Cart empty

Fast, Easy and Affordable Continuing Education for Accountants!

Our Amazing Sales & Support: 888-398-8540

Information Security - Malware Trends and Mitigation Strategies 2022 - 6 CPE

Email
Texas Compliance Pending. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft.
No image set
$23.95
Download

Malware Trends and Mitigation Strategies 2022 - 6 CPE

information_security_malware_trends_2022_6_cpe_fe_na.pdf
Price: No additional charge

Manufacturer: Andrew Clark

TEXAS COMPLIANCE PENDING:

Texas requires a class be reviewed by enough students to assign earned CPE credits.  This course is still new enough that we are obtaining the reviews needed.   We recommend Texas CPAs check back soon. This process is usually finished within a few weeks.

The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware.

Learning Objectives

At the end of this course, students will be able to:

  • Identify the importance of information security for CPAs and Tax Practitioners,
  • Identify the different types of malware that can infect computer systems,
  • Define the term “Phishing” and recognize how phishing occurs,
  • Define the term “Identify Theft” and recognize how identify theft most commonly occurs,
  • Identify the major malware events that have occurred in recent years, and
  • Identify the operating processes and mitigation techniques for the most commonly seen malware programs of the current year.

CPE Credit: 6 CPE for CPAs and EAs

Level: Intermediate

Instructional Method: Self-Study

NASBA Field of Study: Information Technology

Program Prerequisites: None

Advanced Preparation: None

Reviews

There are yet no reviews for this product.

Our CPE Is Accepted In:

 
Our CPE is currently accepted in: AL, AK, AZ, CA, CO, CT, DE, GA, ID, IN, IA, KY, ME, MD, MA, MI, MO, MT, NV, NH, NM, ND, PA, RI, TX, UT, VT, VA, WA, WI, WY

Testimonials

 
Wow, an email from a real person and not a pre-written response.  That is very refreshing.  I will be sure to recommend this site to others in my field!
Sharon EA
 
 
Thank you. I finish a test when I am in a flight for a business trip so when I log in to your website, I can enter all answers.
Mike CPA
 
 
I chose your company because of the price, and I'm certainly happy with that!  I am thankful that there is CPE that is so affordable.  Thanks for responding!
Rebecca CPA
 

Login Form

If you see "invalid token" please press ctrl+shift+R and then login again. (you can Click Here for an explanation)