Malware and cybersecurity. These two landscapes shift and change, as each tries to outpace the other. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware and altering old malware to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes.
This course covers the overarching concepts that make up the current information security landscape, the different types of malware that can infect a computer system, and the different techniques used to conduct both phishing attacks and identity theft. With practical examples and case study overviews, the course provides explanations of key terminology, techniques, and tips.
This course will also identify the malware trends and best practices for dealing with it.
At the end of this course, students will be able to:
- identify the importance of information security for CPAs, Tax Practitioners, Business Managers, and financial advisors
- identify the different types of malware that can infect computer systems
- define key terms such as "phishing" and "identity theft" and recognize how such activities most commonly occur
- identify the major malware events that have occurred in recent years
- identify the operating processes and mitigation techniques for the most commonly seen malware programs
CPAs, EAs, and other tax and financial professionals