Certified Cyber Security Specialist TM
Why become a Certified Cyber Security Specialist TM?

What is involved for Certification?
- STEP 1 - Register for the course modules
- STEP 2 - Take the 5 course modules (approximately 5 hours)
- STEP 3 - Register for the CCSS exam
- STEP 4 - Take the required 100 question proctored exam
- STEP 5 - Pass the exam with a 70% or higher
What is the Cost?
You will have two (2) opportunities to pass the exam. re-testing fee is required after two (2) failed attempts.
$100**** Instructions and your license code will be sent to you after payment is received.****
Course Descriptions
Course Overview:
This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the global Identity Theft crisis and educating agents on how to assist their clients (employers) from a Risk Management perspective. The course will discuss the differences between, Data Breach, Data Comprise and Data Leaks. Topics such as cloud-based data storage risks, public networks, personal virtual private networks (”VPN’s”), safer passwords, and how to select the appropriate Identity Theft protection program as part of the overall benefit program. Information on how to protect company emails, email attachments, how agents can better protect client.
We are seeing Insurance carriers offer corporate liability insurance rate reductions when a business has internal written Cyber Security protocols and employee training on how to protect company and client data. Insurance professionals will gain an enhanced understanding on how to help clients set-up internal policies and procedures and negotiate and work with Insurance Carriers to secure the best possible coverage and rates for their clients.
Learning Objectives:
- After completing this workshop, you will be able to:
- Understand the definitions and statistics of identity theft
- Be aware of how fraudsters gain access to information
- Suggest the appropriate individual digital safety & protection products to clients
- Identify and repair damage done from this kind of fraud
- Know the resources and tips to use when applying security
- Apply the knowledge you’ve learned to various case scenarios
Course Outline:
Keeping Data Secure
- How is data stolen?
- Passwords: The Reality Check
- Computer system OS updates
- Email protection & safety strategy
Understanding Data Loss
- What are the cost of ID Theft & Data Breaches
- Data Breach vs. Comprise vs. Leak
- How hacking is really done
Open Source Intelligence
- How your personal data is discovered and used by criminals
- Virtual Private Networks (“VPNs”)
- Methods used for discovering your data
Understanding Your Risks
Data and Public Access
- Credit Monitoring vs. Credit Freeze
- Cloud Storage / File Sharing
- Public Networks
Identity Protection Products
- Credit Monitoring
Review What Your Learned
- Exercises
- Applying What You Learned
Course Overview:
This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the global Identity Theft crisis. It will educate agents on how to assist their clients (employers) from a Risk Management perspective. The course will discuss Medical Identity Theft and how to protect employee health data. Agents can help their employer groups in creating corporate Identity Theft and Data Protection protocols, helping employees to gain an increased awareness and understanding relative to the risks of Identity Theft, both personal and at their workplace. Information on how to protect company emails, email attachments, how employees can better protect their employer and possible employer’s client. Understanding the industry nomenclatures as well as the steps necessary to repair any damage and other industry resources.
Learning Objectives:
After completing this workshop, you will be able to:
- Understand the definitions and statistics of identity theft
- Be aware of how fraudsters gain access to information
- Suggest the appropriate individual digital safety & protection products to clients
- Identify and repair damage done from this kind of fraud
- Know the resources and tips to use when applying security
- Apply the knowledge you’ve learned to various case scenarios
Course Outline:
What is Identity Theft
- Identity Theft 101
- Types of Identity Theft
Definitions
- PII: Personal Identifying Information
- Identity Theft vs. Identity Fraud
- Victim Fraud & Financial Losses
How Fraudsters Can Get Your Information
- How Non-Fraudsters Can Get Your Information
- Old School Methods
- Targeted Methods
- Pharming & Phishing
- SMShing, Vishing & Spoofing
- Check Fraud
Identifying Risk
- Installed Devices Risk
- Chip Enabled Credit Cards
- EMV & RFID Protection
- Financial Account Risks
Digital Safety Risk
- Password Protections
- 2FA/MFA
- Wi-Fi Keylogging
- Geotagging
- Biometrics
- Social Media
Recovery and Protection
- Steps Required to Repair the Damage
- Report Your Identity Theft or Fraud
- Identity Protection
- Alerts for Minors
- Sex Offender Reporting
- Resources and Tips
- Password Managers
Review What You Learned
- Exercises
- Applying What You Learned
Course Overview:
This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, the various types of Identity Theft Insurance programs and the differences between them, such as, proactive versus reactive programs, services included in various programs, insurance coverages, how they work and what to look for. If an employee is part of a global data breach, and they receive correspondence, what exactly will the no cost identity monitoring services include. Information on insured versus non-insured programs will be discussed as well as peeling back the insurance policy with a deep dive review of what insurance policies typically include, what is excluded and what to look for in recommending the right solution for their clients and their employees.
A review of credit monitoring services, social media monitoring, digital footprint exposures, retirement plan stolen funds reimbursement, tax fraud protection and employee financial wellness. Discussions on fiduciary responsibilities of an insurance professionals on helping employers navigate through the complexities of Identity Theft programs as an employee benefit.
Learning Objectives:
After completing this workshop, you will be able to:
- Understand the definitions and statistics of identity theft
- Be aware of how fraudsters gain access to information
- Suggest the appropriate individual digital safety & protection products to clients
- Identify and repair damage done from this kind of fraud
- Know the resources and tips to use when applying security
- Apply the knowledge you’ve learned to various case scenarios
Course Outline:
Identity Theft Programs
- Insured vs. non-insured programs
- Proactive vs. Reactive Programs
- Standalone programs
Comprehensive Coverage Review
- Remediation
- Monitoring
- Alerts
- Digital Footprints
- PII & PHI
- IP address monitoring
- Deceased family members
- Mobile Apps
Why Identity Theft Programs as an Employee Benefit
- How do they protect employees?
- How do they protect and benefit the company?
- Recruitment & Retention
- Employee Productivity
- Absenteeism & Presenteeism
The “Insurance Policy”
- What does it specifically cover?
- What are the exclusions
- What to look for
Review What Your Learned
- Exercises
- Applying What You Learned
Course Overview:
This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the layers of the Internet which go far
beyond the surface web. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. There are several different ways that ransomware can infect computers. From a risk management perspective, we will share methods to protect company and client data as well as insurance products to financially protect employers. Further discussions on Advanced Threat Intelligence on how to recognize and protect from breaches and financial fraud with proactive prevention methods to protect company assets.
We are seeing Insurance Carriers offer corporate liability insurance rate reductions when a business has internal written Cyber Security protocols and employee training on how to protect company and client data. Insurance professionals will gain an enhanced understanding on how to help clients set-up internal policies and procedures and negotiate and work with Insurance Carriers to secure the best possible coverage and rates for their clients.
Further discussions on your Digital footprint which refers to one’s unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or on digital devices. On the World Wide Web, the internet footprint is the information left behind as a result of a user’s web-browsing and stored as cookies. This creates vulnerability to an individual person, business, clients and other organizations. We will discuss risk management and mitigation protocols as well as the implementation of insurance programs to financially protect organizations. Information on Identity theft protection programs as part of the overall employee benefit program and business protection insurance.
Learning Objectives:
- After completing this workshop, you will be able to:
- Understand the definitions and statistics of the Dark Web
- Be aware of how fraudsters gain access to information and hold company data hostage
- Providing information on your “Digital Footprint” and how that puts your business at risk
- Discussions on Cyber Anonymity
- Know the resources and tips to use when applying security
- Apply the knowledge you’ve learned to various case scenarios
Course Outline:
Risk Mitigation & Protection
- World Wide Web
- The Surface Web
- The Deep Web
- The Dark Web
- How the Web layers works
- Anonymous browsers
- Search engines
- Chatrooms
- Forums
- Dangers and precautions
Cyber anonymity to reduce risk exposure
- The Onion Router: “TOR”
- Invisible Internet Project: “I2P”
- Using the right protocols
Data Theft
- Ransomware
- Extortionware
- Malware
Digital Footprint
- What you leave behind and what is at risk
- How to protect personal, business and client information
- How to insure your risk
- Biometrics
- Retina scans
- Thump prints
- Voice recognition
- Facial recognition
- Risks associated with biometrics
Child Identity Theft
- How it Happens
- How to Recognize
- How to Prevent
- Can children have insurance
Identity Protection Products
- Employee benefit programs
- Employer risk management programs
- What to look for in a product
- How to select the right insurance program
- Embedded programs
- Corporate Liability Coverage
Review What Your Learned
- Exercises
- Applying What You Learned
Course Overview:
This one hour continuing education and certification program will impart, to licensed insurance agents, risk managers, consultants and other individuals, in-depth knowledge of the layers of a cyber security insurance
policy. This module will review what is and is not covered, what to look for, how to negotiate removal of certain exclusions and how to negotiate what to include.
Learning Objectives:
After completing this workshop, you will be able to:
- Understand the definitions of a cyber insurance policy
- What to be aware of relative to exclusions
- How to negotiate coverage and cost
- How to select the right carrier and coverage
Course Outline:
What The Typical Policy Covers
- Legal Expenses
- IT Forensics
- Negotiation of ransomware payment
- Data restoration
- Breach notifications to customers
- Public relations expertise
- Credit monitoring and Identity Restoration for customers
What The Typical Policy Does Not Cover
- Cyber insurance policies generally do not cover
- Potential future lost profits
- Loss of value due to theft of your Intellectual Property
- The cost to improve internal technology systems
- The cost to upgrade any software or security patch’s after a cyber event
What is the Typical cost of Cyber Insurance
- Your reputation
- Your customer retention
- First-Party and Third-party policies
- Older vs. new cyber insurance policies
What to Look For in a Policy
- Cyber extortion coverage
- Data recovery services
- Cyber business interruption
- Hacker demand negotiations
- Hacker demand reimbursement