Course Description


Course Description


Did you know that the financial industry is the 3rd most common target for cyber attacks in the US? To make matters worse, evidence indicates that it's not a matter of if you get hacked, it's a matter of when you will get hacked. Fortunately you can help to protect your company from attacks and/or mitigate the impact of an attack by learning about the threats and solutions. 


This online, self-paced course will provide you with the knowledge, skills, and tools to start you on a path to a more secure future. The first module will equip you with basic knowledge of the scams, malware, and mistakes that commonly result in cyber attacks. In the second module, you will apply and expand upon this new knowledge by creating a Business Continuity Plan for your company (or a mock company if you so choose). The data you provide will result in a robust map of your company's business processes and the associated cybersecurity risk levels. You can take this map with you after the course to enact real change in your company. 


In the final module, you will delve into the NIST Cybersecurity Framework to discover the core functions and associated security controls that can help your company (1) IDENTIFY assets, (2) PROTECT against future attacks, (3) DETECT current attacks, (4) RESPOND appropriately during an attack, and (5) RECOVER from an attack. You will then use this knowledge and your Business Continuity Plan to create a Target Profile that represents where your goals for improving your company's cybersecurity strategies after you complete the course.

Learning Objectives

Upon completion of this course, participants will be able to:

  • Identify the most common cyber scams and malware.
  • Analyze case studies of major cyber attacks and identify ways by which the companies could have prevented the attacks.
  • Explain the importance of creating a Business Continuity Plan.
  • Create your Business Continuity Plan. 
  • Analyze and define the risk-level of your business processes.
  • List and describe the core functions of the NIST Cybersecurity Framework.
  • Align each security control with the appropriate NIST CSF core function.
  • Explain the importance of creating a target cybersecurity profile.  
  • Create a target cybersecurity profile.

Instructional Delivery Methods

The course content will be delivered through a variety of methods including:

  • Text
  • Video
  • Interactive Questionnaires
  • Downloadable Handouts

Format, Field of Study, and Credit 

This is a QAS Self-Study course that aligns with the NASBA Information Technology Field of Study and results in 3.5 CPE Credits
Chalk & Tablet is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors.
 State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org.

Knowledge Level, Prerequisites, and Preparation

This course does not require participants to be from a particular field of study and requires only a basic knowledge level of CPA business practices. No prerequisites or advance preparation are required for successful completion of this course.

Registration, Cancellation, and Refunds


Participants may cancel their enrollment for a full refund within 2 hours of  enrollment. If enrollment is canceled between 2 and 24 hours after registration, participants will receive a 75% refund or 100% credit towards a similar Chalk & Tablet offering. Cancellation after the 24 hour grace period will result in a 0% refund or a 90% credit. 


If Chalk & Tablet or Element Security Group C&T must cancel or reschedule an offering, all efforts will be made to communicate this change to participants via the preferred contact method specified by participants at registration (email or phone). Participants will have the option to withdraw their registration for a full refund or apply their registration fee to the rescheduled offering or a different Chalk & Tablet offering of the same format.   

Refunds will be issued within 30 days in the same format as the payment was received. If participants paid with a credit card, their refund will equal the specified percentage of the course fee minus the 3.5% credit card fee that is non-refundable.

Complaint Resolution 

To file a complaint regarding this offering, please contact Chalk and Tablet at [email protected].


Adam Anderson

Subject Matter Expert and Virtual InstructorAdam Anderson, Founder and CEO of Element Security Group, serves as the subject matter expert and virtual instructor for this course. Adam is an entrepreneur and published author in the field of information technology and cybersecurity. He is the founder and Chairman of Palmetto Security Group (PSG), an IBM Premier Business Partner that resells IBM software and offers professional services around the IBM Security Suite of products. PSG has generated over $20MM in revenues over 11 years and has provided employment for over 40 people.Adam’s 15 years of entrepreneurial startup experience and his knowledge of Enterprise Cyber Defense gives him a window into what’s wrong with communication between large and small companies. He combined this knowledge and the good works from the National Institute of Standards and Technology’s Cyber Security Framework to co-author the book “Small Business Cyber Security”. This book was later turned into an online class by Clemson University.Adam has been active in peer advisory boards for small business CEOs. He took this experience and co-founded a peer advisory board for Chief Security Officers of fortune 500 companies. This mix of small and large businesses has positioned Adam as one of the few people in the world to understand the complete supply chain of cybersecurity.ContactAdam Anderson [email protected] Development Group Chalk & Tablet serves as the instructional design team, lead program developer, and NASBA CPE provider for this course. Chalk & Tablet is a Limited Liability Company that works with a variety of organizations to create customized eLearning solutions, enhance existing training, redefine outreach with eLearning tools, and maximize the return on their investment. The primary Chalk & Tablet team consists of co-owners, Ginny Moore and Candice Rutherford. Dr. Moore earned a B.A. and M.A. in Education and an Ed.D. in Curriculum and Instruction. She has 13 years of professional experience as an educator, instructional designer, and program director. Mrs. Rutherford has a B.A. in Education and an M.A. in Educational Technology, and has 16 years of professional experience as an educator, instructional designer, and educational technologist. Chalk & Tablet ensures the highest quality educational experience for participants by combining their internal expertise with that of hand-picked, highly-qualified subject matter experts. Continuing education is not only Chalk & Tablet's area of expertise, but also their passion. Our extensive work with universities, corporations, and organizations throughout the country has demonstrated how the engaging learning experiences we create help individuals hone their skills and grow professionally.ContactChalk & [email protected]

Course curriculum

  • 1

    Getting Started

    • Meet the Instructor

    • Course Introduction Video

    • Course Outline

  • 2

    MODULE 1 | WHY SHOULD I CARE ABOUT CYBERSECURITY?

    • Module 1 Introduction

    • Lesson 1.1 | Common Scams & Malware

    • Lesson 1.2 | Importance of Information Security

    • Module 1 Checkpoint

  • 3

    MODULE 2 | IS MY COMPANY AT RISK?

    • Module 2 Introduction

    • Lesson 2.1 | Business Continuity Plan Part 1

    • Lesson 2.2 Resources

    • Lesson 2.2 | Business Continuity Plan Part 2

    • Lesson 2.3 | Risk Score Overview

    • Lesson 2.4 | Risk Score Analysis

    • Module 2 Checkpoint

  • 4

    MODULE 3 | HOW CAN I MITIGATE RISK?

    • Module 3 Introduction

    • Lesson 3.1 | NIST Cybersecurity Framework

    • Lesson 3.2 | Mitigating Risk through Security Controls

    • Lesson 3.3 | Building Your Target Profile

    • Module 3 Checkpoint

  • 5

    Final Exam

    • CPE-Qualified Exam

    • Course Evaluation Survey

    • Video Send Off

  • 6

    Additional Learning Materials

    • Questionnaire Text & Videos

    • Key Terms Flashcards