CITP Learning Pathway: Information Security & Cyber Risks (Module 1)
Complement your accounting background with important emerging technologies related to cyber and information security. Acquire essential competencies in your pathway to becoming a CITP credential holder for professional growth.
NASBA Field of Study
Defend against cybersecurity risks
Develop a robust strategy to assess cyber risk, detect threats, and plan for recovery in the event of a breach in your business.
Meet your professional cybersecurity goals at your own pace, at times convenient to you, through engaging, online explanations of information security and cyber risk subject matter, as set forth in the CITP Credential Body of Knowledge.
Gain new skills
Learn new skills — or enhance your existing competency — in key areas
- Information security governance
- Cybersecurity risk management
- SOC for Cybersecurity
Maintain your existing CITP credential
If you already have a CITP credential, you can earn CPE credits needed to maintain the CITP credential.
Bonus optional application exercises help apply the learning in real-world scenarios — though note that this bonus material is strictly for your enhancement and does not provide CPE credit.
CITP Exam prep
Get a leg up on CITP Exam preparation by learning essential skills and competencies in the areas of information security and cyber risk (Module I) of the CITP Credential Body of Knowledge, which accounts for 40% of the subject matter covered on the CITP Exam.
If you are interested in additional education specific to the CITP Credential Body of Knowledge, check out IT Governance Risks & Controls (Module III), which emphasizes:
- IT governance & strategy
- IT risks, process & controls
- System and Organization Controls (SOC) Reporting
- CITP credential candidates (professionals and students)
- Existing CITP credential holders
- Accounting professionals
- Finance professionals
- Elements of security policy
- Logical and physical access controls
- Network and system security controls
- Business continuity planning and disaster recovery
- Cyberattacks, data breaches, and privacy
- Cybersecurity frameworks and regulations
- Cybersecurity risk management considerations and controls
- Components of cybersecurity risk management program
- Recognize and differentiate information security policies and strategies to guide the development of standards and procedures, in alignment with organizational goals and objectives
- Identify and differentiate among the four types of access control: identification, authentication, authorization, and accountability.
- Determine the proper steps to implement comprehensive business continuity, disaster recovery, and incident response plans.
- Determine the major threat vectors for systems, including cyber adversaries, the cybercrime economy, and various types of attacks.
- Understand data breach implications and privacy considerations.
- Compare and contrast controls to mitigate cybersecurity risks.
- Analyze the components of an organization's cybersecurity risk management program.
- Apply the SOC for Cybersecurity report, including report content, target users, and use of the report in conjunction with an entity’s overall cybersecurity risk mitigation strategy.
Group ordering for your team
The Association is dedicated to removing barriers to the accountancy profession and ensuring that all accountancy professionals and other members of the public with an interest in the profession or joining the profession, including those with disabilities, have access to the profession and the Association's website, educational materials, products, and services.The Association is committed to making professional learning accessible to all product users. This commitment is maintained in accordance with applicable law. For additional information, please refer to the Association's Website Accessibility Policy. As part of this commitment, this product is closed-captioned. For additional accommodation requests please contact firstname.lastname@example.org and indicate the product that you are interested in (title, etc.) and the requested accommodation(s): Audio/Visual/Other. A member of our team will be in contact with you promptly to make sure we meet your needs appropriately.