IIBA?

Adaptive US is an IIBA approved EEP (Endorsed Education Provider) and we provide you with a complete, comprehensive and success guaranteed training which will help you get certified in the very first attempt. Let me share with you the certificate that is published in our website. https://www.adaptiveus.com/iiba-eep-certificate

Do I get PD hours from the course to use for CCA exam?

Yes, we provide a certificate after completion of the training that confers IIBA PD hours. However, IIBA has removed any PD hour requirements for the CCA examination.

When do I get access to the CCA learning resources?

Access is provided to the CCA learning resources immediately after you enroll.

Can I download the CCA resources?

Resources are not downloadable.

When can I start the exam scheduling?

After you complete studying all chapters and successfully completed the 6 simulations.

How long do I need to study for the CCA exam?

2 to 3 months is a reasonable duration to complete cbap certification preparation. We typically recommend 80 to 100 hours of preparation.

How many months of learning portal access do I get?

6 months.

How many years is the PD hours/PD certificate valid?

PD Certificate is valid for 4 years from date of issue.

What is the eligibility to join this course?

No experience is needed as it is an entry level course.

Will the questions in CCA exam be from practice questions and simulations

These are CCA model questions to help you prepare for the CCA exam and questions will be similar but not same. 

Is there a group discount option available?

Yes, refer offers page : https://www.adaptiveus.com/offers

Will I be eligible for any referral bonus if I refer my friend or colleague to your program?

Yes, please sign up as an affiliate partner: https://partners.adaptiveus.com/

We want to join as a team from our organization, what's the process for this?

For corporate group training, please send your request to Info@AdaptiveUS.com

Can you accept payment from my company for my enrolment?

Yes, we can.

Will you be able to accept payment by card?

We accept PayPal and Credit cards as methods of payment. Accepted credit cards are American Express, Visa, MasterCard, Discover, and Diners Club.

Will you be able to send me an invoice for my company to pay?

Yes, we can.

Is there any instalment plan?

No instalment options are available for the CCA On-demand training.

Do you provide financing option?

We provide financing options for our customers in the United States through Thinkific payment.



Be An Internationally Certified Security Analyst