Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Course Details

Excel Magic: Building Dynamic Formulas (Video) (Course Id 1776)

QAS / Registry
  Add to Cart 
Author : Lenny Wu, CPA, CGA, MBA
Course Length : Pages: 24 ||| Review Questions: 5 ||| Final Exam Questions: 8
CPE Credits : 1.5
IRS Credits : 0
Price : $21.95
Passing Score : 70%
Course Type: Video - NASBA QAS - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 1776

Description :

The course is presented in four parts.

First, the course relates earlier course of Top 5 Excel Skills to drive the concept home: Dynamic formulas are your “first” step toward full automation in Excel Modeling!

Next, the course brings the topic of what is a dynamic formula and let students consider if VLOOKUP() is a dynamic formula? It is only a semi-dynamic formula.

Third, we illustrate the top 10 dynamic formulas, including:

  • Dynamic range formula
  • Table formula
  • Conditional formula,
  • SUMPRODUCT()
  • INDIRECT/ADDRESS
  • Array formula

Last, the course explores latest features from Excel 365 that are considered by many to be amazing. They include:

  • SORT()
  • XLOOKUP()

Please Note: This course’s author is working on the providing transcripts, PDFs, and slides where applicable. Unfortunately until then we will not be able to offer them with the course but felt the course was valuable enough as it is so have chosen to include it on our site. Our sincere apologies for any inconvenience and please let us know any question using the support bubble on the bottom right of all pages on our site.

Usage Rank : 15000
Release : 2021
Version : 1.0
Prerequisites :
  • Basic Excel knowledge
  • Example: be able to open one Excel file and connect to external data files, etc.
  • Experience Level : Overview
    Additional Contents : Complete, no additional material needed.
    Additional Links :
    Advance Preparation :
  • Basic Excel knowledge
  • Example: be able to open one Excel file and connect to external data files, etc.
  • Delivery Method : QAS Self Study
    Intended Participants : Anyone needing Continuing Professional Education (CPE).
    Revision Date : 01-Mar-2024
    NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
    Approved Audience :

    Video - NASBA QAS - NASBA Registry - 1776

    Keywords : Computer Software & Applications, Excel, Magic, Building, Dynamic, Formulas, Video, cpe, cpa, online course
    Learning Objectives :

    Course Learning Objectives

    After this course, you will be able to:
    • Understand the difference between a simple formula and a dynamic formula
    • Identify 2 elements to make a dynamic formula
    • Recognize top 10 dynamic formulas covered in this course
    • Discover 3 advanced dynamic formulas that make Excel modeling super easy
    • Explore new features on dynamic array formulas that Excel 365 brings

    Course Contents :

    Chapter 1 - Excel Magic: Building Dynamic Formulas

    Section 1: Introduction

    Lecture 1: Introduction

    Lecture 2: RECAP of Prior Excel Course: Top 5 Excel Skills

    Lecture 3: Hierarchy of Excel Modeling Techniques

    Lecture 4: Instructor

    Lecture 5: Other similar courses

    Lecture 6: What you will get from this course?

    Section 2: Dynamic Formulas - Basic

    Lecture 7: Intro to Dynamic Formulas

    Lecture 8: References: Absolute vs relative reference

    Lecture 9: Conditional formulas: IF()

    Lecture 10: Table formula

    Section 3: Dynamic Formulas - Intermediate

    Lecture 11: Lookup formula: INDEX/MATCH

    Lecture 12: Lookup and sum formulas: SUMPRODUCT/SUMIF/SUMIFS

    Lecture 13: Multi-tab formula: SUM(START:END!)

    Lecture 14: Link to Pivot Table formula: GETPIVOTDATA()

    Section 4: Dynamic Formulas - Advanced

    Lecture 15: Parameterized formulas: INDIRECT/ADDRESS

    Lecture 16: Dynamic range formula: OFFSET

    Lecture 17: Array formulas

    Section 5: New Feature Excel 365: Dynamic Array formulas

    Lecture 18: Dynamic Array Formulas (Excel 365): SORT

    Lecture 19: Dynamic Array Formulas (Excel 365): XLOOKUP

    Lecture 20: Dynamic Array Formulas (Excel 365): Spill Range

    Section 6: Conclusion

    Lecture 21: Takeaways

    Lecture 22: Next Course and Q&A

    Chapter 1 Review Questions

    Glossary

    CPE Computer Software & Applications Course: https://www.cpethink.com/excel-cpa-courses
    Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
      
    Exam completed on .

    Do you want to add the course again?