View as:

Course Name CPE Price Select
Information Security – Basic Safeguards for Practitioners – Self Study Course

All CPAs and Tax Practitioners deal with very sensitive client data. Cybercriminals are highly sophisticated, well-funded, and technologically adept at hacking computers and sealing information. CPAs and tax practitioners are some of their most highly desired targets. Cybercriminals desire the client data of all CPAs and tax practitioners. If these cybercriminals can successfully obtain the client information of CPAs and tax practitioners, they can file fraudulent tax returns for refunds or commit identify theft. As a result, all CPAs and tax practitioners must protect their client’s information by protecting their computers, networks and by taking some simple safety approaches. This course will define information security, describe the numerous types of threats that exist today and define how to protect your computer systems and networks to keep client data safe.

Field of Study: Information Technology - Self Study

CPE Hours: 6

6 $47.94 Buy
Information Security – Network Security for Internal Control Assurance – Self Study Course

Internal control requires that the information systems in a company are secure, reliable, and can be trusted. Cyberattacks and data breaches represent the greatest threat to most company’s today. Network security for internal control assurance is a course that will describe the importance of network security for all types of businesses and practices. This course will identify the vulnerabilities and define safeguards for computers, networks, networking components, software applications, and mobile devices. This course will describe the threats that can compromise the computers and company data such as viruses, trojans and phishing. This course will describe some simple steps that users can take to properly protect themselves from any threats that penetrate the network and protect confidential company data. Finally, this course will discuss how to create a data security plan and an information security risk management plan along with some recommendations and best-practices for keeping networks safe.

Field of Study: Information Technology - Self Study

CPE Hours: 8

8 $63.92 Buy
Information Security – Protecting Company Data: Malware Trends and Mitigation Strategies – Self Study Course

The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware.

Field of Study: Information Technology - Self Study

CPE Hours: 6

6 $47.94 Buy