After completing this course, the learner should be able to:
- Identify security risks and apply risk mitigation strategies.
- Recognize security management concepts.
- Identify physical security risks and define appropriate access controls.
- Identify different data states and the risk mitigations used to protect the data.
- Identify application security risks and define appropriate mitigations.
- Recognize how network attacks work and their countermeasures.
- Recognize security considerations for cloud-based systems.
- Identify PCI data security standards to business-as-usual best practices.
- Recognize threat vulnerabilities and define security plans.
- Identify an incident response plan.
- Identify cybersecurity preparedness through assessment processes.
Michael Potenza is both a CPA and a JD. He received his Bachelor of Engineering in Civil Engineering from the Cooper Union, his Master of Engineering in Structural Engineering also from the Cooper Union, his Master of Science in Accounting from Devry University, and finally his Juris Doctorate from St. John’s Law School. In 1998, Mike began teaching for Becker and also as an adjunct professor at Fordham University. He taught at Fordham until 2008. In 2001, Mike developed a graduate Information Technology course at New York University and taught the course at NYU from 2001 to 2003. Mike spends a large portion of his time managing Point & Click, Inc., a computer consulting corporation, where he serves a dual role as CEO and in-house counsel for more than twenty years. Currently, Mike teaches REG, BEC and FARE for Becker, he is the Lead Faculty Instructor in NY and a Becker national instructor.
Becker Professional Education Sponsor I.D. Numbers NASBA: 107294, New York: 002087, New Jersey: 20CE00226700, Texas: 009580, Ohio: CPE.186, Illinois 158.002405, Pennsylvania: PX177823