Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Course Details

Use Pivot Tables to Organize, Summarize and Analyze Data (Course Id 1117)

QAS / Registry
  Add to Cart 
Author : Patricia McCarthy, MBA
Course Length : Pages: 0 ||| Review Questions: 0 ||| Final Exam Questions: 25
CPE Credits : 5.0
IRS Credits : 0
Price : $44.95
Passing Score : 10%
Course Type: NASBA QAS - Text - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 1117

Description :

This Excel pivot table course will help you get out of all of that data. It will show you how to quickly organize and summarize your data so that you can analyze it. The course covers everything that you need to know about pivot tables. It starts with having you create a pivot table and then modify and format it. It discusses how to drill down as well as how to create multiple reports from one pivot table. It also discusses how to create and add other formulas and items to an existing pivot table. Finally, it shows you how to update your pivot table with new data without recreating it every time. Using pivot tables to analyze data is one of, if not the best, features in Excel. Pivot Tables are a huge time saver if you are working with lots of data. There is an accompanying Excel file that allows you to walk through the examples in the eBook.

Usage Rank : 17727
Release : 2020
Version : 1.0
Prerequisites : A good understanding of Excel is needed. This Excel pivot table class is designed for users of Excel 2019 and Microsoft 365 users but Excel 2010 and 2013 users should experience little difficulty.This course is NOT intended for 2007 or earlier versions of Excel. It assumes a familiarity with Excel and is intended for an intermediate Excel user.
Experience Level : Overview
Additional Contents : Complete, no additional material needed.
Additional Links :
Advance Preparation : None.
Delivery Method : QAS Self Study
Intended Participants : Anyone needing Continuing Professional Education (CPE).
Revision Date : 01-Mar-2024
NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
Approved Audience :

NASBA QAS - Text - NASBA Registry - 1117

Keywords : Computer Science, Use, Pivot, Tables, Organize, Summarize, Analyze, Data, cpe, cpa, online course
Learning Objectives :

Course Objectives

Learn how to manage and organize data more effectively and transform it into information.

Learning Objectives:

By the end of this course, participants will be able to:
  • Identify a PivotTable and its components and defaults
  • Identify the steps needed to create a Pivot Table
  • Recognize the steps needed to modify and format a pivot table
  • Recognize how to use and modify slicers
  • Recognize how to create fields, items and calculations in a Pivot Table
  • Identify how to change and or update underlying data
  • Recognize how to create a PivotTable Charta and how it differs from a regular chart
  • Identify methods to update a pivot table and locate its data source
Course Contents :

Chapter 1 - Use Pivot Tables to Organize, Summarize and Analyze Data

Course Objectives

Pivot Table Overview

Creating a Pivot Table

Rearranging a Pivot Table

Rearrange data in a Pivot Table by right-clicking a field name

Rearrange data in a Pivot Table by dragging a field name into the Pivot Table

Rearrange data in an existing Pivot Table.

To Add a Field to the Pivot Table

To Remove a Field from the Pivot Table

Review Questions - Section 1

Modify a Pivot Table

Filtering/Hiding Data

Hide a Single Field using the Pivot Table Fields Pane

Hiding an Item using Selected Items

Slicers

Slicers Properties

Sorting and Grouping

Creating A Sort Group

Drill Down – the Detail

Creating Multiple Reports from one Pivot Table:

Grouping

Ungroup

     

Review - Feedback Exercise!

Grouping Dates

Review/Feedback Exercise

Review Questions - Section 2

PivotTable Calculations

Summarizing A Value Field

Formatting Calculations

Subtotals and Totals

Totals

Using Excel preset calculations

Create calculated fields within a Pivot Table

Create a calculated item within a Pivot Table

Modifying/Deleting Calculated Fields and Items.

Formula List

Auto Formatting a Pivot Table

PivotTable Styles Gallery

To remove a Pivot Table style

To Format a PivotTable

To Format individual parts of the PivotTable

Subtotals and Totals

Review Questions - Section 3

Pivot Table Charts

Creating a Pivot Chart  from Excel Data

Creating Pivot Chart from a Pivot Table

Pivot Charts in earlier Excel versions  (Excel 2013 or earlier)

Review Questions - Section 4

Options

Data Source

Automatically update your Pivot Table with new data

Create a Table

Create a Dynamic Range

GET PIVOT DATA

Review/Feedback Exercise

Review Questions - Section 5

Links for Spreadsheets

Glossary

CPE Computer Science Course: https://www.cpethink.com/excel-cpa-courses
Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
  
Exam completed on .

Do you want to add the course again?