Course Library
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
Cyber Risk: Best Practices for Protecting Your ESOP and Responding to Cyber-Related Incidents
26-Apr-2023 National Center for Employee Ownership (NCEO)Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Live
Location:
- MO
-
Field of Study:
- Business Management and Organization
Credit Hours:
- 5 - 8 credits
Description:
This introductory course will provide an overview of cybersecurity in the Middle East, providing the context of cybersecurity in today's world, the key challenges, and the best practice solutions for ...Delivery Method:
- Group Live
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercrime, cybersecurity, phishing, malware, ransomware, the list goes on and on, but it really doesn’t pertain to me, right? I am too small and I really don’t have anything of value to hackers. If y ...Program Level:
BasicDelivery Method:
- Group Internet Based
- Group Live
- QAS™ Self Study
Location:
- UT
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
As a practitioner, you have a legal responsibility to safeguard sensitive information in the face of growing risks, but you aren’t sure how to get started in performing a proper risk assessment or how ...Program Level:
BasicDelivery Method:
- Group Internet Based
- Group Live
- QAS™ Self Study
Location:
- UT
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course is Part 2 of a comprehensive 3-part series intended to help you understand and become savvy with tax issues and considerations with respect to virtual currency. With the exception of buyin ...Program Level:
BeginnerDelivery Method:
- Group Internet Based
- QAS™ Self Study
Location:
- UT
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 1 - 4 credits
Description:
An outstanding program is planned with dynamic speaker, and Houston's Deputy Chapter Head, Muhammad Ayaz Wadia. He will discuss the digital age and how it has spun off great benefits to information ga ...Program Level:
EntryDelivery Method:
- Group Live
Location:
- TX
-
Field of Study:
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
The IRS has recently updated its data and cyber security guidelines, placing new responsibility for the security of taxpayers' personal information on tax preparers. This course is designed for tax pr ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace. Cyber Security is the highest risk and at the top of the minds of C-suite members at every compa ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
If you are the 50% who believe that cyber-attacks are only targeted toward multibillion-dollar companies then you are wrong. 85% of reported Ransomware attacks are against SMBs.A report states that am ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
This course teaches you how to understand and be prepared to deal with the multitude of ever-growing cyber threats.Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercriminals have discovered that tax and accounting firms have a wealth of personal information stored on their local computer networks and that your office network is the weakest link in the chain ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course examines the landscape of cyber threats as they currently exist.Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
2020-2022 saw an unprecedented increase in ransomware attacks – 236.1 million in 2022 alone.2021 was a breakout year for ransomware as the cyber security attack vector wreaked havoc on individuals and ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
In this two-hour LIVE Webcast, a panel of distinguished professionals and thought leaders will help enterprises understand the important aspects of this significant topic. They will provide an in-dept ...Delivery Method:
- Group Internet Based
Location:
- NJ
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
A retired FBI agent and security expert uses real life examples of the latest hacks, security breaches, and computer scams to demonstrate how cybercrime occurs and what countermeasures we can take to ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 9 - 12 credits
Description:
The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked tec ...Program Level:
OverviewDelivery Method:
- QAS™ Self Study
-
Cybersecurity - Part 1 - Why You Need to Secure Your Small Business Against Cyber Threats
21-Nov-2017 Canopy TaxField of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercrime, cybersecurity, phishing, malware, ransomware, the list goes on and on, but it really doesn’t pertain to me, right? I am too small and I really don’t have anything of value to hackers. If y ...Program Level:
BasicDelivery Method:
- Group Internet Based
- QAS™ Self Study
Location:
- UT
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Cyber fraud has become a complex and multifaceted issue, with new techniques continually emerging. In this training session, we will explore new variations of common techniques, discuss the severity o ...Program Level:
BasicDelivery Method:
- Group Internet Based
Location:
- NJ
-
Field of Study:
- Accounting
Credit Hours:
- 1 - 4 credits
Description:
To help financial professionals protect themselves--and their businesses--against the escalating cost of cyberattacks. You'll learn what preventative measures can be taken to safeguard your people, da ...Delivery Method:
- Group Internet Based
-
Cybersecurity and Technology Issues for Tax Preparers and Accountants
11-Jul-2022 VA Society of Tax & Accounting ProfessionalsField of Study:
- Information Technology
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
Putin has ramped up cyber activity around the world (both originating in Russia and not). What do we need to do to make sure we are protected in today's environment? We will look at the threats that f ...Program Level:
BasicDelivery Method:
- Group Internet Based
Location:
- VA
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Cybercriminals have discovered that tax and accounting firms have a wealth of personal information stored on their local computer networks and that your office network is the weakest link in the chain ...Delivery Method:
- QAS™ Self Study
-
Cybersecurity Essentials: FTC Compliance for Solo and Small Firms Webinar
08-May-2024 Maryland Society of Accounting and Tax Professionals, IncField of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This essential course is crafted to equip solo practitioners and small firms with the latest knowledge and best practices in cybersecurity. As the threat landscape evolves, so do the regulations enfor ...Program Level:
UpdateDelivery Method:
- Group Internet Based
- Group Live
Location:
- MD
-
Cybersecurity for ESOPs — Executive Guide for Eliminating Risk
25-Apr-2022 National Center for Employee Ownership (NCEO)Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Live
Location:
- WA
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
How can executive leadership directly influence an organization's cybersecurity? Executive decisions are critical to ensuring robust cybersecurity measures in today's digital landscape. This CPE Cours ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
How can executive leadership directly influence an organization's cybersecurity? Executive decisions are critical to ensuring robust cybersecurity measures in today's digital landscape. This CPE Cours ...Delivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This course provides you with some of the essential knowledge and skills to protect sensitive financial data from cyber threats. It covers the fundamentals of cybersecurity, detailing prevalent threa ...Program Level:
OverviewDelivery Method:
- Group Internet Based
- Group Live
- QAS™ Self Study
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 1 - 4 credits
Description:
This course provides you with some of the essential knowledge and skills to protect sensitive financial data from cyber threats. It covers the fundamentals of cybersecurity, detailing prevalent threa ...Program Level:
OverviewDelivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Are you concerned about the security of your accounting operations and looking to enhance your cyber protection skills? Join this CPE webinar for a concise overview and practical insights on leading c ...Delivery Method:
- QAS™ Self Study
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Learn about the Safeguard Rules cybersecurity mandates which became effective this June and what you might still need to set up. IRS will provide a summary and cover the IRS Written Information Securi ...Program Level:
OverviewDelivery Method:
- Group Live
Location:
- WA
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
The growing risk of tax identity theft and increase in hackers targeting firms offering tax services makes it even more important for tax practitioners to revisit their cybersecurity/information secur ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
The growing risk of tax identity theft and increase in hackers targeting firms offering tax services makes it even more important for tax practitioners to revisit their cybersecurity/information sec ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
- Taxes
Credit Hours:
- 1 - 4 credits
Description:
The growing risk of tax identity theft and increase in hackers targeting firms offering tax services makes it even more important for tax practitioners to revisit their cybersecurity/information secur ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 1 - 4 credits
Description:
You may have already experienced a cybersecurity breach and not even be aware of it. According to the Ponemon Institute report, on average it takes firms 212 days to discover their business was hacked ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 21 + credits
Description:
Increase Your Skills and Knowledge Cybersecurity skills are in high demand, as threats continue to plague enterprises around the world. The ISACA® Cybersecurity Fundamentals Certificate is a knowledge ...Program Level:
FoundationalDelivery Method:
- Group Internet Based
- Group Live
Location:
- MD
-
Cybersecurity in Higher Education
28-Jul-2025 University of Kentucky Auxiliary Services - College Business Management Institute (CBMI)Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Live
Location:
- KY
-
Cybersecurity Issues in ESOP Litigation/DOL Enforcement
29-Apr-2024 National Center for Employee Ownership (NCEO)Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Live
Location:
- FL
-
Field of Study:
- Information Technology
Credit Hours:
- 5 - 8 credits
Description:
This course explores best practices and standards for creating cybersecurity programs and addresses respective education gaps in businesses. It gives attendees the opportunity to gain a better underst ...Program Level:
IntermediateDelivery Method:
- Group Internet Based
-
Cybersecurity Risk Assessment and Employee Benefit Plans: Fiduciaries' Duty to Protect Plan Information
15-Aug-2019 Barbri, Inc.Field of Study:
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
Delivery Method:
- Group Internet Based
-
Field of Study:
- Auditing
Credit Hours:
- 1 - 4 credits
Description:
One of the top concerns of any organization’s leadership is how to mitigate the risk of cybersecurity threats, along with the prevention and detection of fraud. This course will focus on the most comm ...Program Level:
BasicDelivery Method:
- Group Internet Based
-
Cybersecurity Simplified: A Strategic Plan for Small Biz Protection (CSP)
Fred Pryor Seminars and CareerTrack, divisions of Pryor Learning Solutions, Inc.Field of Study:
- Business Management and Organization
Credit Hours:
- 1 - 4 credits
Description:
Cyber security attacks against companies continue to increase, despite efforts to expand investments in security technologies, improve capabilities and tighten policies. As the appointed guardian of y ...Program Level:
BasicDelivery Method:
- QAS™ Self Study
-
Field of Study:
- Computer Software and Applications
Credit Hours:
- 9 - 12 credits
Description:
The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked tec ...Program Level:
OverviewDelivery Method:
- QAS™ Self Study
-
Cybersecurity: How to Deal with the Risks, Hidden Threats & the Latest Financial Reporting Disclosures
The Center for Professional Education, Inc.Field of Study:
- Accounting
Credit Hours:
- 9 - 12 credits
Description:
This self-study webinar is designed to show financial and accounting professionals the best ways to deal with today’s toughest cybersecurity issues. You’ll learn core principles and proven techniques ...Delivery Method:
- QAS™ Self Study
-
Cybersecurity: How to Deal with the Risks, Hidden Threats and the Latest Financial Reporting Disclosures
The Center for Professional Education, Inc.Field of Study:
- Accounting
Credit Hours:
- 5 - 8 credits
Description:
In this webinar, you will learn core principles and proven techniques to successfully safeguard your organization from cyberattacks and effectively deal with breaches when they occur. You will also le ...Delivery Method:
- Group Internet Based
-
Field of Study:
- Information Technology
Credit Hours:
- 1 - 4 credits
Description:
This 50-minute session is designed to empower tax professionals with the essential knowledge and skills to effectively identify and mitigate common cybersecurity threats and vulnerabilities within the ...Program Level:
OverviewDelivery Method:
- Group Internet Based
- Group Live
- QAS™ Self Study
-
Credit Hours:
- 5 - 8 credits
Description:
Businesses of all sorts, including CPA firms, financial institutions, law firms, and most others, must be concerned for their online security. Vital and personal data is at risk. This 8.0 credit hour ...Program Level:
IntermediateDelivery Method:
- Group Live
Location:
- WI
-
Credit Hours:
- 5 - 8 credits
Description:
This 7.0 hour live lecture presentation is relavent to accountants as cyberattacks and network attacks are often targeted against financial services and threaten their clients and customers. It is imp ...Program Level:
IntermediateDelivery Method:
- Group Internet Based
- Group Live
Location:
- WI
-
Field of Study:
- Specialized Knowledge
Credit Hours:
- 1 - 4 credits
Description:
In this two-hour LIVE webcast, a panel of distinguished professionals and thought leaders assembled by the Knowledge Group will provide the audience with an in-depth discussion of D&O Liability Insura ...Delivery Method:
- Group Internet Based
Location:
- NJ
-
Dale Carnegie Course: Effective Communications & Human Relations (12-week)
01-Jan-2010 Dale Carnegie TrainingField of Study:
- Business Management and Organization
- Personal Development
Credit Hours:
- 21 + credits
Description:
Program Level:
noviceDelivery Method:
- Group Live
Location:
- AK
- AL
- American Samoa
- AR
- AS
- AZ
- CA
- CNMI
- CT
- CO
- DC
- DE
- FL
- GA
- GU
- HI
- IA
- ID
- IL
- IN
- KS
- KY
- LA
- MA
- MD
- ME
- MI
- MN
- MO
- MS
- MT
- NC
- ND
- NE
- NH
- NJ
- NM
- NV
- NY
- OH
- OK
- OR
- PA
- PR
- RI
- SC
- SD
- TN
- TX
- UT
- VA
- VI
- VT
- WA
- WI
- WV
- WY
-
Field of Study:
- Business Management and Organization
- Communications and Marketing
- Personnel/Human Resources
Credit Hours:
- 17 - 20 credits
Description:
Program Level:
NoviceDelivery Method:
- Group Internet Based
- Group Live
Location:
- TX
26112 Results