K2's Tales of True Tech Crimes - Ripped From the Headlines - On Demand (2 hours)

K2's Tales of True Tech Crimes - Ripped From the Headlines - On Demand (2 hours)

  • $79.00


Course Description

2020 was an exceptional year for everyone, and like everyone, the hackers, scammers, and other technology criminals took advantage of new opportunities brought by COVID.  Criminals reportedly used innovative approaches to exploit weaknesses created by the pandemic.  You will learn tips and techniques from these events to help protect you, your company, and your data. 

Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.

Major Topics

  • Common security weaknesses that occur with hardware and software at home and in the office
  • Malware, ransomware, data breach, and incident response tips
  • Internal control failures resulting in the theft of assets or unauthorized manipulation of data
  • User authentication and security awareness training

Learning Objectives

Upon completing this course, you should be able to:

  • List at least three major security incidents reported in the headlines in the last year and explain at least one primary control design or operation flaws that allowed the hack to occur
  • Select the correct definitions from a list of standard security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
  • Explain why home-grade computer hardware and applications are sometimes less secure than business and enterprise-grade hardware and applications
  • List at least three best practices learned because of reviewing the incidents cited in the case studies

      Course Information

      • CPE credit: 2 hours Information Technology
      • Prerequisites: Fundamental knowledge of basic technological and security concepts
      • Program level: Intermediate
      • Advance preparation: None
      • Who should participate: Business professionals who are seeking to enhance the security surrounding both personal and organizational data

      Instructional Delivery Method: QAS on-demand learning, including review and final exam questions. To earn credit, participants must pass the final exam with a score of 70% or better within one year of registering for this course. Participants may attempt take the final exam up to 10 times.