Self-Study
9
Overview
Computer Science
There are no prerequisites

Course Description

The course is intended primarily to help business executives and information systems/computer professionals protect the computer and the data from a wide variety of threats.  Security concerns have heightened in the recent years.  Weak computer security and lack of internal controls increases an organization's vulnerability. The major steps in understanding and managing computer security are discussed in this course.  The course helps business executives identify resources in their organizations that need to be protected. 



Instructor

Delta Publishing

For many years, Delta Publishing has offered a wide variety of continuing education courses for financial professionals. Topics covered by Delta’s courses include accounting, financial management, budgeting, investments, financial statement reporting, business management, IFRS, ethics, valuations, real estate, and business writing. The diversity and breadth of Delta’s course offerings make the company a prolific and unique contributor to the CPE world. Delta’s well-credentialed authors and contributors have also been published in numerous academic and professional journals and quoted by some of the leading financial media outlets.



Course Specifics

Computer Science
Feb 18, 2020
There are no prerequisites
SS2204599
197
None


Compliance Information

103220
Qualifies for CA Fraud: No


Learning Objectives

Upon successful completion of this course, participants will be able to:

Chapter 1

  • Identify requirements of the organizational security policies.
  • Recognize the three levels of security.
  • Recognize proper security safeguards.

Chapter 2
  • After completing this section, you should be able to:
  • Recognize the different lines of defense for a computer system.
  • Identify environmental considerations as they apply to computer security.
  • Recognize the components of a maintenance log.
  • Identify computer access controls for software and data files.
Chapter 3
  • After completing this section, you should be able to:
  • Identify some of the most common hardware problems.
  • Identify how data integrity may be threatened.
  • Recognize some hardware security devices used to protect the computer system.
Chapter 4
  • Identify top security related products in use.
  • Recognize different types of viruses and security threats.
  • Recognize the uses of firewall security systems.
Chapter 5
  • Identify prerequisites for sensitive personnel positions.
  • Recognize the value of an employee performance evaluation system and components of a training system.
  • Identify security issues posed by terminated employees.
Chapter 6
  • Recognize network tools used to implement security plans.
  • Identify the tools and techniques used by saboteurs.
Chapter 7
  • Identify questions that policy makers should answer when designing a security system.
  • Recognize activities conducted as part of the risk analysis and management.
  • Recognize human factor threats for security.
Chapter 8
  • Recognize the types of disruptions in computer processing.
  • Recognize components of a contingency plan.
  • Identify fire safety preventive plans. 
Chapter 9
  • Identify the scope of internal and external security auditing.
  • Recognize the audit trail to identify unusual activities.
  • Recognize control techniques.
  • Identify EDI security risks.
Chapter 10
  • Recognize penalties of the US Computer Fraud and Abuse Act.
  • Identify major issues regarding computer crimes and privacy issues.
  • Identify new certificate programs in computer security.





Choose Your Preferred Format


Online Access

Get immediate access to a robust collection of learning and reference materials, allowing you to dive deep into the information you need. Our self-study materials are authored by top-quality, industry experts who focus on helping you grasp concepts quickly using real-life examples. Download your CPE to any device, and take it with you so you can learn when and wherever you want. Complete your CPE with an online exam, and enjoy instant grading with the option to print your certificate immediately upon passing.

online access
Hard Copy

Our self-study materials are authored by top-quality, industry experts. You’ll receive a bound notebook of all the course materials, shipped to you within one business day. In addition, you’ll also have full online access. Each self-study package includes a robust collection of learning and reference materials to help you cover the information efficiently and put it into practice immediately.

hard copy
Self-Study Video

Experience high-quality instruction with our Self-Study Videos, available to you 24/7. With more than 80+ videos currently in the Western CPE Self-Study Video library, you can see and hear our expert instructors deliver the information you need in a dynamic way that allows you to immediately apply your learning. Unlike a live course or webcast, you can complete the course on your own time, playing and pausing as needed. Self-Study Videos allow you to complete your CPE requirements on your own time.

hard copy


Back to top