Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)
Course Details

Information Security - Protecting Company Data: Malware Trends and Mitigation Strategies (Course Id 1542)

Updated / QAS / Registry
  Add to Cart 
Author : Andrew Clark, EA
Course Length : Pages: 59 ||| Word Count: 47,554 ||| Review Questions: 18 ||| Final Exam Questions: 30
CPE Credits : 6.0
IRS Credits : 0
Price : $53.95
Passing Score : 70%
Course Type: NASBA QAS - Text - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 1542

Description :

The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware.

Usage Rank : 17500
Release : 2024
Version : 1.0
Prerequisites : None.
Experience Level : Overview
Additional Contents : Complete, no additional material needed.
Additional Links :
Advance Preparation : None.
Delivery Method : QAS Self Study
Intended Participants : Anyone needing Continuing Professional Education (CPE).
Revision Date : 03-Jul-2024
NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
Approved Audience :

NASBA QAS - Text - NASBA Registry - 1542

Keywords : Computer Software & Applications, Information Security, Protecting, Company, Data, Malware, Trends, Mitigation, Strategies, cpe, cpa, online course
Learning Objectives :

Course Learning Objectives

At the end of this course, students will be able to:
  • Identify the importance of information security for CPAs and Tax Practitioners,
  • Identify the different types of malware that can infect computer systems,
  • Define the term “Phishing” and recognize how phishing occurs,
  • Define the term “Identify Theft” and recognize how identify theft most commonly occurs,
  • Identify the major malware events that have occurred in recent years, and
  • Identify the operating processes and mitigation techniques for the most commonly seen malware programs of the current year.

Course Contents :

Chapter 1 - Information Security - Protecting Company Data: Malware Trends and Mitigation Strategies

Course Learning Objectives

Introduction

Information Security

Internet

Information Security Tools and Processes

Application security

Cloud security

Cryptography

Infrastructure security

Incident response

Vulnerability management

Security Concepts

Confidentiality

Integrity

Availability

People Accessing Information

Authentication

Authorization

Nonrepudiation

Malware Definition

Viruses and Worms

Virus

Worm

Trojans

Backdoor / Remote Access Trojan (RAT)

Botnets

Adware

Information stealers

Ransomware

Rootkits

Downloaders or droppers

File Wipers

Spyware

Malware Summary

Phishing

Spear Phishing

Clone Phishing

Whale Phishing

Social Media Phishing

Phishing Evolution

Phishing Opportunities

Criminals are Learning and Evolving

Phishing Tools

Bots/Botnets

Phishing Kits

URL Obfuscation

Simple HTML redirection

Use of JPEG images

Use of alternate IP addresses

Registration of similar domain names

Web Browser Vulnerabilities used for Phishing

Session Hijacking

Domain Name Resolving Attacks

Global DNS Hijacking Campaign

Cross-Site Scripting Attacks

Domain Name Typos

Man-in-the-Middle Attacks

Phishing

Bancos

Bankash

W32/Grams

CoreFloo

Dyre Banking Malware

Phishing Mitigations

Phishing Solutions

Prevent Phishing Attacks

Identity Theft

Identity Theft Methods

Trash Sifting/Dumpster Diving

Mail Theft

Address Manipulation:

Skimming

Scanning

Straightforward Theft:

Conning

Identity Theft Crimes

Yahoo Data Breach

Equifax breach

Target Data Breach

Review Questions

Malware Trends

2014 Malware Trends

Increases in Researcher Evasion

Malware Source Code Leaks

Changes in Account Takeover Fraud Execution

Mobile SMS Malware Rose in Popularity

Obsolete Malware Infection Techniques Started Making a Comeback

2015 Malware Trends

Mobile Banking Trojans on the Rise

Overlay of Malware on Top of Legitimate Applications

Increases in Mobile Ransomware

First Ransomware for Linux Detected

Encryption-Based Ransomware is on the Rise

2016 Malware Trends

Ransomware Solidified Itself as a Serious Threat

Underground Cybercriminal Marketplaces are Becoming More Common

$100 Million was Stolen from Banks in SWIFT-Enabled Transfers

BlackEnergy Wreaked Havok on Vulnerable Critical Ukrainian Infrastructure

Mirai Botnet Attack Shows the Vulnerability of Internet of Things (IoT) Devices

Mobile Adware Infections Increase Dramatically

2017 Malware Trends

Despite the Plateauing of new Ransomware Families, WannaCry and NotPetya take the Ransomware Landscape by storm

Mobile “Evasive” Malware is Extremely Popular and More Dangerous Than It’s Ever Been

Losses from Business Email Compromise and CEO Fraud Reach $5 Billion

2018 Malware Trends

Botnets Are Now Used to Attack Both Organizations and Users of Infected Computers

As Rooted Mobile Malware Declines in Popularity, Traditional Malware Infection Rates Surge

With the Rising Value of Cryptocurrency, Mining Malware is Rising in Popularity

2019 Malware Trends

WannaCry Ransomware

Kovter Click Fraud Malware

Gh0st RAT

NanoCore RAT

CoinMiner Cryptocurrency Mining Malware

ZeuS Modular Banking Malware

Emotet Infostealer

Trickbot Banking Trojan

Qakbot Financial Malware

Dridex Banking Trojan

Common Malware Threats of 2020

KMS

Dridex Banking Trojan

Tech Support Scams

Glupteba Trojan

Infostealers

Important Mentions: Trickbot and Emotet Infostealer

Important Malware Trends of 2021

Ransomware Attacks Will Continue to Increase in Both Number and Sophistication in 2021

Cybercriminals and Threat Actors will Continue to Exploit the COVID-19 Pandemic

Non-Windows Malware Attacks are Increasing

Vulnerabilities that Enable Malware will Likely Increase in 2021

Important Malware Trends of 2022

Healthcare Sector Cyberattacks are on the Rise

Ransomware Attacks are Becoming more Sophisticated and Vicious

Security-as-a-Service and Zero Trust Networks is on the Rise

Important Malware Trends of 2023

Ransomware Attacks Continue to Grow, but Switch Focus to Supply Chain Companies

Ransomware-as-a-Service Increases in Popularity

Zero Trust Security Systems See Wider Implementation, but still aren’t Perfect

Important Malware Trends of 2024

AI is at the forefront of the Cybersecurity Landscape in 2024

The Evolution of Malware using AI – Polymorphic and Metamorphic Malware

The Rise of Loaders, Stealers, and RATs

IoT Devices Continue to be a Priority Target for Cybercriminals

Review Questions

Glossary

Click to go to: Computer Software and Applications CPE Courses | CPE Think for CPAs
Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
  
Exam completed on .

Do you want to add the course again?