About This Course

90 Days Online Access
24/7 Access to All Training Material
4-5 Hours Per Module
Self Paced Entirely Online
Online Academy
Delivered Entirely Online
40 CPD Points
Approved by Various Bodies
Continual Module Related Exams
Course Accessible Anytime
Self Paced Learning

CCRS Course - 1 Min 

Write your awesome label here.
The CCRS – Certified Cyber Risk Specialist course equips students with a comprehensive understanding of cyber risk management. The syllabus assumes a non-technical student and covers a range of topics from identification of cyber risks through to risk management options. The course has been designed to equip students with the knowledge, skills and confidence they require in order to protect the digital assets of their organisation and support the efforts of or lead the implementation of a cyber risk framework. 
The CCRS course and certification is completely aligned with the CCRO - Certified Cyber Risk Officer syllabus. The main difference is in relation to the format. There are no live ILT (Instructor Led Training) sessions or assignments on the CCRS course. Students learn at their own pace over a 90 day period and complete online exams at the end of each module. 

Our Partners 

More Info

What Does The Course Cover?

“Learn how to understand, manage and communicate cyber risk strategically within an organisation”

This course presumes no technical knowledge and brings students on a journey from understanding the cyber threat landscape to how to develop an appropriate cyber strategy for their organisation.

Referencing real life case studies and supported with pragmatic examples of how to manage cyber risk within an organisation the course path includes key learning objectives, that students can instantly apply and benefit from in their existing roles.

All students receive one to one feedback and support directly from the tutor on a weekly basis along with live group training sessions supported by continual assessments via online exams.

“If you are on a board or report to senior leaders in relation to cyber risk, this course is ideal for you”

Explore The Modules



Write your awesome label here.
We explore the cyber threat landscape and gain an understanding of the key threat actors, their motivations and techniques. We review a number of high profile cyber attacks with a view to understanding why they were attacked and what could have been done to prevent the breach.  We outline a key “Case Study” example that is referenced through the rest of the course.



Write your awesome label here.
We outline the importance and the anatomy of a cyber strategy. How a cyber risk framework operates and how it integrates with the organisation. Understand the differences between standards, policies, procedures, legal and regulatory controls.  We outline how to identify the business value chain of an organisation and the importance of business systems, assets and entities that support that channel. 



Write your awesome label here.
We explore the traditional cyber metrics organisations leverage in relation to cyber security and risk and discuss “Meaningful Metrics” that empower the business. Calculating inherent cyber risk, residual cyber risk and aligning those metrics with business objectives. Informing and supporting the business with KPI’s (Key Performance Indicators) and KRI’s (Key Risk Indicators). Leveraging those metrics to develop appropriate maturity roadmaps and report and alert the business. 



Write your awesome label here.
The role of leadership, the governance structure and supporting processes are outlined. The challenge of resourcing, attracting new and developing in-house talent.  Establishing a culture of loyalty and business protection.  Identifying gaps in leadership and supporting  a meritocracy based on talent and ability.  Converging the physical security efforts with cyber to deliver a holistic program of protection for your organisation.



Write your awesome label here.
Understanding the complex myriad of cyber related laws, regulations and business requirements is a challenge. In this module, we outline International landscape of key laws and regulations including GDPR and the NIS Directive. Developing an approach to understanding how to identify what is relevant and may impact your current or future business model. We outline key approaches to identifying the nexus of control requirements and driving efficiency by aligning business, legal and regulatory drivers with business drivers.



Write your awesome label here.
We outline the minimum expectations of regulators when it comes to establishing cyber resilience.  Understanding preventative, detective and responsive controls. Best practices in aligning business continuity, disaster recovery and incident response with a program of cyber resilience. We outline the appropriate response to a breach. We focus on key aspects such as detection, communication and containment. We leverage the case study to outline the key aspects and learning points such as proactive strategies to detect an incident and containment strategies to mitigate the impact. 



Write your awesome label here.
Every business is comprised of a business value chain. That is the various “links” or parts of the business that support the delivery of a particular service or channel. These links are often provided by third party partners, vendors or remote workers. We explore, how to identify, analyse, manage and report the associated risk to the business. The impact of the paradigm shift in the legal landscape including GDPR and how that factors into your approach. 



Write your awesome label here.
In this module, we outline how to put everything you have learned together. Students leverage the case study or their own organisations to develop a complete cyber risk strategy. Dissecting the Cyber DNA of the business, establishing key metrics and a maturity roadmap. Aligning with the business strategy and establishing a board level reporting process. Developing processes to measure and manage the implementation of the cyber risk strategy and report the RoI to the business. 

The Course is For?

The course syllabus has been specifically designed to be collaborative and bring together business leaders of various disciplines within an organisation. They are the key stakeholders in designing, implementing or supporting the cyber risk management program of an organisation. Key cyber risk management stakeholders include:

  • C-Suite
  • Head of IT/Security
  • CCO Chief Compliance Officer
  • Cyber Security/Risk/Compliance Teams
  • Legal
  • Procurement
  • Head of Business Units
  • Technology Leaders / Project Managers
  • Management Professionals / Team Leaders
  • Digital Consultants
Cyber Risk Leader
Develop and Implement Strategy
Gaining Recognition
Cyber Risk Management Specialist
Cyber Security and Risk Teams
Collaborate and Support Enterprise

How Do You Learn?

The course is delivered entirely online. Students are provided with 90 days access to all the training material and exams.  
Training material comprises of rich interactive media such as videos, infographics and course notes. 
There are many opportunities for collaborative learning via the discussion forums and you can leverage the portal to connect to other students around the world. 
There are 8 modules with an online exam at the end of each module. The pass score for each module is 80% and you have to obtain an average score of 80% or higher across all modules to be successfully certified. 
You can re-sit each of the module exams three times if required during your 90 days. 

What Support Do I Get?

Head Tutor
Subject Expert
Course Manager
One to One Student Support
Technical Support
Available to Solve Tech Issues
Social Learning
Student Network Collaboration
Extended Network of Material
Recommended External Material
Core Module Videos Have Captions

Head Tutor

Paul C Dwyer – President of the ICTTF International Cyber Threat Task Force

Paul C Dwyer is recognised as one of the world’s foremost experts on cyber security, risk and privacy. As CEO of Cyber Risk International he specialises in corporate and enterprise security, development of cyber defence programs, and business operations protection for CRI clients. As founder and President of the ICTTF International Cyber Threat Task Force he is an advocate for diversity in the industry and leads a community of over 30,000 with a common goal to defeat cyber evil.
Certified an industry professional by the International Information Security Certification Consortium (ISC2) and the Information System Audit and Control Association (ISACA). Approved by the National Crime Faculty and the HTCN High Tech Crime Network. He has worked extensively around the world his diverse career spans more than 30 years working with military, law enforcement and the commercial sector.
Roles have included:
  • President of the ICTTF International Cyber Threat Task Force
  • Co Chairman of the UK NCA National Crime Agency Industry Group
  • Advisor to NaCTSO (National Counter Terrorism Security Office)
  • Advisor to NATO on Countering Hybrid Cyber Threats
  • Advisor to UK Defence Committee DEFCOM in Parliament
  • Deputy Chair – Organised Crime Task Force Industry Group – NI
  • Interim Global CISO for numerous multi national organisations
  • Advisor to numerous governments and intelligence agencies
“An eye opening course bringing to life exactly what a CISO is and maybe more importantly what is isn’t. Many lightbulb moments that will help refocus how to better align security with the business, and what it takes to be successful.” Mark Conabeare – CISO Debenhams

“An eye opener giving a global picture backed up with real world examples, Great Knowledge.” Shane O’Reilly – Head of IT – Total Produce

What Our Students Say

Write your awesome label here.

Jennifer O’Brien

Lead in Group Internal Audit, Bank of Ireland
Write your awesome label here.

Dr Vince Hughes

Director, Crime Stoppers International
Write your awesome label here.

Stephen McCormack 

Head of IT, Maxol
Write your awesome label here.

Audrey Barrett

Data Protection Officer, SIPTU

CCRS/CCRO curriculum provides a great introductory macro-level overview into the field of cybersecurity. The modules are well-structured, easy to digest and can be covered at one's own pace.  

Alex Burnham
Analyst - 
Blue Umbrella Ltd

Excellent course, very informative and materials which provide a good foundation for implementing cyber risk awareness and frameworks into a business.  

Kerry Barber
Head of Compliance & Risk - 
Barbon Insurance Group Limited

The course was engaging and the supporting materials were invaluable in pulling it all together. The pace of the course was just right and Paul's presenting style makes even the "dry" bits of the course interesting. 

Lynn-Marie Denyer
Hurricane Energy plc - 
Compliance Manager

Mr. Dwyer is an excellent tutor and I especially appreciated all of the real world examples that were provided to give additional perspective. The key term definitions at the back of each module were helpful in understanding the IT jargon as was the case study.  

Bridget Dervish
Manager of Operational Due Diligence -
State Board of Administration of Florida


How Do I Get Certified?

Successful certification depends on a number of factors. Your application includes an evaluation of your professional experience and if you are accepted you are enrolled for the online course.
If you meet all the certification requirements which includes adoption of the ICTTF Code of Ethics and successful performance on the required curriculum and competency evaluation, you will be certified and entitled to all of the rights and privileges associated with the designation. You need to re-certify every three years.
Certification is by the board of the ICTTF International Cyber Threat Task Force and accredited by the ICA International Compliance Association.

What is a Cyber Risk Specialist?

The Cyber Risk Specialist course equips students with a comprehensive understanding of cyber risk management. The syllabus assumes a nontechnical student and covers a range of topics from identification of cyber risks through to risk management options.
The course has been designed to equip students with the knowledge,skills and confidence they require in order to protect the digital assets of their organisation and support the efforts of or lead the implementation of a cyberrisk framework.

What Does The Course Equip Students?

A comprehensive understanding of cyber risk management.

Will It Help My Career?

There is a Global IT security skills shortages and it has now surpassed four million according to a recent industry survey. The number of unfilled positions now stands at 4.07 million professionals, up from 2.93 million this time last year. This includes 561,000 in North America and a staggering 2.6 million shortfall in APAC. The shortage of skilled workers in the industry in Europe has soared by more than 100% over the same period, from 142,000 to 291,000.
The global security workforce needs to increase by a staggering 145% to cope with a surge in hiring demand. In Europe, this has come particularly in smaller companies with one-99 employees, as well as those with over 500 employees.
In the report, over half (51%) of cybersecurity professionals said their organisation is at moderate or extreme risk due to staff shortages.

Do I need to have a Cyber Security Background?

No. The syllabus has been developed for a non-technical audience. When technical concepts are referenced in any way, they are fully explained.
It is assumed that you have very limited IT technical knowledge. This course is for business leaders and provides them with the knowledge, skill and confidence to liaise with technical subject matter experts by demystifying the jargon and concepts.

How Do I Recertify?

A CCRO Certification lasts for three years from the date awarded. From June 2023 a recertification exam will be available online at www.icttf.org. There will be a fee of €500 for the recertification exam or any resits required.
If students elect to recertify by re-enrolling in the course, they have that option and will receive €500 discount off the cost of the CCRO course.

What is the Course Format?

CCRS (Certified Cyber Risk Specialist) course is delivered entirely online, recorded videos, downloadable case books and interactive material.

Course Overview

It is a 3 month course with 24/7 access to all training material.
Certified Cyber Risk Specialist course is completely aligned with the format and material of the CCRO course. The main difference is in the CCRS course, you do not partake in the live ILT (Instructor Led Training) sessions, assignments or have access to the bonus training material modules.
It is advised  for the student to make an estimated commitment of 4-5 hours for each module.

What is the Pass Mark and How Does the Scoring Work?

There are 8 modules with an online exam at the end of each module.The pass mark for successful certification on the CCRO course is 80%
The pass score for each module is 80% and you have to obtain an average score of 80% or higher across all modules to be successfully certified.

What are the CCRS Key Dates and Times?

The CCRS course does not have set dates to start, you may begin shortly from when you purchase.

What is the Cancellation Policy?

Registration: A booking online reserves your place, this does not guarantee your place. Only *payment in full of the course fees will guarantee your place. You will be sent a registration email to complete your profile once payment in full has been received.
Installment Payment Option: If a student has elected to pay by instalments, they are fully committed and legally obligated to pay ALL instalments outlined.
Course Cancellation: Due to unforeseen circumstances, ICTTF Ltd may be compelled to cancel the course at short notice. In such circumstances, registrants will be entitled to a full refund of their course fee, or the course fee can be credited towards a future course.

Notice of a registrant’s intention to cancel their registration must be made in writing (sales@ICTTF.org ) to ICTTF Ltd. In such cases, registrants will have the following options:

1) Nominate a replacement to attend in their place. Such notice must be made in writing at least 5 days before the commencement of the course.

2) Defer to a course commencing at a later date. Such notice must be made within 10 days of the commencement of the course and is subject to availability.

Registrants who fail to attend the course will be charged 100% of the full fee.


Where a registrant who has to cancel nominates a suitable replacement to attend in their place, no cancellation penalty will be incurred unless the registrant has already started the course. The suitable replacement must meet the Entry Requirements for the


Fees: Participants wishing to transfer to a later date will be billed a 10% administration fee plus any increase in the price of the course.  

Participants who started the course and wants to nominate a replacement will be billed a 10% administration fee plus any increase in the price of the course.
Changes to Course: ICTTF Ltd. reserves the right to change course content, structure, lecturers and dates.

Where Are the Terms and Conditions?

Please follow this link to the Cyber Risk Academy terms and conditions: Terms and Conditions

Where Will my Certified Qualification be Recognized?

Our cyber risk certifications are recognized globally. This course has been accredited and benefits from dual certification by the International Compliance Association (ICA) and other respected bodies.