Use Landscape to see Search/Filter
Item Types:
Field of Study:
CPE Hours:
Hide left panel Collapse Menu
Recent Searches
No recent searches found.
Course Details

Computer Security (Course Id 1344)

New / QAS / Registry   Add to Cart 
Author : Jae K. Shim, Ph.D., CPA
Status : Production
CPE Credits : 9.0
IRS Credits : 0
Price : $89.95
Passing Score : 70%
NASBA Technical: No
Primary Subject-Field Of Study:

Computer Science - Computer Science for Course Id 1344

Description :

The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats. Security concerns have heightened in the recent years. Weak computer security and lack of internal controls increases an organization's vulnerability. The major steps in understanding and managing computer security are discussed in this course. The course helps business executives identify resources in their organizations that need to be protected.

Usage Rank : 0
Release : 2016
Version : 1.0
Prerequisites : None.
Experience Level : Overview
Additional Contents : Complete, no additional material needed.
Additional Links :
Advance Preparation : None.
Delivery Method : Self-Study
Intended Participants : Anyone needing Continuing Professional Education (CPE).
Revision Date : 08-Mar-2018
NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
Approved Audience :

NASBA QAS - NASBA Registry - 1344

Keywords : Computer Science, Computer, Security, cpe, cpa, online course
Learning Objectives :

Chapter 1
Organizational Policy

After completing this section, you should be able to:
    1. Identify requirements of the organizational security policies.
    2. Recognize the three levels of security.
    3. Recognize proper security safeguards.

Chapter 2
Physical Security and Data Preservation

After completing this section, you should be able to:
    1. Recognize the different lines of defense for a computer system.
    2. Identify environmental considerations as they apply to computer security.
    3. Recognize the components of a maintenance log.
    4. Identify computer access controls for software and data files.

Chapter 3
Hardware Security

After completing this section, you should be able to:
    1. Identify some of the most common hardware problems.
    2. Identify how data integrity may be threatened.
    3. Recognize some hardware security devices used to protect the computer system.

Chapter 4
Software Security

After completing this section, you should be able to:
    1. Identify top security related products in use.
    2. Recognize different types of viruses and security threats.
    3. Recognize the uses of firewall security systems.

Chapter 5
Personnel Security

After completing this section, you should be able to:
    1. Identify prerequisites for sensitive personnel positions.
    2. Recognize the value of an employee performance evaluation system and components of a training system.
    3. Identify security issues posed by terminated employees.

Chapter 6
Network Security

After completing this section, you should be able to:
    1. Recognize network tools used to implement security plans.
    2. Identify the tools and techniques used by saboteurs.

Chapter 7
Security Policy

After completing this section, you should be able to:
    1. Identify questions that policy makers should answer when designing a security system.
    2. Recognize activities conducted as part of the risk analysis and management.
    3. Recognize human factor threats for security.

Chapter 8
Contingency Planning

After completing this section, you should be able to:
    1. Recognize the types of disruptions in computer processing.
    2. Recognize components of a contingency plan.
    3. Identify fire safety preventive plans.

Chapter 9
Auditing and Legal Issues

After completing this section, you should be able to:
    1. Identify the scope of internal and external security auditing.
    2. Recognize the audit trail to identify unusual activities.
    3. Recognize control techniques.
    4. Identify EDI security risks.

Chapter 10
Computer Crime, Cyberfraud, and Recent Trends

After completing this section, you should be able to:
    1. Recognize penalties of the US Computer Fraud and Abuse Act.
    2. Identify major issues regarding computer crimes and privacy issues.
    3. Identify new certificate programs in computer security.
Course Contents :

Chapter 1:   Organizational Policy

Learning Objectives:


Organizational Policy

Security Administration

Establishing a Security Policy

The Security Administrator

Final Consideration

Chapter 1 Review Questions

Chapter 2:   Physical Security and Data Preservation

Learning Objectives:

Computer Facilities

Environmental Considerations

Wires and Cables

Protecting Information

Controlling Access

Hardware Security

Software and Devices for Physical Security

Chapter 2 Review Questions

Chapter 3:   Hardware Security

Learning Objectives:

Physical Security

Data Integrity

Deploying a Security System

VPN Solution

Security Becomes a Priority

What is a Smart Card?

What is eToken?

What is Biometrics?

Intrusion Prevention Systems (IPS)

Laptop Security


Chapter 3 Review Questions

Chapter 4:    Software Security

Learning Objectives:

Security Breach

What is a Virus?

Illegal Access and Use - Hacking

What is a Firewall?

What is Authentication?

What is Encryption?

Public/Private Key Technology in On-line Trading

What is Digital Signature?

What is a Public Key Infrastructure (PKI)?

What is Kerberos?

What is Pretty Good Privacy?

What was the Orange Book?

Internet Security Market

Security Protocols

What is VPN?

Doing Business over the Internet

E-mail Security


Chapter 4 Review Questions

Chapter 5:    Personnel Security

Learning Objectives:


Legal Agreements

Training New Employees

Performance Appraisal

Exit Procedures

Chapter 5 Review Questions

Chapter 6:    Network Security

Learning Objectives:


Saboteur's Tools

Considerations in Designing Networks

Secure Sockets Layer


Pretty Good Privacy (PGP)

Vulnerability Testing Using Automated Tools


Chapter 6 Review Questions

Chapter 7:    Security Policy

Learning Objectives:

Managing Computer Security

Creating the Policy and the Plan

Risk Analysis and Management

The Security Administrator

The Human Factor

Account Administration


Chapter 7 Review Questions

Chapter 8:    Contingency Planning

Learning Objectives:

The Role of Senior Management

Mobile Device Security and Contingency Planning

The Contingency Planning Committee

Areas to Cover

Fire Safety



Chapter 8 Review Questions

Chapter 9:    Auditing and Legal Issues

Learning Objectives:

Security Auditing

Audit Trail

EDI and Electronic Contracting

Auditing Contingency Plans


Audit Software

Legal Liability in Security Management

Cloud Computing

Chapter 9 Review Questions

Chapter 10:    Computer Crime, Cyberfraud, and Recent Trends

Learning Objectives:

Computer Crime

Privacy Issues

Tools of Security Management

Other Security Measures

Chapter 10 Review Questions


CPE Computer Science Course: https://www.cpethink.com/computer-science-cpa-courses
Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
Exam completed on .

Do you want to add the course again?