Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

This course is one of a video series that document common issues met in working with Microsoft EXCEL. This course presents 10 cases which have been collected directly from real working environments and are intended to share with professionals using EXCEL so that they can learn how to leverage the tool in “the real world”.

For these cases to be relevant and organized, the course first provides a unique view of the Body of Knowledge (BOK) of EXCEL created by the instructor, which is a first in EXCEL training and publications. The BOK illustrates the usual learning path of an EXCEL learner, naturally from basic to intermediate, and then on to advanced to expert levels. The BOK documents the essential components of EXCEL, such as cells, sheets, files, tables, formulas, commands, macros, pivot tables, and power suite, and is open ended with the top level embracing more esoteric skills and future developments in EXCEL.

Under the guidance of the BOK, all cases are tailored to the corresponding knowledge level so that the learner may ascertain which areas they are good at and which require a bit more work. For each case, the course illustrates what the issues are, why the issues exist, and how to solve them. The course also encourages contributions from audience who believe there may be better ways of resolving these issues. Those suggestions from the audience will be shared and acknowledged in future parts of the series.

This course serves as a refresher for all professionals who need to sharpen their EXCEL skills for professional use.

Excel Challenges: Real Cases from Work - Part 2 (Video) (2 Hrs)
Course Details

Excel Modeling 101: 10 Dos and Donts (Video) (Course Id 1780)

QAS / Registry
  Add to Cart 
Author : Lenny Wu, CPA, CGA, MBA
Course Length : Pages: 22 ||| Review Questions: 5 ||| Final Exam Questions: 8
CPE Credits : 1.5
IRS Credits : 0
Price : $21.95
Passing Score : 70%
Course Type: Video - NASBA QAS - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 1780

Description :

The course is presented in four parts.

First, brief introduction to what is Excel modeling and how to make an Excel model great:

  • Accuracy
  • Simplicity
  • Robustness

Second part brings a not-so-great Excel model as a business case, and introduces a financial report that is supposed to calculated the DSO (Days Sales Outstanding) measure. By examination, this course demonstrates to the audience 10 DONTS in Excel modeling, including:

  • Do NOT copy/paste data multiple files and stack them up
  • Do NOT leave comparable data in different columns
  • Do NOT process data “one at a time”

Third, we demonstrate how to correct the problems and bring up the list of the 10 DOS, including:

  • Connect or link to source data rather than copy and paste.
  • Keep comparable data in the same column
  • Keep related data processing in “one” table!

Last, the course culminates in summarizing the 10 Dos and Don’ts into 4 categories:

  • Data source
  • Data transformation
  • Formulas
  • Validation

Please Note: This course’s author is working on the providing transcripts, PDFs, and slides where applicable. Unfortunately until then we will not be able to offer them with the course but felt the course was valuable enough as it is so have chosen to include it on our site. Our sincere apologies for any inconvenience and please let us know any question using the support bubble on the bottom right of all pages on our site. 

Usage Rank : 13333
Release : 2021
Version : 1.0
Prerequisites :
  • Basic Excel and Power Query knowledge
  • Example: be able to open one Excel file and connect to external data files, etc.
  • Recommended prerequisite: Power Query (Part 1): Ultimate Data Transformation
  • Experience Level : Overview
    Additional Contents : Complete, no additional material needed.
    Additional Links :
    Advance Preparation :
  • Basic Excel and Power Query knowledge
  • Example: be able to open one Excel file and connect to external data files, etc.
  • Recommended prerequisite: Power Query (Part 1): Ultimate Data Transformation
  • Delivery Method : QAS Self Study
    Intended Participants : Anyone needing Continuing Professional Education (CPE).
    Revision Date : 01-Mar-2024
    NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
    Approved Audience :

    Video - NASBA QAS - NASBA Registry - 1780

    Keywords : Computer Software & Applications, Excel, Modeling, 101, 10Dos, Donts, Video, cpe, cpa, online course
    Learning Objectives :

    Course Learning Objectives

    After this course, you will be able to:
    • Establish instant connection to multiple data sources rather than copy/paste and stack-up
    • Structure a table with related data in 1 column for easy pivoting
    • Build uniform formulas in Excel models to avoid errors
    • Recognize effective ways of keeping source data, entry data, and formulas all separate in models
    • Understand how Power Query can help prevent dragging processed data from table to table

    Course Contents :

    Chapter 1 - Excel Modeling 101: 10 Dos and Donts

    Section 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Recap

    Lecture 3: Instructor

    Lecture 4: Other similar courses

    Lecture 5: What you will get from this course?

     Section 2: Excel Modeling

    Lecture 6: Excel Modeling

    Lecture 7: What makes a great model

    Lecture 8: Business Case: How to calculate a 5-week DSO?

    Lecture 9: 10 Dos and Dont's - No. 1

    Lecture 10: 10 Dos and Dont's - No. 2

    Lecture 11: 10 Dos and Dont's - No. 3

    Lecture 12: 10 Dos and Dont's - No. 4

    Lecture 13: 10 Dos and Dont's - No. 5

    Lecture 14: 10 Dos and Dont's - No. 6

    Lecture 15: 10 Dos and Dont's - No. 7

    Lecture 16: 10 Dos and Dont's - No. 8

    Lecture 17: 10 Dos and Dont's - No. 9

    Lecture 18: 10 Dos and Dont's - No. 10

     Section 3: Conclusion

    Lecture 19: Takeaways

    Lecture 20: Next Course and Q&A

    Chapter 1 Review Questions

    Glossary

    CPE Computer Software & Applications Course: https://www.cpethink.com/excel-cpa-courses
    Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
      
    Exam completed on .

    Do you want to add the course again?