Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Course Details

Advanced Pivot Table: Ticket to Self-service Dashboards (Video) (Course Id 1774)

QAS / Registry
  Add to Cart 
Author : Lenny Wu, CPA, CGA, MBA
Course Length : Pages: 28 ||| Review Questions: 5 ||| Final Exam Questions: 8
CPE Credits : 1.5
IRS Credits : 0
Price : $21.95
Passing Score : 70%
Course Type: Video - NASBA QAS - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 1774

Description :

The course is presented in four parts.

First, the course illustrates where does pivot table stand in the Excel Techniques, and brings up the topic of when to and when NOT to use a pivot table.

Second, the course illustrates how to build a self-service dashboard using:

  • pivot tables
  • pivot charts
  • slicers
  • timeline

Third, the course provides 5 extreme hacks for pivot tables including:

  • How to collapse 12 months data into 1 field?
  • How to break free of Pivot Tables?
  • How to use Power Pivot without opening Power Pivot?
  • How to connect tables without using VLOOKUP()?

Last, the course explores best practices in building a dashboard. They include:

  • Do follow data table naming convention
  • Do fix changing column width
  • Do keep column/bar charts sorted
  • Do add a heat map for pivot tables

Please Note: This course’s author is working on the providing transcripts, PDFs, and slides where applicable. Unfortunately until then we will not be able to offer them with the course but felt the course was valuable enough as it is so have chosen to include it on our site. Our sincere apologies for any inconvenience and please let us know any question using the support bubble on the bottom right of all pages on our site.

Usage Rank : 20000
Release : 2021
Version : 1.0
Prerequisites :
  • Basic Excel knowledge
  • Basic Pivot Table knowledge
  • Example: be able to build a simple Pivot Table from scratch in seconds, etc.
  • Experience Level : Overview
    Additional Contents : Complete, no additional material needed.
    Additional Links :
    Advance Preparation :
  • Basic Excel knowledge
  • Basic Pivot Table knowledge
  • Example: be able to build a simple Pivot Table from scratch in seconds, etc.
  • Delivery Method : QAS Self Study
    Intended Participants : Anyone needing Continuing Professional Education (CPE).
    Revision Date : 01-Mar-2024
    NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
    Approved Audience :

    Video - NASBA QAS - NASBA Registry - 1774

    Keywords : Computer Software & Applications, Advanced, Pivot, Table, Ticket, Self-service, Dashboards, Video, cpe, cpa, online course
    Learning Objectives :

    Course Learning Objectives

    After this course, you will be able to:
    • Understand crucial elements and skills in building a dashboard
    • Recognize ways of building inter-connected data models for pivot tables and Power Pivot
    • Discover 5 extreme Pivot Table hacks
    • Recognize differences between GETPIVOTDATA() and CUBEVALUE()
    • Understand 7 best practices of building pivot tables in a dashboard

    Course Contents :

    Chapter 1 - Advanced Pivot Table: Ticket to Self-service Dashboards

    Section 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Hierarchy of Excel Techniques

    Lecture 3: Author

    Lecture 4: How this course is compared with “other similar courses”?

    Lecture 5: What you will get from this course?

    Section 2: Pivot Table and Self-service Dashboard

    Lecture 6: Dashboard 1 - Artificial Intelligence function

    Lecture 7: Dashboard 2 - Pivot chart

    Lecture 8: Dashboard 3 - Top 10 List

    Lecture 9: Dashboard 4 - Value ranges

    Lecture 10: Dashboard 5 - Slicer

    Lecture 11: Dashboard 6 - Timeline

    Lecture 12: Dashboard 7 - How to control multiple pivot tables?

    Section 3: Extreme Pivot Table Hacks

    Lecture 13: How to collapse 12 months data into 1 field?

    Lecture 14: How to use Power Pivot without opening Power Pivot?

    Lecture 15: How to connect tables without using VLOOKUP()?

    Lecture 16: How to build a dynamic financial report on a pivot table?

    Lecture 17: How to break free of Pivot Tables?

    Section 4: Best Practices - Pivot Tables in a Dashboard

    Lecture 18: Best Practice No. 1

    Lecture 19: Best Practice No. 2

    Lecture 20: Best Practice No. 3

    Lecture 21: Best Practice No. 4

    Lecture 22: Best Practice No. 5

    Lecture 23: Best Practice No. 6

    Lecture 24: Best Practice No. 7

    Section 5: Conclusion

    Lecture 25: Takeaways

    Lecture 26: Q&A

    Chapter 1 Review Questions

    Glossary

    CPE Computer Software & Applications Course: https://www.cpethink.com/excel-cpa-courses
    Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
      
    Exam completed on .

    Do you want to add the course again?