Skip to content

Access 102

    Current Status
    Not Enrolled
    Price
    Closed
    Get Started
    This course is currently closed

    Access for Remote Professionals

    Course Description

    Explore access factors from connectivity to cybersecurity. Learn the basics of technology tools for remotes to staying safe when online. Complete all Access (PRO) lessons successfully which counts toward your Remote Professional Certificate.   

    Learning Goals

    1. Define important concepts related to information technology.
    2. Examine factors associated with technology policies and support.
    3. Differentiate factors that affect internet speed.
    4. Apply cybersecurity strategies for more secure operations in the remote environment.  
    5. Compare and contrast various tools for remote workers.
    6. Create a Professional Code of Ethics for Access.

    Research and References

    Following are sources consulted/additional readings related to the course topics.

    Adams, J.S., Tashchian, A., & Shore, T. (2001). Codes of ethics a signals for ethical behavior. Journal of Business Ethics, 29, 199-211.

    Barquin, R. C. (1992). In pursuit of ‘ten commandments’ for computer ethics. Computer Ethics Institute.

    Choudhury, P., Star, E., Teodoovicz, T. (2022). Work-from-anywhere as a public policy: 3 findgins from the Tulsa remote program. Harvard Business Review.

    Cisco. (2021) Cybersecurity threat trends: Phishing, crypto top the lists. Cisco.com 

    Cooper, S. (2022). The Best Free Remote Desktop Software for 2022. 

    Cybersecurity basics. (n.d.). Federal Trade Commission. www.ftc.gov

    FBI Internet Crime Complaint Center (IC3). 2022. On the Internet, Be Cautious When Connected. FBI.gov 

    Gomez, M. (2020). Set yourself up to effectively work from home or learn remotely. Ookla.com 

    Holsin, P. (2022). What are hotspots and how do they work? HighSpeedInternet.com 

    IBM. (2022). Cost of a data breach 2022: A million-dollar race to detect and respond. IBM.com 

    IBM. (2022a). What is cybersecurity? IBM.com 

    Ladd, J. (1985). The quest for a code of professional ethics, in D.G. Johnson and J.W. Snapper (eds.) Ethical issues in the use of computers, pp. 37-38. Wadsworth, Belmont CA.

    Microsoft. (2021).  Microsoft Digital Defense Report. Microsoft.com 

    Nissenbaum, H.(1998). Information technology and ethics. In The Routledge Encyclopedia of Philosophy. Taylor and Francis.

    Ponemon Institute. (2022). Cost of Insider Threats Global Report. Proofpoint.com 

    Speedtest (n.d.). What speeds do I need for streaming or large downloads? Speedtest.net 

    Stone, B. (2022. Best remote desktop software 2022. TechRepublic. 

    Symantec. (2019). International Security Threat Report. 24. 

    Tischer, M., Durumeric, Z., Foster, S., Duan, S., Mori, A., Bursztein, Bailey, E., Bailey, M. (2019). Users really do plug in USB that they find. (2016). IEEE Symposium on Security and Privacy.   

    University of Central Florida. (2020). RAPID: Exploring the Cyber Behaviors of Temporary Work-From-Home (TWFH) Employees. 

    Warburton, D. (2020). Phishing and fraud report. F5 labs. F5.com /