How to Build a Successful Cybersecurity Program
Learning objectives
After completing this course, the learner should be able to:
- Define information security
- Define the role of the cybersecurity professional
- Identify the components of a cybersecurity program
- Define and identify B.Y.O.D. (bring your own device) and its danger
- Define the IoT (Internet of Things)
- Define the NIST Cybersecurity Framework
- Identify risks associated with third-party access and the importance of vetting
- Define the importance of cybersecurity training for employees
A Becker Professional Education is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org
Becker Professional Education Sponsor I.D. Numbers NASBA: 107294, New York: 002087, New Jersey: 20CE00226700, Texas: 009580, Ohio: CPE.186, Illinois 158.002405, Pennsylvania: PX177823