Course Library
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
Field of Study:
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
We each know personally of the complexities in a tax code with 4,029 pages and year-after-year changes. Most agree that tax reform is needed to put US corporations and individuals on an equal footing ...Program Level:
BasicDelivery Method:
- Group Live
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 21 + credits
Description:
Magnet AXIOM Cyber Examinations (CY200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, an ...Program Level:
Intermediate-levelDelivery Method:
- Group Internet Based
- Group Live
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 9 - 12 credits
Description:
Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materia ...Program Level:
BasicDelivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybersecurity is like a virus that keeps evolving. Just when you think you've built a defense against one form of attack, cybercriminals evolve to invade your system from another point of entry. Now, ...Delivery Method:
- QAS Self Study
-
Cyber Incident & Response“An Interview With Former United States Attorney Jay Town
09-Aug-2021 MY-CPE LLCField of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Former FBI Agent Vic Hartman interviews former United States Attorney Jay Town. This informative interview addresses the topic, cyber incidents, and responses.Cyber incidents are a common reality for ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course takes a deep dive into the âidentifyâ function of the NIST cyber security framework.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course delves into the "Protect" function of the NIST cybersecurity frameworkDelivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
In this session we begin to delve into the detection phase of a cyber risk assessment.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
In this session we begin to delve into the detection phase of a cyber risk assessment.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course discusses evaluating various methods to assign priorities to identified cyber assets.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This session explores elements which will assist the organization in planning for an effective cyber breach recovery.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This segment delves deeply into concepts that must be well understood and planned in order to ensure the respond function is effective.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course evaluates several attributes critical to the proper establishment of a cyber risk management program.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
As discussed in the segment on Cyber programs and roles, in today’s tech environment it is critical that organizations be pro-active and prepared when considering cyber risk management. Because of the ...Program Level:
BeginnerDelivery Method:
- QAS Self Study
-
Cyber Risk: Best Practices for Protecting Your ESOP and Responding to Cyber-Related Incidents
26-Apr-2023 National Center for Employee Ownership (NCEO)Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Live
Location:
- MO
-
Field of Study:
- Business Management and Organization
Credit Hours:
- 5 - 8 credits
Description:
This introductory course will provide an overview of cybersecurity in the Middle East, providing the context of cybersecurity in today's world, the key challenges, and the best practice solutions for ...Delivery Method:
- Group Live
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercrime, cybersecurity, phishing, malware, ransomware, the list goes on and on, but it really doesn’t pertain to me, right? I am too small and I really don’t have anything of value to hackers. If y ...Program Level:
BasicDelivery Method:
- Group Internet Based
- Group Live
- QAS Self Study
Location:
- UT
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
As a practitioner, you have a legal responsibility to safeguard sensitive information in the face of growing risks, but you aren’t sure how to get started in performing a proper risk assessment or how ...Program Level:
BasicDelivery Method:
- Group Internet Based
- Group Live
- QAS Self Study
Location:
- UT
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course is Part 2 of a comprehensive 3-part series intended to help you understand and become savvy with tax issues and considerations with respect to virtual currency. With the exception of buyin ...Program Level:
BeginnerDelivery Method:
- Group Internet Based
- QAS Self Study
Location:
- UT
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 1 - 4 credits
Description:
An outstanding program is planned with dynamic speaker, and Houston's Deputy Chapter Head, Muhammad Ayaz Wadia. He will discuss the digital age and how it has spun off great benefits to information ga ...Program Level:
EntryDelivery Method:
- Group Live
Location:
- TX
-
Field of Study:
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
The IRS has recently updated its data and cyber security guidelines, placing new responsibility for the security of taxpayers' personal information on tax preparers. This course is designed for tax pr ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace. Cyber Security is the highest risk and at the top of the minds of C-suite members at every compa ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
If you are the 50% who believe that cyber-attacks are only targeted toward multibillion-dollar companies then you are wrong. 85% of reported Ransomware attacks are against SMBs.A report states that am ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
This course teaches you how to understand and be prepared to deal with the multitude of ever-growing cyber threats.Delivery Method:
- QAS Self Study
-
Field of Study:
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
Cyber Breach has become an epidemic in today’s business environment. The average breach is not detected until after 210 days, leading to extensive damage to an organization’s reputation, profits and p ...Program Level:
BeginnerDelivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercriminals have discovered that tax and accounting firms have a wealth of personal information stored on their local computer networks and that your office network is the weakest link in the chain ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course examines the landscape of cyber threats as they currently exist.Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
2020-2022 saw an unprecedented increase in ransomware attacks – 236.1 million in 2022 alone.2021 was a breakout year for ransomware as the cyber security attack vector wreaked havoc on individuals and ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
In this two-hour LIVE Webcast, a panel of distinguished professionals and thought leaders will help enterprises understand the important aspects of this significant topic. They will provide an in-dept ...Delivery Method:
- Group Internet Based
Location:
- NJ
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
A retired FBI agent and security expert uses real life examples of the latest hacks, security breaches, and computer scams to demonstrate how cybercrime occurs and what countermeasures we can take to ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Field of Study:
- Accounting
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
In this practical webinar, youll receive step-by-step guidance on cyberfraud and data breaches. Youll learn about various types of cyberfrauds and how they are perpetrated. Youll also discover the ...Delivery Method:
- Group Internet Based
-
Field of Study:
- Accounting
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
In this practical webinar, youll receive step-by-step guidance on cyberfraud and data breaches. Youll learn about various types of cyberfrauds and how they are perpetrated. Youll also discover the ...Delivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 9 - 12 credits
Description:
The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked tec ...Program Level:
OverviewDelivery Method:
- QAS Self Study
-
Cybersecurity - Part 1 - Why You Need to Secure Your Small Business Against Cyber Threats
21-Nov-2017 Canopy TaxField of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercrime, cybersecurity, phishing, malware, ransomware, the list goes on and on, but it really doesn’t pertain to me, right? I am too small and I really don’t have anything of value to hackers. If y ...Program Level:
BasicDelivery Method:
- Group Internet Based
- QAS Self Study
Location:
- UT
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- QAS Self Study
-
Field of Study:
- Accounting
Credit Hours:
- 1 - 4 credits
Description:
To help financial professionals protect themselves--and their businesses--against the escalating cost of cyberattacks. You'll learn what preventative measures can be taken to safeguard your people, da ...Delivery Method:
- Group Internet Based
-
Cybersecurity and Technology Issues for Tax Preparers and Accountants
11-Jul-2022 VA Society of Tax & Accounting ProfessionalsField of Study:
- Information Technology
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
Putin has ramped up cyber activity around the world (both originating in Russia and not). What do we need to do to make sure we are protected in today's environment? We will look at the threats that f ...Program Level:
BasicDelivery Method:
- Group Internet Based
Location:
- VA
-
Field of Study:
- Computer Software and Applications
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybersecurity Awareness & Data Privacy Training 1-Hour Training Presented by Michael Johnson At some point, nearly every organization will become a victim of a cybersecurity or information security at ...Program Level:
IntermediateDelivery Method:
- QAS Self Study
Location:
- VA
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercriminals have discovered that tax and accounting firms have a wealth of personal information stored on their local computer networks and that your office network is the weakest link in the chain ...Delivery Method:
- QAS Self Study
-
Cybersecurity Essentials: FTC Compliance for Solo and Small Firms Webinar
08-May-2024 Maryland Society of Accounting and Tax Professionals, IncField of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This essential course is crafted to equip solo practitioners and small firms with the latest knowledge and best practices in cybersecurity. As the threat landscape evolves, so do the regulations enfor ...Program Level:
UpdateDelivery Method:
- Group Internet Based
- Group Live
Location:
- MD
-
Cybersecurity for ESOPs — Executive Guide for Eliminating Risk
25-Apr-2022 National Center for Employee Ownership (NCEO)Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Live
Location:
- WA
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
How can executive leadership directly influence an organization's cybersecurity? Executive decisions are critical to ensuring robust cybersecurity measures in today's digital landscape. This CPE Cours ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
How can executive leadership directly influence an organization's cybersecurity? Executive decisions are critical to ensuring robust cybersecurity measures in today's digital landscape. This CPE Cours ...Delivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course provides you with some of the essential knowledge and skills to protect sensitive financial data from cyber threats. It covers the fundamentals of cybersecurity, detailing prevalent threa ...Program Level:
OverviewDelivery Method:
- Group Internet Based
- Group Live
- QAS Self Study
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 1 - 4 credits
Description:
This course provides you with some of the essential knowledge and skills to protect sensitive financial data from cyber threats. It covers the fundamentals of cybersecurity, detailing prevalent threa ...Program Level:
OverviewDelivery Method:
- QAS Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Are you concerned about the security of your accounting operations and looking to enhance your cyber protection skills? Join this CPE webinar for a concise overview and practical insights on leading c ...Delivery Method:
- QAS Self Study
-
Field of Study:
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- QAS Self Study
27264 Results