Information Security - Protecting Company Data: Malware Trends and Mitigation Strategies

Information Security - Protecting Company Data: Malware Trends and Mitigation Strategies
Click to enlarge
Price: $49.99
Credits: 6
Prerequisite: None
Level: Intermediate
Model: TCE17
Author: TaxCe Publishing
Average Rating: Not Rated
Fields of study: Computer Software & Application
Format: PDF


The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware.

Learning Objectives

At the end of this course, students will be able to:

• Identify the importance of information security for CPAs and Tax Practitioners,

• Identify the different types of malware that can infect computer systems,

• Define the term “Phishing” and recognize how phishing occurs,

• Define the term “Identify Theft” and recognize how identify theft most commonly occurs,

• Identify the major malware events that have occurred in recent years, and

• Identify the operating processes and mitigation techniques for the most commonly seen malware programs of the current year.

CPE Credit: 6 CPE for CPAs and EAs

Level: Intermediate

Instructional Method: Self-Study

NASBA Field of Study: Information Technology

Program Prerequisites: None

Advanced Preparation: None

 

Additional Contents : Complete, no additional material needed
Advance Preparation : None
Intended Participants :
Any CPA looking to maintain or enhance their professional competence

Course Declaration : Participants must complete the final examination within one year of purchase. A minimum passing grade of 70% or better is required to receive CPE
Click here to view cancelation and record retention policies

Write Review
Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad            Good

Enter the code in the box below:

There are no additional images for this product.
No Records.