Computer Security

Price: $85.50

CPE Credits: 9.0

Category:

Course Number: ITSECUDP

computer security

Description:
The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats.  Security concerns have heightened in the recent years.  Weak computer security and lack of internal controls increases an organization’s vulnerability. The major steps in understanding and managing computer security are discussed in this course.  The course helps business executives identify resources in their organizations that need to be protected. Table of contents

Delivery Method: Online QAS Self Study.

Level: Overview.

Prerequisites: None

Advanced Preparation: None

Author: DeltaCPE LLC

Publication: May 2016
Update:  October 2018

Format: PDF
Pages: 200

Passing Grade: 70%

Exam Policies: Exam may be retaken. Course must be completed within one year of purchase.

CPE Sponsor Info : NASBA/QAS #109234. Click here to view specific state approvals.

By the end of the course participants should be able to:

  1. Identify requirements of the organizational security policies.
  2. Recognize the three levels of security.
  3. Recognize proper security safeguards.
  4. After completing this section, you should be able to:
  5. Recognize the different lines of defense for a computer system.
  6. Identify environmental considerations as they apply to computer security.
  7. Recognize the components of a maintenance log.
  8. Identify computer access controls for software and data files.
  9. Identify some of the most common hardware problems.
  10. Identify how data integrity may be threatened.
  11. Recognize some hardware security devices used to protect the computer system.
  12. Identify top security related products in use.
  13. Recognize different types of viruses and security threats.
  14. Recognize the uses of firewall security systems.
  15. Identify prerequisites for sensitive personnel positions.
  16. Recognize the value of an employee performance evaluation system and components of a training system.
  17. Identify security issues posed by terminated employees.
  18. Recognize network tools used to implement security plans.
  19. Identify the tools and techniques used by saboteurs.
  20. Identify questions that policy makers should answer when designing a security system.
  21. Recognize activities conducted as part of the risk analysis and management.
  22. Recognize human factor threats for security.
  23. Recognize the types of disruptions in computer processing.
  24. Recognize components of a contingency plan.
  25. Identify fire safety preventive plans.
  26. Identify the scope of internal and external security auditing.
  27. Recognize the audit trail to identify unusual activities.
  28. Recognize control techniques.
  29. Identify EDI security risks.
  30. Recognize penalties of the US Computer Fraud and Abuse Act.
  31. Identify major issues regarding computer crimes and privacy issues.
  32. Identify new certificate programs in computer security.

 

Overall Course Rating: 4 /5 – Anonymous- 12/17

Description:
The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats.  Security concerns have heightened in the recent years.  Weak computer security and lack of internal controls increases an organization’s vulnerability. The major steps in understanding and managing computer security are discussed in this course.  The course helps business executives identify resources in their organizations that need to be protected. Table of contents

Delivery Method: Online QAS Self Study.

Level: Overview.

Prerequisites: None

Advanced Preparation: None

Author: DeltaCPE LLC

Publication: May 2016
Update:  October 2018

Format: PDF
Pages: 200

Passing Grade: 70%

Exam Policies: Exam may be retaken. Course must be completed within one year of purchase.

CPE Sponsor Info : NASBA/QAS #109234. Click here to view specific state approvals.

By the end of the course participants should be able to:

  1. Identify requirements of the organizational security policies.
  2. Recognize the three levels of security.
  3. Recognize proper security safeguards.
  4. After completing this section, you should be able to:
  5. Recognize the different lines of defense for a computer system.
  6. Identify environmental considerations as they apply to computer security.
  7. Recognize the components of a maintenance log.
  8. Identify computer access controls for software and data files.
  9. Identify some of the most common hardware problems.
  10. Identify how data integrity may be threatened.
  11. Recognize some hardware security devices used to protect the computer system.
  12. Identify top security related products in use.
  13. Recognize different types of viruses and security threats.
  14. Recognize the uses of firewall security systems.
  15. Identify prerequisites for sensitive personnel positions.
  16. Recognize the value of an employee performance evaluation system and components of a training system.
  17. Identify security issues posed by terminated employees.
  18. Recognize network tools used to implement security plans.
  19. Identify the tools and techniques used by saboteurs.
  20. Identify questions that policy makers should answer when designing a security system.
  21. Recognize activities conducted as part of the risk analysis and management.
  22. Recognize human factor threats for security.
  23. Recognize the types of disruptions in computer processing.
  24. Recognize components of a contingency plan.
  25. Identify fire safety preventive plans.
  26. Identify the scope of internal and external security auditing.
  27. Recognize the audit trail to identify unusual activities.
  28. Recognize control techniques.
  29. Identify EDI security risks.
  30. Recognize penalties of the US Computer Fraud and Abuse Act.
  31. Identify major issues regarding computer crimes and privacy issues.
  32. Identify new certificate programs in computer security.

 

Overall Course Rating: 4 /5 – Anonymous- 12/17

  • “The author did a good job of setting forth the ethical standards contained in the California State Board of Public Accountancy Rules and the AICPA Code of Conduct.”

    - California Ethics Course

  • “Excellent Regulatory Review Course. The self-study format (E-Book) provided an excellent overview of the regulatory requirements for California CPAs. I will be using the E-Book as  a reference material. Thank you for providing a very comprehensive yet affordable option for this required CPE.”

    - Constance

  • “always love your site and prompt customer service !! ”  Dec. 2017

    - Thank you :)