K2's Tales of True Tech Crimes - Ripped From the Headlines - On Demand (2 hours)

K2's Tales of True Tech Crimes - Ripped From the Headlines - On Demand (2 hours)

  • $89.00

Course Description

Security is a top concern for CPAs every year, yet many hacks result from organizations failing to implement effective information technology controls. In this session, you will learn about critical controls by using case studies from recent security incidents. This strategy helps you understand risks and appropriate responses.  Participate in this session to learn how to reduce your risk associated with unauthorized access, theft of information, identity theft, data exfiltration, tax refund fraud, and more.

Major Topics

  • Common security failures
  • The importance of user authentication
  • Security vulnerabilities embedded in hardware and software
  • Best practices to facilitating secure environments

Learning Objectives

Upon completing this course, you should be able to:

  • List examples of major security incidents reported in the last two years and the related security weaknesses that allowed each breach to occur
  • Define the three methods used to authenticate a user to a system
  • Differentiate between the security in home-grade technology and business-grade technology
  • Identify three security best practices to help mitigate risk

    Course Information

    • CPE credit: 2 hours Information Technology
    • Prerequisites: Fundamental knowledge of basic technological and security concepts
    • Program level: Intermediate
    • Advance preparation: None
    • Who should participate: Business professionals who are seeking to enhance the security surrounding both personal and organizational data

    Instructional Delivery Method: QAS on-demand learning, including review and final exam questions. To earn credit, participants must pass the final exam with a score of 70% or better within one year of registering for this course. Participants may attempt take the final exam up to 10 times.