Certificate in Cybersecurity Analysis (IIBA-CCA) Training Course

Certificate In Cybersecurity Analysis Certification Training Course Overview

Enroll for 5-day Certificate In Cybersecurity Analysis certification training course from Koenig Solutions accredited by IIBA. Certificate In Cybersecurity Analysis course provide the basics of cybersecurity needed to assist in the overall cybersecurity solution. The joint IIBA and IEEE Computer Society’s learning and certification provides the credibility of a joint certification and the opportunity to learn key cybersecurity concepts and tools business analysis professionals need to demonstrate core competencies.

Through a blend of hands-on labs and interactive lectures, you will be able to learn cybersecurity analysis knowledge areas, understand Cybersecurity frameworks and much more. Upon completion of course you will be exposed to key terms and concepts that Business Analyst needs to successful in the Cyber Security space. You will also be prepared to take the certificate exam

Target Audience:

  • Candidate working as a Business Analyst.
  • Candidate working as a Business system analyst.
  • Candidate working as a Project Manager.
  • Candidate looking to work as a Cybersecurity Business Analyst

 

Learning Objectives

After completing this course, you will be able to:

  • Cybersecurity analysis knowledge areas.
  • Understand cybersecurity frameworks
  • Business Analyst’s focal points for each knowledge area.
  • How cybersecurity must be baked into business solutions.
  • How to apply cybersecurity techniques and concepts.
  • How to engage senior managers to elicit security requirements
  • Cybersecurity analysis work practices.

 

Certificate in Cybersecurity Analysis (IIBA-CCA) Training Course (Duration : 40 Hours) Download Course Contents

Live Online Training Fee On Request
Group Training Date On Request
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Buy Flexi For Only $99 (Online Training Re-imagined)

Course Modules

Module 1: Cybersecurity Overview and Basic Concepts
  • General Awareness: Understands the role of Business Analysis in Cybersecurity
  • Practical Knowledge: Follows Rules to conduct a stakeholder analysis
  • Practical Knowledge: Follows Rules using existing documentation to draft a RACI for a Cybersecurity project or program initiative
  • General Awareness: Understands how to locate the organization's security framework or model, or know that one does not yet exist
  • General Awareness: Understands what an Information Security Management System (ISMS) is and its objective
  • General Awareness: Understands what data privacy is
  • General Awareness: Understands the difference between an internal and external audit
  • Practical Knowledge: Follows Rules and knows the difference between compliance and best practice
Module 2: Enterprise Risk
  • General Awareness: Understands what a cyber risk is
  • General Awareness: Basic Knowledge of what a Cybersecurity Risk Assessment is
  • Practical Knowledge: Follows Rules for the inputs to a Business Case that BAs are typically responsible for
  • General Awareness: Understands what Disaster Recovery Plans and Business Continuity Plans are
  • Practical Knowledge: Follows Rules to develop a business process flow diagram, and identify steps along the path that present potential cybersecurity vulnerabilities
Module 3: Cybersecurity Risks and Controls
  • General Awareness: Understands what Cybersecurity Controls are and where to find various versions
  • General Awareness: Understands the three attributes of secure information: confidentiality, integrity and availability
  • General Awareness: Understands the difference between a cyber threat and a cyber vulnerability
  • Practical Knowledge: Follows Rules to identify typical impacts of a cyber-attack to an organization
Module 4: Securing the Layers
  • General Awareness: Understands that there are multiple layers of technology to protect
  • General Awareness: Understands what is meant by Endpoint Security
Module 5: Data Security
  • General Awareness: Understands what Information Classification means
  • General Awareness: Understands what Information Categorization means
  • General Awareness: Understands what Data Security at Rest means
  • General Awareness: Understands what Data Security in Transit means
  • General Awareness: Understands what Encryption is
  • General Awareness: Understands what a Digital Signature is
Module 6: User Access Control
  • Practical Knowledge: Follows Rules to set up authorization
  • General Awareness: Understands what authentication is
  • General Awareness: Understands what access control means
  • General Awareness: Understands what Privileged Account Management is
  • Practical Knowledge: Follows Rules and is familiar with key actions employees should take responsibility for to maintain security
  • General Awareness: Understands the principle of least privilege
  • Practical Knowledge: Follows Rules to elicit user access requirements
Module 7: Solution Delivery
  • Practical Knowledge: Follows Rules to identify a Security Requirement when presented with a list of requirements
  • General Awareness: Understands what SaaS, IaaS and PaaS are
  • Practical Knowledge: Follows Rules to document a current state business process including current technology
  • General Awareness: Understands a target state business process for a cybersecurity initiative
  • Practical Knowledge: Follows Rules to map cybersecurity solution components back to security requirements
Module 8: Operations
  • General Awareness: Understands how to create and maintain a risk log
  • General Awareness: Basic Knowledge of the four risk treatment options: Accept, Avoid, Transfer, Mitigate
  • General Awareness: Understands what residual risk is
  • General Awareness: Understands how to create a report template for Security metrics
  • General Awareness: Understands Root Cause Analysis
Download Course Contents

Request More Information

Course Prerequisites

No formal pre-requisite.