
QAS Self-Study

Overview

CPE Credits
1 Credits: Information Technology
Course Description
In many cases, network intrusions, loss of data or even loss of funds is due to a failure to follow simple security basics. This course overviews some effective, common-sense techniques to secure your computer or network and associated data that are both low-cost and low-tech solutions. Tips on detecting social engineering emails and employee education to prevent loss of data and funds to social engineers is also discussed.
Learning Objectives
Learning Objectives
Upon completion of this course, participants will be able to
• Recognize importance of computer and data security techniques
• Recognize and understand how different social engineering techniques can breach computer and data security
• Recognize methods to prevent social engineering fraud schemes
Course Specifics
Course ID 2214706 |
Revision Date June 10, 2021 |
Number of Pages 38 |
Prerequisites There are no prerequisites. |
Advanced Preparation None |
Compliance information
Course Instructor

Joseph Helstrom, CPA, is a partner at CFO Resources, LLC, a company focused on training and courseware for CPAs. He’s also the owner of Mill Creek Publishing LLC. Joe has over 30 years of experience as a CPA in both public accounting and industry, with extensive experience in financial reporting and analysis, treasury, tax, information technology, legal and regulatory matters, and strategic planning. After graduation from Butler University with a degree in accounting, Joe got his start at Ernst & Young. Subsequent to that, he has served for several different companies as a chief financial officer; director of treasury and …
Computer and Data Security Basics for the CPA

CPE CREDITS
1 Credits: Information Technology
$29.00 – $49.00

QAS Self-Study

Overview

CPE Credits
1 Credits: Information Technology
Course Description
In many cases, network intrusions, loss of data or even loss of funds is due to a failure to follow simple security basics. This course overviews some effective, common-sense techniques to secure your computer or network and associated data that are both low-cost and low-tech solutions. Tips on detecting social engineering emails and employee education to prevent loss of data and funds to social engineers is also discussed.
Learning Objectives
Learning Objectives
Upon completion of this course, participants will be able to
• Recognize importance of computer and data security techniques
• Recognize and understand how different social engineering techniques can breach computer and data security
• Recognize methods to prevent social engineering fraud schemes
Course Specifics
Course ID 2214706 |
Revision Date June 10, 2021 |
Number of Pages 38 |
Prerequisites There are no prerequisites. |
Advanced Preparation None |
Compliance information
Course Instructor

Joseph Helstrom, CPA, is a partner at CFO Resources, LLC, a company focused on training and courseware for CPAs. He’s also the owner of Mill Creek Publishing LLC. Joe has over 30 years of experience as a CPA in both public accounting and industry, with extensive experience in financial reporting and analysis, treasury, tax, information technology, legal and regulatory matters, and strategic planning. After graduation from Butler University with a degree in accounting, Joe got his start at Ernst & Young. Subsequent to that, he has served for several different companies as a chief financial officer; director of treasury and …
Computer and Data Security Basics for the CPA

CPE CREDITS
1 Credits: Information Technology
$29.00 – $49.00