Cart empty

Fast, Easy and Affordable Continuing Education for Accountants!

Our Amazing Sales & Support: 888-398-8540

Malware Trends and Mitigation Strategies 2024 - 6 CPE

Email
Texas Compliance Pending. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware.
No image set
$22.95
Download

Malware Trends and Mitigation Strategies 2024 - 6 CPE

malware_trends_and_mitigation_strategies_2024_6_cpe_fe_na.pdf
Price: No additional charge

Manufacturer: Andrew Clark

TEXAS COMPLIANCE PENDING:

Texas requires a class be reviewed by enough students to assign earned CPE credits.  This course is still new enough that we are obtaining the reviews needed.   We recommend Texas CPAs check back soon. This process is usually finished within a few weeks.

Introduction

The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware.

Learning Objectives

At the end of this course, students will be able to:

  • Identify the importance of information security for CPAs and Tax Practitioners,
  • Identify the different types of malware that can infect computer systems,
  • Define the term “Phishing” and recognize how phishing occurs,
  • Define the term “Identify Theft” and recognize how identify theft most commonly occurs,
  • Identify the major malware events that have occurred in recent years, and
  • Identify the operating processes and mitigation techniques for the most commonly seen malware programs of the current year.

CPE Credit: 6 CPE for CPAs and EAs

Level: Intermediate

Instructional Method: Self-Study

NASBA Field of Study: Information Technology

Program Prerequisites: None

Advanced Preparation: None

Reviews

There are yet no reviews for this product.

Our CPE Is Accepted In:

 
Our CPE is currently accepted in: AL, AK, AZ, CA, CO, CT, DE, GA, ID, IN, IA, KY, ME, MD, MA, MI, MO, MT, NV, NH, NM, ND, PA, RI, TX, UT, VT, VA, WA, WI, WY

Testimonials

 
Thank you very much. Appreciate your prompt response. Have a great day.
Linda CPA
 
 
Thank you again for responding to me on a Sunday.
Paul CPA
 
 
Thank you. I finish a test when I am in a flight for a business trip so when I log in to your website, I can enter all answers.
Mike CPA
 

Login Form

If you see "invalid token" please press ctrl+shift+R and then login again. (you can Click Here for an explanation)