Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Course Details

Creating Custom Financial Statements using Excel (Course Id 691)

QAS / Registry
  Add to Cart 
Author : Patricia McCarthy, MBA
Course Length : Pages: 22 ||| Review Questions: 6 ||| Final Exam Questions: 10
CPE Credits : 2.0
IRS Credits : 0
Price : $17.95
Passing Score : 70%
Course Type: NASBA QAS - Text - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 691

Description :

Most general ledger packages do a great job of aggregating journal entries and creating a trial balance. Where many fall short is in the presentation of financial information in the form of financial statements. Many have default financial statements that conform to the presentation needs of a manufacturing entity or a wholesaler, but are not very flexible beyond that. If they do provide for customizable financial statement formats, it can be a difficult and time consuming process.

The good news is that using Excel to prepare custom financial statements from a trial balance is a relatively easy and straightforward process. If the general ledger account numbers already have financial statement mapping embedded in them, the process is a few simple steps. If the general ledger account numbers do not indicate the appropriate financial statement line item, there is one intermediate step that provides a map to the financial statement from the trial balance.

Using the techniques in this course, you can create custom financial statements in any form or format that is necessary using Excel.

Usage Rank : 15000
Release : 2015
Version : 1.0
Prerequisites : None
Experience Level : Overview
Additional Contents : Complete, no additional material needed
Additional Links :
Advance Preparation : Should have familiarity with formulas and functions
Delivery Method : QAS Self Study
Intended Participants : Anyone needing Continuing Professional Education (CPE)
Revision Date : 01-Mar-2024
NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
Approved Audience :

NASBA QAS - Text - NASBA Registry - 691

Keywords : Computer Science, Creating, Custom, Financial, Statements, using, Excel, cpe, cpa, online course
Learning Objectives :

Course Learning Objectives

Upon completion of this course, you should be able to:
    • Define certain text functions and use them to capture a portion of a general ledger account number
    • Recognize the uses of the SUMIF function
    • Define and use the VLOOKUP function
    • Associate the INDIRECT function with referencing Excel worksheets
Course Contents :

Chapter 1 - Creating Custom Financial Statements using Excel

Course Learning Objectives

Course Overview

Trial Balance with Financial Statement Mapping Embedded in the Account Number

LEFT, RIGHT and MID Excel Functions

Creating the Balance Sheet

Handling a Trial Balance with No Financial Statement Mapping in the Account Number

Using the INDIRECT Function

Review Questions

 

Review of Excel Functions Utilized

The SUM Function

Working with Text

The SUMIF Function

The VLOOKUP Function

Summary

Review Questions

 

Glossary

Excel Course 691 Home: https://www.cpethink.com/excel-cpa-courses
Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
  
Exam completed on .

Do you want to add the course again?