Cybersecurity Analysis Certification (CCA) Training Course
Success Guarantee
2000+ IIBA Certifications.
Adaptive's 4 Awesome Guarantees
Endorsed Courses
Success Guarantee
Moneyback Guarantee
- Overview
- Eligibility
- Enroll
- Deliverables
- Resources
- Reviews
- Trainers
- FAQ
CCA CERTIFICATION
Adaptive’s CCA Guided Training course provides highly focused exam preparation support for IIBA-CCA exam candidates through sessions fully aligned to the IIBA CCA requirements. The office hours are interactive sessions conducted by CCA qualified expert instructors. The learning resources, study plan, exam tips, question bank and exam simulators are fully aligned to the CCA exam pattern and equips CCA aspirants to prepare effectively, identify areas of weakness and face the CCA certification examination confidently.
Trusted by professionals globally to pass their CCA exam in the first attempt.
Be An Internationally Certified Security Analyst
CCA Eligibility
- Business Analysis Professional
- Current ECBAs / CCBAs and CBAPs
- Business analysis trainers and consultants
CCA Training Program Eligibility
- Good command over English language and good knowledge of business and IT
- Computer with mic and speaker
- High speed internet (> 2 Mbps) and noise-free stationary environment
- Residents of Cuba, Iran, Syria, North Korea, Crimea Region of Ukraine are not eligible to take IIBA exams
Be An Internationally Certified Security Analyst
- 21 IIBA PDU's
- Cover 2 retake fee
- 12 hours live training
- 6 Months CCA Exam Prep Support
- Downloadable CCA Study Guide
- 550+ Model Questions
- 4 Exam simulations
- Flashcards
- Exam prep plan and tips
- 180 days resources (LMS) access period
- Everything in CCA Master Class
- 1 Year IIBA Membership of USD 139
- CCA Exam Fee of USD 250
*IIBA Exam Voucher Activation can take up to 7 business days
The prices mentioned in the website are valid for online purchases. Prices vary for invoiced courses.
Be An Internationally Certified Security Analyst
Be An Internationally Certified Security Analyst
Adaptive US CCA Training Resources
INSTRUCTIONS
- How to Use Thinkific Learning Portal
Live Office Hour + Past Recording
- Join Your Live Office Hour by Clicking on the JOIN Button + Watch Past Recording
Chapter 1 - Introduction
- Presentation - 1.1 - Overview
- Presentation - 1.2 - Importance of Security
- Presentation - 1.3 - IT Functions & Roles
- Presentation - 1.4 - IT 101- 1 The Pieces
- Presentation - 1.5 - IT 101- 2 Using & Managing the Pieces
- Presentation - 1.6 - IT 101-3 Advancement
- Presentation - 1.7 - The Role of BA in Cybersecurity
- Presentation - 1.8 - Governance Perspectives of Cybersecurity
- Flashcards - Introduction
- CCA - 1 - Intro - Questions
Chapter 2 - Security Concepts
- Presentation - 2.1 - Security Accountability
- Presentation - 2.2 - Cost of Securing an Organization
- Presentation - 2.3 - Outsourcing for Cybersecurity Expertise and Services
- Presentation - 2.4 - Risk Tolerance
- Presentation - 2.5 - Compliance
- Presentation - 2.6 - Best Practices and Benchmarking
- Presentation - 2.7 - Data Privacy
- Presentation - 2.8 - Data Privacy Nuances
- Presentation - 2.9 - Digital Rights Management (DRM)
- Presentation - 2.10 - Audit- Internal and External
- Flashcards - Security Concepts
-
CCA - 2 - Security concepts - Questions
Chapter 3 - Enterprise Risks
-
Presentation - 3.1 - Risk Management & Control Assurance Framework
-
Presentation - 3.2 - Organizational Risk Assessment
-
Presentation - 3.3 - Risk Analysis Threat Risk Assessments
-
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
-
Presentation - 3.4 - Risk Analysis Vulnerability Assessments
-
Presentation - 3.5 - Business Case Development
-
Presentation - 3.6 - Disaster Recovery and Business Continuity
-
Flashcards - Enterprise Risks
- CCA - 3 - Enterprise risks - Questions
Chapter 4 - Cybersecurity Risks and Controls
- Presentation - 4.1 - Understanding Security Controls and IT Risk Part 1
- Presentation - 4.2 - Understanding Security Controls and IT Risk Part 2
- Presentation - 4.3 - CIA Triad
- Presentation - 4.4 - Applying Controls
- Presentation - 4.5 - Cyber Threat-converted.pdf
- Presentation - 4.6 - Cybersecurity Threats Part 2
- Presentation - 4.7 - Cybersecurity Vulnerabilities Part 1
- Presentation - 4.8 - Cybersecurity Vulnerabilities Part 2
- Presentation - 4.9 - Adverse Impacts
- Presentation - 4.10 - Risks and Controls- Putting It All Together
- Flashcards - Cybersecurity Risks and Controls
- CCA - 4 - Risks and Controls - Questions
Chapter 5 - Securing the Layers
-
Presentation - 5.1 - Physical Security
-
Presentation - 5.2 - Endpoint Security
-
Presentation - 5.3 - Network Security - Security Architecture
-
Presentation - 5.4 - Network Security - Firewalls
-
Presentation - 5.5 - Network Security - Anti- Virus Anti- Malware
-
Presentation - 5.6 - Network Security - Segregation
-
Presentation - 5.7 - System Security - Servers
-
Presentation - 5.8 - Platform Security
-
Presentation - 5.9 - Product Security - Threat Models-converted.pdf
-
Presentation - 5.10 - Product Security - Embedded Systems
-
Presentation - 5.11 - Product Security - Internet of Things
-
Flashcards - Securing the Layers
- CCA - 5 - Securing the layers - Questions
Chapter 6 - Data Security
-
Presentation - 6.1 - Data Security at Rest Information Classification & Categorization
-
Presentation - 6.2 - Data Security in Transit Encryption and Keys
-
Presentation - 6.3 - Data Security in Transit SSL-TLS
-
Presentation - 6.4 - Data Security in Transit Digital Signature and Identification
-
Flashcards - Data Security
-
CCA - 6 - Data security - Questions
Chapter 7 - Access Control
-
Presentation - 7.1 - Directory Management
-
Presentation - 7.2 - Authorization
-
Presentation - 7.3 - Authentication and Access Control
-
Presentation - 7.4 - Privileged Account Management
-
Presentation - 7.5 - Users and Security Awareness
-
Flashcards - User Access Control
-
CCA - 7 - Access control - Questions
Chapter 8 - Solution Delivery
-
Presentation - 8.1 - SDLC and Solution Security Planning
-
Presentation - 8.2 - Requirements and Security Engineering
-
Presentation - 8.3 - Requirements and Solution Development
-
Presentation - 8.4 - Solution Security Applications
-
Presentation - 8.5 - Solution Security Databases
-
Presentation - 8.6 - Solution Security Web
-
Presentation - 8.7 - Change Impact Analysis
-
Flashcards - Solution Delivery
-
CCA - 8 - Solution Delivery - Questions
Chapter 9 - Operations
-
Presentation - 9.1 - Incident Response, Recovery, and Remediation
-
Presentation - 9.2 - Metrics and Reporting
-
Presentation - 9.3 - Risk Logging and Mitigation Tracking
-
Presentation - 9.4 - Operational Risk Ownership
-
Presentation - 9.5 - Computer Forensics SOC, SIEM
-
Presentation - 9.6 - Future Proofing Your Security Posture
-
CCA - 9 - Operations - Questions
-
Flashcards - Operations
Workshop Materials
- Adaptive US CCA Study Guide
Reference Materials
- 108 BA Techniques
Exam Prep Help
-
Study Tips for IIBA Cert. Exams-17th Jun 2020-IIBA Webinar
-
CCA Prep Plan
-
The Ultimate IIBA Exams Info Guide
Simulations
-
CCA Simulations
Be An Internationally Certified Security Analyst
Adaptive US CCA Training Reviews
"I was in the first CCA cohort, and even though the course was new, it was still very high quality. Adaptive offered excellent material for learning new content and revising and building on existing knowledge. This is great, you don't need to be a knowledge expert from the start, their training material assists in filling the gaps.I passed the CCA first go without any problem, and well above the averages."
Thrilled to have achieved my Certificate in Cybersecurity Analysis (CCA) with the International Institute of Business Analysis (IIBA), it’s been on the hit list for a while. First of all, I'd like to thank Adaptive US for their excellent training materials. They make the journey extremely easy for you. Thanks to IIBA for the opportunity to learn key cybersecurity concepts in the context of Business Analysis.
Be An Internationally Certified Security Analyst
LN Mishra CBAP
Mentor to 1900+ IIBA Certified Business Analysts. 25+ years of BA experience.