Information Technology
The courses in this category are included in all CPE plans for CPAs. Once you purchase a CPE plan, you can select any course to take for CPE credit. You can also purchase these courses individually.
Course Name | CPE | Price | Select |
---|---|---|---|
Computer Privacy and Internet Security (v23) – On Demand Webinar
Computer Privacy and Internet Security is a CPE webinar that will help all practitioners keep confidential client data safe and the data of the practice safe. This webinar will define the terms malware, computer virus, computer worms, Trojan horse, spyware, adware and describe how they are used to compromise data. This webinar will describe the function and importance of a network firewall and personal firewall. This webinar will discuss the function of antivirus and anti-spyware software. Finally, this webinar will discuss the importance of safe web surfing and e-mail techniques. Field of Study: Information Technology CPE Hours: 2 |
2 | $44.99 | Buy |
Computer Privacy and Internet Security 2024 – On Demand Webinar
Computer Privacy and Internet Security is a CPE webinar that will help all practitioners keep confidential client data safe and the data of the practice safe. This webinar will define the terms malware, computer virus, computer worms, Trojan horse, spyware, adware and describe how they are used to compromise data. This webinar will describe the function and importance of a network firewall and personal firewall. This webinar will discuss the function of antivirus and anti-spyware software. Finally, this webinar will discuss the importance of safe web surfing and e-mail techniques. Field of Study: Information Technology CPE Hours: 2 |
2 | $44.99 | Buy |
Connecting the Network in Your Practice to the Internet (v23) – On Demand Webinar
Connecting the Network in Your Practice to the Internet is a CPE webinar that will describe how to securely connect the network in your practice to the Internet. This webinar will describe the protocols that are required to connect and share information on the Internet and describe how each station on a private LAN obtains an IP address. This webinar will describe the network devices required to connect to the Internet. Finally, this webinar will describe different broadband technologies that can be used for connecting to the Internet. Field of Study: Information Technology CPE Hours: 2 |
2 | $44.99 | Buy |
Connecting the Network in Your Practice to the Internet 2024 – On Demand Webinar
Connecting the Network in Your Practice to the Internet is a CPE webinar that will describe how to securely connect the network in your practice to the Internet. This webinar will describe the protocols that are required to connect and share information on the Internet and describe how each station on a private LAN obtains an IP address. This webinar will describe the network devices required to connect to the Internet. Finally, this webinar will describe different broadband technologies that can be used for connecting to the Internet. Field of Study: Information Technology CPE Hours: 2 |
2 | $44.99 | Buy |
Information Security – Basic Safeguards for Practitioners (v23) – Self Study Course
All CPAs and Tax Practitioners deal with very sensitive client data. Cybercriminals are highly sophisticated, well-funded, and technologically adept at hacking computers and sealing information. CPAs and tax practitioners are some of their most highly desired targets. Cybercriminals desire the client data of all CPAs and tax practitioners. If these cybercriminals can successfully obtain the client information of CPAs and tax practitioners, they can file fraudulent tax returns for refunds or commit identify theft. As a result, all CPAs and tax practitioners must protect their client’s information by protecting their computers, networks and by taking some simple safety approaches. This course will define information security, describe the numerous types of threats that exist today and define how to protect your computer systems and networks to keep client data safe. Field of Study: Information Technology CPE Hours: 6 |
6 | $29.95 | Buy |
Information Security – Basic Safeguards for Practitioners 2024 – Self Study Course
All CPAs and Tax Practitioners deal with very sensitive client data. Cybercriminals are highly sophisticated, well-funded, and technologically adept at hacking computers and sealing information. CPAs and tax practitioners are some of their most highly desired targets. Cybercriminals desire the client data of all CPAs and tax practitioners. If these cybercriminals can successfully obtain the client information of CPAs and tax practitioners, they can file fraudulent tax returns for refunds or commit identify theft. As a result, all CPAs and tax practitioners must protect their client’s information by protecting their computers, networks and by taking some simple safety approaches. This course will define information security, describe the numerous types of threats that exist today and define how to protect your computer systems and networks to keep client data safe. Field of Study: Information Technology CPE Hours: 6 |
6 | $29.95 | Buy |
Information Security – Network Security for Internal Control Assurance (v23) – On Demand Webinar
Internal control requires that the information systems in a company are secure, reliable, and can be trusted. Cyberattacks and data breaches represent the greatest threat to most company’s today. Network Security for Internal Control Assurance is a webinar that will describe the importance of network security for all types of businesses and practices. This webinar will identify the vulnerabilities and define safeguards for computers, networks, networking components, software applications, and mobile devices. This webinar will describe the threats that can compromise the computers and company data such as viruses, trojans and phishing. This webinar will describe some simple steps that users can take to properly protect themselves from any threats that penetrate the network and protect confidential company data. Finally, this webinar will discuss how to create a data security plan and an information security risk management plan along with some recommendations and best-practices for keeping networks safe. Field of Study: Information Technology CPE Hours: 4 |
4 | $74.99 | Buy |
Information Security – Network Security for Internal Control Assurance (v23) – Self Study Course
Internal control requires that the information systems in a company are secure, reliable, and can be trusted. Cyberattacks and data breaches represent the greatest threat to most company’s today. Network security for internal control assurance is a course that will describe the importance of network security for all types of businesses and practices. This course will identify the vulnerabilities and define safeguards for computers, networks, networking components, software applications, and mobile devices. This course will describe the threats that can compromise the computers and company data such as viruses, trojans and phishing. This course will describe some simple steps that users can take to properly protect themselves from any threats that penetrate the network and protect confidential company data. Finally, this course will discuss how to create a data security plan and an information security risk management plan along with some recommendations and best-practices for keeping networks safe. Field of Study: Information Technology CPE Hours: 8 |
8 | $39.95 | Buy |
Information Security – Network Security for Internal Control Assurance 2024 – On Demand Webinar
Internal control requires that the information systems in a company are secure, reliable, and can be trusted. Cyberattacks and data breaches represent the greatest threat to most company’s today. Network Security for Internal Control Assurance is a webinar that will describe the importance of network security for all types of businesses and practices. This webinar will identify the vulnerabilities and define safeguards for computers, networks, networking components, software applications, and mobile devices. This webinar will describe the threats that can compromise the computers and company data such as viruses, trojans and phishing. This webinar will describe some simple steps that users can take to properly protect themselves from any threats that penetrate the network and protect confidential company data. Finally, this webinar will discuss how to create a data security plan and an information security risk management plan along with some recommendations and best-practices for keeping networks safe. Field of Study: Information Technology CPE Hours: 4 |
4 | $74.99 | Buy |
Information Security – Network Security for Internal Control Assurance 2024 – Self Study Course
Internal control requires that the information systems in a company are secure, reliable, and can be trusted. Cyberattacks and data breaches represent the greatest threat to most company’s today. Network security for internal control assurance is a course that will describe the importance of network security for all types of businesses and practices. This course will identify the vulnerabilities and define safeguards for computers, networks, networking components, software applications, and mobile devices. This course will describe the threats that can compromise the computers and company data such as viruses, trojans and phishing. This course will describe some simple steps that users can take to properly protect themselves from any threats that penetrate the network and protect confidential company data. Finally, this course will discuss how to create a data security plan and an information security risk management plan along with some recommendations and best-practices for keeping networks safe. Field of Study: Information Technology CPE Hours: 8 |
8 | $39.95 | Buy |
Information Security – Protecting Company Data: Malware Trends and Mitigation Strategies (v23) – Self Study Course
The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware. Field of Study: Information Technology CPE Hours: 6 |
6 | $29.95 | Buy |
Information Security – Protecting Company Data: Malware Trends and Mitigation Strategies 2024 – Self Study Course
The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware. Field of Study: Information Technology CPE Hours: 6 |
6 | $29.95 | Buy |
Information Security – Safeguards to Protect Client Data (v23) – On Demand Webinar
All CPAs and Tax Practitioners deal with very sensitive client data. Cybercriminals are highly sophisticated, well-funded, and technologically adept at hacking computers and sealing information. CPAs and tax practitioners are some of their most highly desired targets. Cybercriminals desire the client data of all CPAs and tax practitioners. If these cybercriminals can successfully obtain the client information of CPAs and tax practitioners, they can file fraudulent tax returns for refunds or commit identify theft. As a result, all CPAs and tax practitioners must protect their client’s information by protect their computers, networks and taking some simple safety approaches. This webinar will define information security, describe the numerous types of threats that exist today and define how `to protect your computer systems and networks to keep client data safe. Field of Study: Information Technology CPE Hours: 1 |
1 | $24.99 | Buy |
Information Security – Safeguards to Protect Client Data 2024 – On Demand Webinar
All CPAs and Tax Practitioners deal with very sensitive client data. Cybercriminals are highly sophisticated, well-funded, and technologically adept at hacking computers and sealing information. CPAs and tax practitioners are some of their most highly desired targets. Cybercriminals desire the client data of all CPAs and tax practitioners. If these cybercriminals can successfully obtain the client information of CPAs and tax practitioners, they can file fraudulent tax returns for refunds or commit identify theft. As a result, all CPAs and tax practitioners must protect their client’s information by protect their computers, networks and taking some simple safety approaches. This webinar will define information security, describe the numerous types of threats that exist today and define how `to protect your computer systems and networks to keep client data safe. Field of Study: Information Technology CPE Hours: 1 |
1 | $24.99 | Buy |