Learning Objectives – By Course Chapter

Chapter 1

Define what is the cyber risk

Distinguish between cyber security & information security

Classify the different types of attack targets

Chapter 2

Define IT and outline its components

Name and describe the principles of Information Security

List and compare the different mitigation techniques

State and discuss the responsibilities of the modern CISO (Chief Information Security Officer)

Chapter 3

Differentiate between internal and external threats

Define an attack surface and be able to measure it in organizations

Define an attack vector and identify attack vector types

Define malware and distinguish between the most well-known types

Chapter 4

Explain what the cloud is and distinguish between different cloud services

List the different communication layers and describe the process of data communication in practice

Define what protocol is, and explain different protocol types and their role in the process of data communication

Recognize network architectures, classify network types, and compare networking devices

Chapter 5

Define and interpret the Defense in Depth methodology

Recognize and explain three cybersecurity defense levels and discuss counter measures which operate in each level

Define and explain a variety of common cybersecurity tools and services

Chapter 6

Describe what risk assessment is, analyze it, and use its findings

Compare and evaluate regulations around the globe, and list and explain commonly used standards and guidelines

Define what data privacy is and discuss the different types of data records

Chapter 7

Compare the cyber product with other traditional insurance products to demonstrate an understanding of its uniqueness

Explain and discuss the issue of silent cyber and be able to diagnose silent cyber scenarios

Define “cyber capacity”, give examples of techniques to increase capacity and explain the concept of cyber towers

Chapter 8

Define and list cyber coverages, endorsements and exclusions

Explain the purpose of and content items in a cyber proposal form and detail how it is used in practice

Identify sectors with dedicated cyber policies, and present the cyber threat landscape of five important business sectors

Present the personal cyber product and its coverages, and explain the personal cyber threat landscape

Chapter 9

List and describe the different costs of cyber attacks

Describe the different steps needed to conduct a proper underwriting process and classify meaningful analytical technologies used

Describe the cyber claims process from the eyes of the insured party, and list and explain the incident response phases from an insurer’s perspective

Chapter 10

Analyze the state of the cyber industry market

Use online-web tools to perform different activities for the underwriting and claims process

Define key elements of being a cyber insurance professional