K2’s Securing Your Data – Practical Tools for Protecting Information
Information Technology
4 CPE Credits
Major Topics
- Understanding today’s cybersecurity risks
- Identifying major cybersecurity risks
- Implementing specific steps to reduce risk
Learning Objectives
- Assess the relevant security risks in your organization
- Identify specific tools and techniques to protect sensitive data
- List five specific steps to improve PC security
- Differentiate between security procedures to improve organizational security
Description
Security is not optional, and yesterday’s security techniques do not minimize today’s threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. This program will teach you the latest tools and techniques for securing your data, including encryption, virus protection, safe communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the questions you should ask your staff to ensure server-based information remains protected.
Security failures, such as client or customer data breaches, are costly – they can even drive your company out of business. So, what security tools do you need, and how should you use them to secure your sensitive data and systems? Can you risk attempting to manage today’s threats using yesterday’s techniques? Participate in this program to learn how to identify viable and practical solutions to mitigating today’s security threats.
Compliance Information
Overview
Security is not optional, and yesterday’s security techniques do not minimize today’s threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. This program will teach you the latest tools and techniques for securing your data, including encryption, virus protection, safe communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the questions you should ask your staff to ensure server-based information remains protected.
Security failures, such as client or customer data breaches, are costly – they can even drive your company out of business. So, what security tools do you need, and how should you use them to secure your sensitive data and systems? Can you risk attempting to manage today’s threats using yesterday’s techniques? Participate in this program to learn how to identify viable and practical solutions to mitigating today’s security threats.
Course Details
- Powerful new functions and features in Excel, such as XLOOKUP and Dynamic Arrays
- How to use “legacy” features and functions such as AGGREGATE
- Creating effective forecasts in Excel
- Identify conditions in which the FORECAST.ETS function is preferable to the FORECAST function
- List examples of best practices for constructing formulas in Excel spreadsheets
- Identify situations in which each of the following functions might be useful: SUMIFS, SWITCH, and STOCKHISTORY
- Distinguish between the XLOOKUP function and legacy Excel functions such as VLOOKUP, HLOOKUP, INDEX, and MATCH
- Cite examples of when using Dynamic Arrays would be useful
- Differentiate between Excel’s AGGREGATE and SUBTOTAL functions
Intended Audience — Business professionals who work with Excel and want to extend their knowledge of advanced features and functions to become more accurate, effective, and efficient with spreadsheets
Advanced Preparation — None
Field of Study — Computer Software and Applications
Credits — 4 Credits
IRS Program Number –
Published Date – November 2, 2022
Revision Date –