Cybersecurity: A Guide for Accountants

Course Information

(No Reviews Yet)
Title: Cybersecurity: A Guide for Accountants
Category: Computer Software
Field of Study: Information Technology
Course Code: M240
CPE Credits: 10.0
Price: 59.95



The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This course is designed to help you navigate the complexities of this field.

Delivery Method: Online Interactive Self Study

Level: Overview

Prerequisites: None

Advanced Preparation: None

Course Details

Category: Computer Software

Field of Study: Information Technology

Passing Score: 70%

Technical Details: Information technology is a technical subject.

For More Detail:

If you are unable to view PDF then right click the mouse and click save link as



Chapter 1: The Evolution of Cybersecurity.  Chapter 2: Cybersecurity Threats and Attacks. 1. Recognize common cybersecurity misconceptions  2. Identify the five functions of the NIST Cybersecurity Framework. 3. Recognize the five stages of the ITIL Framework. 4. Identify the main causes for the rise of cyberattacks  5. Recognize common types of cyberattacks. 6. Identify different kinds of cyber threat actors  7. Identify ways to protect yourself against cybercrime. Chapter 3: Governance Process.  Chapter 4: Policy Implementation  1. Identify the objectives of IT governance  2. Recognize the role of the board in cybersecurity  3. Identify management activities associated with IT governance. 4. Recognize the key principles of the COBIT Framework  5. Identify must-have security policies for every organization. Chapter 5:  Physical and Environmental Protection. Chapter 6: Information Security:  1. Identify the essential physical security measures. 2. Recognize the essential information security measures. 3. Identify cloud computing security measures. 4. Recognize mobile device security best practice. Chapter 7: Regulatory Environment. Chapter 8: Compliance for Healthcare Industry. Chapter 9: Compliance for Financial Institutions.  1. Identify the significant federal regulations of data privacy and protection. 2. Recognize the key provisions of state privacy laws. 3. Identify the key provisions of the HIPAA. 4. Recognize the key requirements of the GLBA


For More Objectives:

If you are unable to view PDF then right click the mouse and click save link as



QAS: Yes

CPA: Suitable for all CPAs

IRS: IRS credit for Enrolled Agents.

Profession Identifiers: CPA