Skip to product information
1 of 1
Regular price $219.00 USD
Regular price Sale price $219.00 USD
Sale Sold out
View full details

Complete the Digital Transformation: Advanced Security course and, optionally, get accredited as a Certified Digital Transformation Security Specialist by passing the certification exam. You can purchase the course now and get the exam later, or you can get them together at a discount as part of the Certification Bundle.

Upon completing the course you will receive a digital certificate of completion, as well as a digital training badge from Acclaim/Credly. Because this course encompasses multiple certifications, upon passing the exam you will also receive official Digital Transformation Specialist, Digital Transformation Security Professional and Digital Transformation Security Specialist digital accreditation certificates and certification badges from Acclaim/Credly, along with an account that can be used to verify your certification status.

If you already completed Modules 1, 2, 4 and 15 in this certification track, you can purchase a partial course (or a partial bundle) with only the modules specific to the Digital Transformation Security Specialist track here.

The Digital Transformation: Advanced Security course is comprised of the following 6 course modules, each of which has an estimated completion time of 10 hours:

  • Module 1: Fundamental Digital Transformation
  • Module 2: Digital Transformation in Practice
  • Module 4: Fundamental Blockchain
  • Module 7: Blockchain Architecture
  • Module 15: Fundamental Cybersecurity
  • Module 16: Advanced Cybersecurity

Choose the Certification Bundle to receive the entire course together with the online-proctored certification exam and a set of practice exam questions, all at a bundle discount.

Upon purchasing this course, you will automatically receive access via the Online Interactive eLearning platform. To provide you with the greatest flexibility, you will also have the option to access the course materials via two additional eLearning formats, at no extra cost. All three eLearning formats are briefly described below. A more detailed comparison can be found here.
  1. For everyday learning: An online interactive eLearning platform with individual lessons, as well as interactive and automatically graded exercises and practice questions.
  2. For learning on-the-go: A study kit platform with access to full course documents that support online/offline synching, annotations, comments, custom bookmarks and cross-document searches.
  3. For your reference: A set of printable PDF documents that you can keep (for all course workbooks and posters).
All three forms of access are subject to Arcitura’s *. Upon purchase, access to the online interactive eLearning platform (1) is provided within one business day. Access to the study kits (2) and the PDF documents (3) is provided upon request.

Shown below are the digital contents and the topic outline for each course module:

Module 1: Fundamental Digital Transformation

This course module provides an easy-to-understand introduction to Digital Transformation and how it relates to business, technology, data and people. Coverage includes the benefits, risks and challenges of Digital Transformation, as well as its business and technology drivers.

Course Module Contents

  • Workbook Lessons (100+ pages)
  • Video Lessons (for all topics)
  • Mind Map Poster

  • Symbol Legend Poster
  • Practice Exam Questions
  • PDFs of Workbook and Posters (printable)

Topics Covered

  • Understanding Digital Transformation
  • Benefits of Digital Transformation
  • Challenges of Digital Transformation
  • Digital Transformation Business and Technology Drivers
  • Understanding Customer-Centricity
  • Product-Centric vs. Customer-Centric Relationships
  • Relationship-Value Actions and Warmth
  • Omni-Channel Customer Interactions
  • Customer Journeys and Customer Data Intelligence

  • Data Intelligence Basics
  • Data Origins and Data Sources
  • Data Collection Methods and Data Utilization Types
  • Intelligent Decision-Making
  • Computer-Assisted Manual Decision-Making and Conditional Automated Decision-Making
  • Intelligent Manual Decision-Making vs. Intelligent Automated Decision-Making
  • Direct-Driven Automated Decision-Making and Periodic Automated Decision-Making
  • Realtime Automated Decision-Making

Module 2: Digital Transformation in Practice

This course module delves into Digital Transformation automation environments by exploring the key contemporary technologies used to build Digital Transformation Automation solutions, including AI, RPA, IoT, machine learning, blockchain, cloud computing and big data.

Course Module Contents

  • Workbook Lessons (100+ pages)
  • Video Lessons (for all topics)

  • Mind Map Poster
  • Practice Exam Questions
  • PDFs of Workbook and Poster (printable)

Topics Covered

  • Distributed Solution Design Basics
  • Data Ingress Basics, including File Pull, File Push, API Pull, API Push and Data Streaming
  • An Introduction to Digital Transformation Automation Technologies
  • Cloud Computing Basics and Cloud Computing as part of Digital Transformation Solutions
  • Common Cloud Computing Risks and Challenges
  • Blockchain Basics and Blockchain as part of Digital Transformation Solutions
  • Common Blockchain Risks and Challenges
  • Internet of Things (IoT) Basics and IoT as part of Digital Transformation Solutions
  • Common IoT Risks and Challenges
  • Robotic Process Automation (RPA) and RPA as part of Digital Transformation Solutions
  • Common RPA Risks and Challenges

  • An Introduction to Digital Transformation Data Science Technologies
  • Big Data and Data Analytics and Big Data as part of Digital Transformation Solutions
  • Common Big Data Risks and Challenges
  • Machine Learning Basics and Machine Learning as part of Digital Transformation Solutions
  • Common Machine Learning Risks and Challenges
  • Artificial Intelligence (AI) Basics and AI as part of Digital Transformation Solutions
  • Common AI Risks and Challenges
  • Inside a Customer-Centric Digital Transformation Solution (a comprehensive, step-by-step exploration)
  • Mapping Individual Digital Transformation Technologies to Solution Processing
  • Tracking how Data Intelligence is Collected and Used in a Digital Transformation Solution

Module 4: Fundamental Blockchain

This course module provides a clear, end-to-end understanding of how blockchain works. It breaks down blockchain technology and architecture in easy-to-understand concepts, terms and building blocks. Industry drivers and impacts of blockchain are explained, followed by plain English descriptions of each primary part of a blockchain system and step-by-step descriptions of how these parts work together.

Course Module Contents

  • Workbook Lessons (100+ pages)
  • Video Lessons (for all topics)
  • Mind Map Poster
  • Symbol Legend Poster

  • Blockchain Models Poster
  • Consensus Types Poster
  • Practice Exam Questions
  • PDFs of Workbook and Posters (printable)

Topics Covered

  • Benefits and Challenges of Blockchain
  • Blockchain Business Drivers and Technology Drivers
  • Understanding Blockchain’s Decentralized Model
  • Blockchain Value Propositions
  • How Blockchain Can be Used for Different Industries
  • Blockchain Applications, Networks and the Distributed Ledger
  • How the Distributed Ledger Can Relate to Relational Database
  • Fundamental Components of a Blockchain Architecture
  • Transactions, Records and Pools
  • Blocks, Chains and Block Headers
  • Blockchain Users, Full Nodes and Partial Nodes

  • Step-by-Step Understanding of the Record and Block Lifecycle
  • Step-by-Step Understanding How the Merkle Tree Works
  • Step-by-Step Understanding of How Consensus Works
  • Consensus Algorithms (PoW, PoS, PoA, DPoS, LPoS, PoI, PoET, PoC, PoB, Round Robin)
  • Public vs. Private / Permissionless vs. Permissioned Blockchains
  • Coins, Tokens, Smart Contracts
  • Basics of Crypto Hashing and Cryptography
  • On-Chain, Off-Chain and Cross-Chain Activity
  • Understanding Soft Forks and Hard Forks
  • Common Blockchain Metrics

Module 7: Blockchain Architecture

This course module delves into blockchain technology architecture and the inner workings of blockchains by exploring a series of key design patterns, techniques and related architectural models, along with common technology mechanisms used to customize and optimize blockchain application designs in support of fulfilling business requirements.

Course Module Contents

  • Workbook Lessons (100+ pages)
  • Video Lessons (for all topics)
  • Mind Map Poster

  • Patterns and Mechanisms Poster
  • Practice Exam Questions
  • PDFs of Workbook and Posters (printable)

Topics Covered

  • Common Blockchain Technology Mechanisms and Artifacts
  • Node Monitor, Automated Node Deployer, Node Placement Monitor
  • Consensus Processor, Block Maker, Identity Federator
  • Hashing Engine, Chaining Engine, Identity Verifier, Wallet
  • Node Repository, Ledger Replicator, Live Node Migrator
  • Integrity and Validation Blockchain Design Patterns
  • Block Singleton, Sidechain, Block Validation Consensus

  • Scalability and Reliability Blockchain Design Patterns
  • Auto-Scaling Nodes, Guaranteed Minimum Full Nodes
  • Geo Scaling, Block Size Update
  • Security and Privacy Blockchain Design Patterns
  • Forced On-Chain Transactions, Federated Chain
  • User Data Protection
  • Utility Blockchain Design Patterns
  • Transaction Record Tagging
  • Lightweight Node, Node Task Abstraction

Module 15: Fundamental Cybersecurity

This course module covers essential topics for understanding and applying cybersecurity solutions and practices. The module begins by covering basic aspects of cybersecurity and then explains foundational parts of cybersecurity environments, such as frameworks, metrics and the relationship between cybersecurity and data science technology.

Course Module Contents

  • Workbook Lessons (100+ pages)
  • Video Lessons (for all topics)

  • Mind Map Poster
  • Practice Exam Questions
  • PDFs of Workbook and Poster (printable)

Topics Covered

  • History of Asset Protection
  • Cybersecurity Business and Technology Drivers
  • Cybersecurity Goals and Benefits
  • Risks and Challenges of Adopting Cybersecurity
  • Cybersecurity Protection Characteristics and Functions
  • Common Cyber Threat Terminology
  • Cybersecurity Framework Components

  • Digital Risk Assessment and Management
  • Common Cybersecurity Industry Standards and Frameworks
  • Cybersecurity and Machine Learning
  • Cybersecurity and Artificial Intelligence
  • Cybersecurity Resilience, Risk Assessment and
    Effectiveness Metrics

Module 16: Advanced Cybersecurity

This course module delves into the building blocks of cybersecurity solution environments and further explores the range of cyber threats that cybersecurity solutions can be designed to protect organizations from. Topics include cybersecurity technology mechanisms that represent the common components that comprise cybersecurity solutions, formal processes and procedures used to establish sound practices that utilize the mechanisms, as well as common cyber threats and attacks and how they can be mitigated using the previously described mechanisms and processes.

Course Module Contents

  • Workbook Lessons (100+ pages)
  • Video Lessons (for all topics)
  • Mind Map Poster
  • Mechanisms and Threats Mapping Poster
  • Processes and Threats Mapping Poster

  • Mechanisms and Processes Mapping Poster
  • Metrics and Monitors Mapping Poster
  • Metrics and Processes Mapping Poster
  • Practice Exam Questions
  • PDFs of Workbook and Posters (printable)

Topics Covered

  • 15 Cybersecurity Mechanisms (including Honeypots, Biometric Scanners, Intrusion Detection, Malicious Code Analysis and User Behavior Analytics Systems)
  • 9 Cybersecurity Monitoring Mechanisms (including Malware Monitors, Network Intrusion Monitors and Data Loss Protection Monitors)
  • 13 Cybersecurity Processes (including Attack Surface Reduction, Continuous Vulnerability Management and Network Monitoring and Defense)

  • Insider Threat Detection and Incident Response Management
  • Cyber Threat Intelligence and Cyber Attack Motivations
  • 13 Common Cyber Threats and Attacks (including Botnets, Tunneling and Remote Code Execution Attacks and 8 types of Malware)
  • Insider Threats, Social Engineering and Phishing
  • Advanced Persistent Threats (APTs)

Learn About Arcitura: Take the Video Tour

Watch these helpful informational videos to learn about Arcitura programs, courses and certifications.

About Arcitura

About Arcitura Courses

About Arcitura Certifications

What’s in an Arcitura Course


Each course provides a comprehensive curriculum with 2-8 modules and 20-80 hours of training.

More Than Just
Video Lessons

In addition to standard video lessons, courses include full-color workbooks and reference posters for all lessons.

Interactive & Graded

Courses also include interactive and graded exercises, interactive and graded self-tests and other supplements.

The Arcitura Difference


  • is authored by a dedicated courseware development team
  • has a self-test, accreditation exam and professional certification
  • is available via two different eLearning platforms


  • undergo a common development process
  • are authored to be consistent in quality, structure and style
  • share a common vocabulary and symbol notation
  • are authored in collaboration with subject matter experts

Take Your Skills Anywhere

Regardless of whether you are an individual looking to boost your career or an organization looking to up-skill a team, Arcitura courses and certifications provide a sound investment.

Because both courses and accreditations are vendor-neutral, they empower you with skills and credentials that you can take to wherever you need to go.

Professional Instructor-Led Training & Coaching



Contact or 604-904-4100 during PT working hours.