AXA XL – Certified Cyber Insurance Specialist (CCIS) Course

Asaf Armoni · September, 2024

Welcome to the CCIS course!

The Certified Cyber Insurance Specialist (CCIS) course is a comprehensive program designed to equip you with a strong foundation in both cybersecurity and cyber insurance.

 

The course covers a range of topics, from cybersecurity approaches, technologies, and methodologies, to the intricacies of cyber insurance at both policy and market levels. By the end of this rigorous training program, you can expect to have gained a deeper understanding of the evolving risk landscape and the ability to adapt to next-gen threats.

 

Your Learning Journey

You will have up to one year to complete this course. We recommend regularly reviewing course concepts and setting aside adequate time for completion. This self-paced learning experience includes interactive features like videos and quizzes, making the learning process more active and engaging.

 

CCIS Final Exam

The final exam for the Certified Cyber Insurance Specialist (CCIS) course is designed to assess your understanding of the course materials and concepts covered throughout the duration of the course. Your knowledge and understanding will be examined via multiple-choice questions under timed conditions. It is essential that you thoroughly review all course materials, including lessons, readings, and assignments, before starting the exam. The questions on the exam will be based on the content covered in the course. The exam is administered at the end of the course and you cannot take it without completing all the Chapters and Lessons.

 

 

Course Learning Objectives

Chapter 1

  • Define the meaning of cyber risk
  • Distinguish between Cybersecurity & Information Security
  • Classify different types of attack targets

Chapter 2

  • Define IT and outline its components
  • Recognize and describe the principles of Information Security
  • Analyze and compare different mitigation techniques
  • List and discuss the responsibilities of the modern CISO (Chief Information Security Officer)

Chapter 3

  • Differentiate between internal and external threats
  • Locate and measure the different attack surfaces
  • Identify the different attack vectors
  • Distinguish between the most common strains of malware

Chapter 4

  • Explain what the cloud is and distinguish between different cloud services
  • List the different communication layers and describe the process of data communication in practice
  • Define and explain the different protocol types and their role in the process of data communication
  • Recognize network architectures, classify network types, and compare networking devices

Chapter 5

  • Define and interpret the Defense in Depth methodology
  • Analyze the three cybersecurity defense levels and discuss the countermeasures that operate at each level
  • Interpret the variety of common cybersecurity tools and services

Chapter 6

  • Describe, analyze, and apply the results of risk assessments to make decisions on cyber attack mitigation
  • Compare and evaluate regulations around the globe, and explain commonly used standards and guidelines
  • Define data privacy and discuss different types of data records

Chapter 7

  • Compare the cyber product with other traditional insurance products to demonstrate an understanding of its uniqueness
  • Explain and discuss the issue of silent cyber and diagnose silent cyber scenarios
  • Define cyber capacity, provide examples of techniques to increase capacity, and explain the concept of cyber towers

Chapter 8

  • Label the different cyber coverages, endorsements, and exclusions
  • Explain the purpose of questions posed in a cyber proposal form and how the answers given may influence underwriting decisions
  • Identify sectors with dedicated cyber policies, and present the cyber threat landscape of five important business sectors
  • Present the personal cyber product and its coverages, and explain the personal cyber threat landscape

Chapter 9

  • Compare the different costs associated with cyber attacks
  • Classify the steps needed to conduct a proper underwriting process and compare the advantages and disadvantages of analytical technologies that cyber insurance professionals can leverage in their day-to-day
  • Recall the cyber claims process and the incident response phases from the insured party’s perspective

Chapter 10

  • Analyze the state of the cyber insurance market
  • Use online web tools to perform different activities for the underwriting and claims process
  • Define the key attributes of a cyber insurance professional

About Instructor

Not Enrolled
This course is currently closed

Course Includes

  • 95 Lessons
  • 14 Quizzes
Skip to content