Cybersecurity remains a constant concern in the accounting and finance world. This CPE self-study course approaches cybersecurity concerns from multiple angles. It begins by instilling a security mindset, essential in the realm of cybersecurity, and addresses widespread myths while introducing critical cybersecurity frameworks. The course emphasizes the importance of a security-conscious culture in organizations and the role of governance in sustaining a robust cybersecurity program. It also provides practical guidance on implementing IT governance and developing effective security policies in organizations. As cybercriminals continually evolve their techniques, the course explores various strategies and best practices for protecting data, including cloud privacy and mobile device security. Finally, it explores the complexities of regulatory compliance, discussing significant federal and state data privacy laws. This online CPE course is an invaluable resource for professionals seeking to enhance their cybersecurity knowledge and skills, ensuring their organizations are prepared to face the challenges and threats of the digital landscape.
Learning Objectives
After completing Part I of this course, you will be able to:
Recognize common cybersecurity misconceptions;
Identify the five functions of the NIST Cybersecurity Framework;
Recognize the five stages of the ITIL Framework;
Identify the main causes for the rise of cyberattacks;
Recognize common types of cyberattacks;
Identify different kinds of cyber threat actors; and
Identify ways to protect yourself against cybercrime.
After completing Part II of this course, you should be able to:
Identify the objectives of IT governance;
Recognize the role of the board in cybersecurity;
Identify management activities associated with IT governance;
Recognize the key principles of the COBIT Framework; and
Identify must-have security policies for every organization.
After completing Part III of this course, you should be able to:
Identify the essential physical security measures;
Recognize the essential information security measures;
Identify cloud computing security measures; and
Recognize mobile device security best practices.
After completing Part IV of this course, you should be able to:
Identify the significant federal regulations of data privacy and protection;
Recognize the key provisions of state privacy laws;
Identify the key provisions of the HIPAA; and
Recognize the key requirements of the GLBA.
Major Topics
The Evolution of Cybersecurity
Cybersecurity Threats and Attacks
Create A Security-Conscious Culture
Apply Security Countermeasures
Meet Regulatory Compliance