Skip to content
CCIS Course
Pricing
About
Knowledge Hub
Contact
Menu
CCIS Course
Pricing
About
Knowledge Hub
Contact
Learning Objectives – By Course Chapter
Chatper 1
Define what is the cyber risk
Distinguish between cyber security & information security
Classify the different types of attack targets
Chatper 2
Define IT and outline its components
Name and describe the principles of Information Security
List and compare the different mitigation techniques
State and discuss the responsibilities of the modern CISO (Chief Information Security Officer)
Chatper 3
Differentiate between internal and external threats
Define an attack surface and be able to measure it in organizations
Define an attack vector and identify attack vector types
Define malware and distinguish between the most well-known types
Chatper 4
Explain what the cloud is and distinguish between different cloud services
List the different communication layers and describe the process of data communication in practice
Define what protocol is, and explain different protocol types and their role in the process of data communication
Recognize network architectures, classify network types, and compare networking devices
Chatper 5
Define and interpret the Defense in Depth methodology
Recognize and explain three cybersecurity defense levels and discuss counter measures which operate in each level
Define and explain a variety of common cybersecurity tools and services
Chatper 6
Describe what risk assessment is, analyze it, and use its findings
Compare and evaluate regulations around the globe, and list and explain commonly used standards and guidelines
Define what data privacy is and discuss the different types of data records
Chatper 7
Compare the cyber product with other traditional insurance products to demonstrate an understanding of its uniqueness
Explain and discuss the issue of silent cyber and be able to diagnose silent cyber scenarios
Define “cyber capacity”, give examples of techniques to increase capacity and explain the concept of cyber towers
Chatper 8
Define and list cyber coverages, endorsements and exclusions
Explain the purpose of and content items in a cyber proposal form and detail how it is used in practice
Identify sectors with dedicated cyber policies, and present the cyber threat landscape of five important business sectors
Present the personal cyber product and its coverages, and explain the personal cyber threat landscape
Chatper 9
List and describe the different costs of cyber attacks
Describe the different steps needed to conduct a proper underwriting process and classify meaningful analytical technologies used
Describe the cyber claims process from the eyes of the insured party, and list and explain the incident response phases from an insurer’s perspective
Chatper 10
Analyze the state of the cyber industry market
Use online-web tools to perform different activities for the underwriting and claims process
Define key elements of being a cyber insurance professional