What people say...

Reviews from our learners who have used our other resource libraries

5 star rating

Excellent

Rita Kene-Nwegbe

I love the videos and articles. They gave me insights to the different tasks.

I love the videos and articles. They gave me insights to the different tasks.

Read Less
5 star rating

Very informative and Easy Reference

Samantha Ford

Great selection of resources that are broken down in a way that's easy to follow. Enjoyed the videos and explanations given for each technique. Also some ver...

Read More

Great selection of resources that are broken down in a way that's easy to follow. Enjoyed the videos and explanations given for each technique. Also some very useful links to templates etc. that I will definitely be using going forward.

Read Less

Our Library Offers

We have put together a range of resources to help you find information quickly and easily.

  • 1

    Welcome to your resource library!

  • 2

    Cybersecurity Analysis Module 1: Introduction to Cybersecurity Analysis

    • 1.4.2 The 5 components of Information Systems

    • 1.4.2 Understanding Applications (APPs)

    • 1.4.2 What is a database

    • 1.4.2 Types of IT infrastructure

    • 1.4.3 What does a data centre do?

    • 1.4.4 Servers & Clients

    • 1.4.4 Servers and Clients (2)

    • 1.4.5 What is a web server

    • 1.4.5 Web Server vs Application Server

    • 1.4.5 What is a static file server?

    • 1.4.5 What is a directory server?

    • 1.4.5 What are directory services

    • 1.4.6 What is a platform?

    • 1.4.6 What is Platform as a service?

    • 1.4.6 Saas, Paas and Iaas Part 1

    • 1.4.6 Sas, Paas & Iaas Part 2

    • 1.4.7 What is the OSI model?

    • 1.5.2 What is the internet protocol

    • 1.5.2 What is the TCP/IP Protocol

    • 1.5.2 TCP/IP Model

    • 1.5.3 Systems Development Life Cycle (SDLC)

    • 1.5.4 Waterfall model in Software Development

    • 1.5.4 Agile in Software Development

    • 1.5.5 Staging Deployments

    • 1.5.6 ITIL - What is it?

    • 1.5.7 What is Patch Management?

    • 1.5.8 What is a web application?

    • 1.5.8 Web pages, Websites, and Web Applications

    • 1.5.8 The Internet vs the Web

    • 1.5.8 HTTP & the Web

    • 1.6.2 What is Information Management?

    • 1.6.3 Cloud Computing for Beginners

    • 1.6.4 Cloud vs On-Prem

    • 1.6.4 Cost of Cloud vs On-Prem

    • 1.6.5 Management Services

    • 1.6.6 Digitization, Digital Transformation and Innovation: What’s the Difference?

    • 1.6.7 What is Business Intelligence

    • 1.6.8 Internet of Things (IoT) - How it works

    • Administrator and operator logs

  • 3

    Cybersecurity Analysis Module 2: Enterprise Security Concepts

    • Anonymization and Pseudonymization under GDPR

    • Anonymization + Pseudonymization | 60 Seconds of Legal Science | Shook

    • CIA: What is CIA Triad?

    • CISO: Three Keys to CISO Success

    • Defense in Depth

    • DMZ: What is a DMZ? (Demilitarized Zone)

    • DRM: What is digital rights management (DRM)?

    • Information Assurance and Security - CIS4930

    • Information Security Management System (ISMS)

    • Internet of Things: What is IoT

    • Intrusion Detection and Prevention Systems (IDS/ IPS) | Security Basics

    • Managed Security Service Provider (MSSP): What is it?

    • Network Segmentation

    • Rights Expression Language (REL)

    • Risk Appetite Explained - Risk Tolerance -Risk Tolerance Tips (Financial perspective)

    • Security Benchmarking

    • SIEM: Security Information & Event Management Explained

    • Virtual Private Network (VPN): What is VPN

  • 4

    Cybersecurity Analysis Module 3: Enterprise Risk

    • Common Cyber-Attacks Explained

    • Cybersecurity Basics #2 - Vulnerabilities, Exploits, and Threats

    • Executive summary

    • Cyber Security – Top 10 Threats

    • Mapping Assets, Threats, Vulnerabilities, and Attacks

    • Ownership in Risk Management

    • Risk Assessment

    • Risk management framework

    • Risk ownership and assigning risk

    • Security Controls Testing

    • SWOT Analysis - What is SWOT? Definition, Examples and How to Do a SWOT Analysis

    • The Difference Between Backup and Disaster Recovery

    • The importance of Threat Modeling

    • The law of diminishing returns

    • Vulnerability Discovery

    • Vulnerability remediation overview

    • Vulnerability Scanning With Authentication

    • What’s the Difference Between Risk Capacity vs. Risk Appetite?

    • What is Authentication

    • What is Business Continuity?

    • What is COMMERCIAL OFF-THE-SHELF? What does COMMERCIAL OFF-THE-SHELF mean?

    • What is Penetration Testing?

    • What is the MoSCoW Method?

  • 5

    Cybersecurity Analysis Module 4: Cybersecurity Risks & Controls

    • FIPS 199 200 - Information Categorization and Classification

    • Information Security Incident Management - BIA (Business Impact Analysis)

    • Non-Repudiation

    • Threats and Threat Agents

    • What is INFORMATION ASSURANCE?

    • Cyber Security Risk Assessment

    • Security Controls - CompTIA Security+ SY0-501 - 5.7

    • MicroNugget: What are the Different Types & Functions of Security Controls?

    • NIST Cyber Security Framework (Introduction)

    • NIST Cyber Security Framework

    • What is ISO 27001? | A Brief Summary of the Standard

    • What is ITIL (and ITSM)? Project Management in Under 5

    • COBIT2019 Overview

    • Demystifying NIST 800-53

    • Attack Tree Demonstration

    • Understanding the STRIDE mnemonic for six common InfoSec threats

    • Vulnerability Scanning

    • Select Controls for Risk Management Framework

  • 6

    Cybersecurity Analysis Module 5: Securing the Layers

    • Compromising Electromagnetic Emanations of Wired Keyboards 1

    • Compromising Electromagnetic Emanations of Wired Keyboards 2

    • DHCP Explained | Step by Step

    • Difference Between Whitelist and Blacklist Policy in Cisco Tetration

    • Domain Name System DNS

    • Encryption as Fast As Possible

    • Hardware Security Module (HSM)

    • Host-based vs Network Firewalls: What’s the difference?

    • How An Information Asset Register Can Help Keep Your Business Safe

    • How Does Full Disk Encryption Work?

    • How Does Individual File Encryption Work?

    • IaaS Explained

    • Introduction to IT Asset Management

    • Network Traffic & Interfaces (Egress & Ingress Traffic)

    • Over the Air Firmware Update

    • The Threat Landscape Attack Surface

    • What is a honeypot, How to install and what can we see from honeypots?

    • What is an API?

    • What is an Embedded System?

    • What is Endpoint Security?

    • What is Malware?

    • Why are flat networks a problem nowadays?

    • Why Data Isolation Matters

    • Implementing Physical Security For a Data Center

  • 7

    Cybersecurity Analysis Module 6: Data Security

    • Securing SQL Sever :-Data Classification & Vulnerability Assessment

    • NIST SP 800 30 Introduction

    • Data Classification

    • Privacy 101: Data Protection Officer

    • GDPR: how Europe's data law works

    • Data Loss Prevention

    • Asymmetric Encryption - Simply explained

    • Digital Signatures

    • ISO 27002 - Control 10.1.1 - Policy on the Use of Cryptographic Controls

    • Non-repudiation

    • Security of Data in Transit | Protection of Data in Transit | DLP - data loss prevention in Transit

    • Data Privacy Laws

    • Protecting Data in Transit

    • Man in the Middle Attacks

    • Digital Certificates: Chain of Trust

  • 8

    Cybersecurity Analysis Module 7: User Access Control

    • Identity and Access Management: Technical Overview

    • What Is the Principle of Least Privilege?

    • Role Based Access Control

    • Discretionary Access Control List (DACL)

    • What is Two-Factor Authentication? (2FA)

    • What is Separation of Duties?

    • What is Identity and access management

    • NIST 800-53 - AC-4, Information Flow Enforcement Guidance

    • Identity and Access Provisioning Lifecycle

    • What is SSO

    • Privileged Access Management

    • Information Security Awareness | Training For Employees

    • Managing Password Policies

  • 9

    Cybersecurity Analysis Module 8: Solution Delivery

    • Software security - Security Requirement

    • Monitoring System Logs

    • Security engineering

    • Building Security in to Applications

    • BACCM Business Analyst Core Concept Model

    • ISO 27001 Security Requirements of Information Systems

    • Database Security Concepts

    • Application Security Conundrum

    • Agile Security Manifesto

    • Introduction to the Secure SDLC

    • What is Cloud Security?

    • IT controls - General vs Application Controls

  • 10

    Cybersecurity Analysis Module 9: Operations

    • Security and privacy reporting

    • Security Controls Testing

    • Steps for developing a Business Continuity Plan (BCP)

    • Link between Business Continuity and Cybersecurity

    • The Difference Between Business Continuity and Disaster Recovery

    • What is incident response in cyber security

    • Security metrics: What are the Top Metrics to Track?

    • What is a SIEM

    • Overview of Digital Forensics

    • Cybersecurity vs Cyber Forensics: What's the difference?

    • Inside the Security Operations Center

    • Economics of Cybersecurity: Metrics from incident data

    • Example Cybersecurity Documentation - Policies, Standards, Controls, Procedures & Metrics

Watch Intro Video

Video

Find out why cybersecurity training is important for Business Analysts

Get the Cybersecurity Library for free. by purchasing the CCA Cybersecurity Masterclass Bundle

Get 25% off this course (save $123.75). Use promo code: BDAY25 at checkout.

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds