Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Course Details

Computer Security (Course Id 1344)

QAS / Registry
  Add to Cart 
Author : Jae K. Shim, Ph.D., CPA
Course Length : Pages: 111 ||| Review Questions: 30 ||| Final Exam Questions: 45
CPE Credits : 9.0
IRS Credits : 0
Price : $80.95
Passing Score : 70%
Course Type: NASBA QAS - Text - NASBA Registry
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 1344

Description :

The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats.  Security concerns have heightened in the recent years.  Weak computer security and lack of internal controls increases an organization's vulnerability. The major steps in understanding and managing computer security are discussed in this course, and helps business executives identify resources in their organizations that need to be protected. 

Usage Rank : 0
Release : 2020
Version : 1.0
Prerequisites : None.
Experience Level : Overview
Additional Contents : Complete, no additional material needed.
Additional Links :
Advance Preparation : None.
Delivery Method : QAS Self Study
Intended Participants : Anyone needing Continuing Professional Education (CPE).
Revision Date : 05-Jan-2021
NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
Approved Audience :

NASBA QAS - Text - NASBA Registry - 1344

Keywords : Computer Software & Applications, Computer, Security, cpe, cpa, online course
Learning Objectives :

Chapter 1
Organizational Policy

After completing this section, you should be able to:
    1. Identify requirements of the organizational security policies.
    2. Recognize the three levels of security.
    3. Recognize proper security safeguards.

Chapter 2
Physical Security and Data Preservation

After completing this section, you should be able to:
    1. Recognize the different lines of defense for a computer system.
    2. Identify environmental considerations as they apply to computer security.
    3. Recognize the components of a maintenance log.
    4. Identify computer access controls for software and data files.

Chapter 3
Hardware Security

After completing this section, you should be able to:
    1. Identify some of the most common hardware problems.
    2. Identify how data integrity may be threatened.
    3. Recognize some hardware security devices used to protect the computer system.

Chapter 4
Software Security Introduction

After completing this section, you should be able to:
    1. Identify top security related products in use.
    2. Recognize different types of viruses and security threats.
    3. Recognize the uses of firewall security systems.

Chapter 5
Personnel Security

After completing this section, you should be able to:
    1. Identify prerequisites for sensitive personnel positions.
    2. Recognize the value of an employee performance evaluation system and components of a training system.
    3. Identify security issues posed by terminated employees.

Chapter 6
Network Security

After completing this section, you should be able to:
    1. Recognize network tools used to implement security plans.
    2. Identify the tools and techniques used by saboteurs.

Chapter 7
Security Policy

After completing this section, you should be able to:
    1. Identify questions that policy makers should answer when designing a security system.
    2. Recognize activities conducted as part of the risk analysis and management.
    3. Recognize human factor threats for security.

Chapter 8
Contingency Planning

After completing this section, you should be able to:
    1. Recognize the types of disruptions in computer processing.
    2. Recognize components of a contingency plan.
    3. Identify fire safety preventive plans.

Chapter 9
Auditing and Legal Issues

After completing this section, you should be able to:
    1. Identify the scope of internal and external security auditing.
    2. Recognize the audit trail to identify unusual activities.
    3. Recognize control techniques.
    4. Identify EDI security risks.

Chapter 10
Computer Crime, Cyberfraud, and Recent Trends

After completing this section, you should be able to:
    1. Recognize penalties of the US Computer Fraud and Abuse Act.
    2. Identify major issues regarding computer crimes and privacy issues.
    3. Identify new certificate programs in computer security.
Course Contents :

Chapter 1:   Organizational Policy

Learning Objectives:

Introduction

Organizational Policy

Security Administration

Establishing a Security Policy

The Security Administrator

Final Consideration

Chapter 1 Review Questions

Chapter 2:   Physical Security and Data Preservation

Learning Objectives:

Computer Facilities

Environmental Considerations

Protecting Information

Controlling Access

Hardware Security

Software and Devices for Physical Security

Chapter 2 Review Questions

Chapter 3:   Hardware Security

Learning Objectives:

Physical Security

Data Integrity

Deploying a Security System

VPN Solution

Smart Cards

eToken

Biometrics

Intrusion Prevention Systems (IPS)

Laptop Security

Summary

Chapter 3 Review Questions

Chapter 4:    Software Security Introduction

Learning Objectives:

Security Breaches

What is a Virus?

Ransomware

What is a Firewall?

What is Authentication?

What is Encryption?

Public/Private Key Technology in Online Trading

Digital Signatures

Public Key Infrastructure (PKI)

Kerberos

Pretty Good Privacy

The Orange Book

Internet Security Market

Security Protocols

Virtual Private Networks

Doing Business over the Internet

Email Security

Hacked Email

Summary

Chapter 4 Review Questions

Chapter 5:    Personnel Security

Learning Objectives:

Screening

Legal Agreements

Training New Employees

Performance Appraisal

Exit Procedures

Chapter 5 Review Questions

Chapter 6:    Network Security

Learning Objectives:

Passwords

Saboteur's Tools

Considerations in Designing Networks

Secure Sockets Layer

Firewalls

Pretty Good Privacy (PGP)

Vulnerability Testing Using Automated Tools

Protecting a Network from Ransomware

Conclusion

Chapter 6 Review Questions

Chapter 7:    Security Policy

Learning Objectives:

Managing Computer Security

Creating the Policy and the Plan

Risk Analysis and Management

The Security Administrator

The Human Factor

Account Administration

Conclusion

Chapter 7 Review Questions

Chapter 8:    Contingency Planning

Learning Objectives:

The Role of Senior Management

Mobile Device Security and Contingency Planning

The Contingency Planning Committee

Areas to Cover

Fire Safety

Insurance

Cloud Computing

Conclusion

Chapter 8 Review Questions

Chapter 9:    Auditing and Legal Issues

Learning Objectives:

Security Auditing

Legal Liability in Security Management

Chapter 9 Review Questions

Chapter 10:    Computer Crime, Cyberfraud, and Recent Trends

Learning Objectives:

Computer Crime

Privacy Issues

Tools of Security Management

Other Security Measures

Cloud Computing

Chapter 10 Review Questions

Glossary

CPE Computer Software & Applications Course: https://www.cpethink.com/computer-science-cpa-courses
Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
  
Exam completed on .

Do you want to add the course again?