Title | Credit | Format | Price | View | |||
+ Accountant's Guide To Computers And Information Technology | 6.0 | Online | $54.99 | View | |||
The course covers what every accountant should know about computers and information systems and technology. The practical and efficient use of computer technology is highlighted. Popular accounting, compliance, taxes, audit, write-up, forecasting and statistical, budgeting and planning, project management, activity-based accounting (ABC) software are explained for easy use. The importance of information system and data protection, data bases, artificial intelligence and expert systems, client/server computing, and telecommunications are discussed. The course also teaches you how to make lease-purchase decisions and analyze and evaluate information technology (IT) investments.
Click here for Course Objectives
Additional Contents : Complete, no additional material needed |
|||||||
+ Computer and Data Security Basics for the CPA | 1.0 | Online | $14.99 | View | |||
Course Description
Upon completion of this course, you should be able to: · Recognize importance of computer and data security techniques · Recognize and understand how different social engineering techniques can breach computer and data security Recognize methods to prevent social engineering fraud schemes
Additional Contents : Complete, no additional material needed |
|||||||
+ E-Commerce: Application and Technology | 6.0 | Online | $49.99 | View | |||
The combination of growth in the commercial utilization of the Internet, the rapid changes in technology, and the complexity of management has expanded the scope of the duties of business managers. This covers all aspects of electronic commerce: the Internet, advertising and marketing, and specific technologies. It also addresses steps to move business online, e-commerce strategies, and the concerns of business managers such as security issues. Field of Study Information Technology Level of Knowledge Overview CPE 6 Prerequisite None Advanced Preparation None Click Here For Courses Objectives
Additional Contents : Complete, no additional material needed
|
|||||||
+ Arrays: A Powerful Excel Tool | 2.0 | Online | $19.99 | View | |||
Arrays are a powerful Excel tool that few people know about. It allows you to take multiple steps and consolidate them into one.
• If you are doing and IF statement in a separate column and then copying it down and then summing or averaging the results - an array will let you do it all in one step. Course Learning objectives • Gain an understanding of who arrays work • Understand how to utilize arrays in the workplace
Additional Contents : Complete, no additional material needed |
|||||||
+ Fraud Audit Techniques Using Excel | 3.0 | Online | $24.99 | View | |||
Microsoft Excel provides some easy to use tools that can greatly enhance and expedite the fraud audit process. With all detective work, you want to be able to sift through a large volume of data and utilize a tool that is adequately flexible for you to perform immediate investigations of anything questionable. Excel provides a number of different tools however we are going to focus on a couple of extremely useful ones: Auto filter, Arrays as well as a couple of extremely useful functions that include WEEKDAY and MOD.
|
|||||||
+ Excel - Working with Downloaded Text Data | 2.0 | Online | $24.99 | View | |||
This is an introductory course covering the basics of Excel tools and techniques dealing with downloaded data in a text format. It covers converting numbers formatted as text to numbers usable by Excel functions, concatenation, text to Columns and specific Excel text functions to manipulate and analyze data.
Additional Contents : Complete, no additional material needed
|
|||||||
+ Creating Custom Functions in Excel | 2.0 | Online | $19.99 | View | |||
Course Description: This course covers how to create a custom function (sometimes called a user-defined function) in Excel. A custom function is a calculation that the user creates and names. This custom function is then stored in Excel and can recalled when it is needed. In this course we will be using the Visual Basic Editor and using a couple of VBA keywords; however this is NOT a VBA or programming course. You will create a couple of different custom functions and then see how to create an ADD-IN file so that these functions can be used in all your workbooks.
Course Objectives · Recognize how to find and access the Visual Basic Editor · Identify the components of custom functions and how to use them · Recognize how to create, save and remove custom functions · Recognize the implications of creating custom functions and how they work
Category: Computer Science/Specialized Knowledge Level: Intermediate to Advanced Excel user Prerequisites: Excel 2007 or higher. Should have a basic understanding of an IF statement.
Additional Contents : Complete, no additional material needed
|
|||||||
+ Become an Expert on Lookup Functions | 4.0 | Online | $34.99 | View | |||
Course Description:
Additional Contents : Complete, no additional material needed
|
|||||||
+ Excel Tips Tricks and Tools for CPAs | 3.0 | Online | $24.99 | View | |||
This course is designed for the intermediate user of Excel 2010 and 2013 who are looking to improve their productivity and to learn some cool new Excel skills. The course covers some basics, along with some advanced tips and tricks on selecting, navigating as well as copying and moving data efficiently. It also covers a spectrum of functions that can be used in everyday practice. Functions such as SUBTOTAL, SUMIF, SUMIFs as well as INDEX MATCH are discussed. The 2013 AGGREGATE and IFNA functions are covered. Comparing lists using arrays is overviewed. Pivot tables are discussed in detail. Other topics include: functions and tools for importing data into Excel, conditional formatting as well as charts. There are no associated Excel files.
Learning Objectives: 1. Recognize different short cut keys and what they do 2. Recognize the steps needed to pin a file 3. Identify and create range names 4. Recognize different ways to navigate within and between Excel workbooks 5. Identify some of Excel 2013 new features and functions 6. Recognize different copy and move methods 7. Identify different types of formatting and how to apply them 8. Identify different functions and formulas and when to apply them 9. Recognize the different components of a pivot table and how to create and edit them 10. Identify types of charts to use and how to create them
Version: Excel 2010, 2013
Additional Contents : Complete, no additional material needed |
|||||||
+ Excel Time Value of Money Functions for CPAs | 2.0 | Online | $39.99 | View | |||
Additional Contents : Complete, no additional material needed
|
|||||||
+ Spreadsheet Controls Under Sarbanes Oxley Section 404 | 2.0 | Online | $19.99 | View | |||
Spreadsheet Controls Under Sarbanes-Oxley Section 404
CourseDescription:
Additional Contents : Complete, no additional material needed
|
|||||||
+ Optimizing Search Results with Google | 1.0 | Online | $14.99 | View | |||
Course Description:
Google is a well-known and often used tool to search for information. Many don’t know that there are certain search operators and tools embedded in Google search that may be used to find desired information quicker and easier. This course reviews basic, intermediate and advanced search operators and techniques as well as other useful Google tools that are available. Your new search skills are tested throughout the course with 10 short case study questions.
Upon completion of this course, you should be able to:
· Identify operators and techniques that enhance your ability to find information using Google
Level: Overview
NASBA Category: Computer Science Recommended CPE: 1 hour
Additional Contents : Complete, no additional material needed
|
|||||||
+ Information Security - Malware Trends and Mitigation Strategies | 6.0 | Online | $49.99 | View | |||
The malware and cybersecurity landscapes are constantly shifting in response to the actions of one another. On one side, cybersecurity experts are identifying, analyzing, and patching new forms of malware as consistently as possible so they can be detected by antivirus software and purged from infected systems before they can cause harm to their potential victims. On the other side, malware creators and cybercriminal organizations are constantly creating new malware, and altering old malware, to circumvent cybersecurity efforts and continue to infect as many computers as possible for a variety of purposes. This course will identify the overarching concepts that make up the current information security landscape. This course will provide an overview of the different types of malware that can infect a computer system as well as the different techniques used to conduct both phishing attacks and identity theft. This course will identify the general malware trends over the past several years and explain how the current malware landscape arrived at where it is today. Finally, this course will describe the most commonly seen pieces of malware from this year and provide both an in-depth explanation on how the malware operates and best practices to properly deal with each piece of malware. Learning Objectives At the end of this course, students will be able to: • Identify the importance of information security for CPAs and Tax Practitioners, • Identify the different types of malware that can infect computer systems, • Define the term “Phishing” and recognize how phishing occurs, • Define the term “Identify Theft” and recognize how identify theft most commonly occurs, • Identify the major malware events that have occurred in recent years, and • Identify the operating processes and mitigation techniques for the most commonly seen malware programs of the current year. CPE Credit: 6 CPE for CPAs and EAs Level: Intermediate Instructional Method: Self-Study NASBA Field of Study: Information Technology Program Prerequisites: None Advanced Preparation: None
Additional Contents : Complete, no additional material needed |
|||||||
+ Network Security for Internal Control Assurance | 7.0 | Online | $54.99 | View | |||
IntroductionInternal control requires that the information systems in a company are secure, reliable, and can be trusted. Cyberattacks and data breaches represent the greatest threat to most company’s today. Network security for internal control assurance is a course that will describe the importance of network security for all types of businesses and practices. This course will identify the vulnerabilities and define safeguards for computers, networks, networking components, software applications, and mobile devices. This course will describe the threats that can compromise the computers and company data such as viruses, trojans and phishing. This course will describe some simple steps that users can take to properly protect themselves from any threats that penetrate the network and protect confidential company data. Finally, this course will discuss how to create a data security plan and an information security risk management plan along with some recommendations and best-practices for keeping networks safe.
Learning Objectives
At the end of this course, students will be able to: • Identify the importance of network security for CPAs and Tax Practitioners. • Identify what a network is along with the different components that make up a network. • Identify the different types of network security that contribute to a comprehensive information security protocol. • Define the term “identify theft” and recognize how identify theft most commonly occurs. • Recognize why CPAs and Tax Professionals are being targeted by cybercriminals. • Recognize the importance of encrypting client data. • Identify the importance of creating internal controls and a security plan to protect client data.
CPE Credit: 7 CPE for CPAs and EAs Level: Intermediate Instructional Method: Self-Study NASBA Field of Study: Information Technology Program Prerequisites: None Advanced Preparation: None
Additional Contents : Complete, no additional material needed |
|||||||
+ Information Security: Basic Safeguards for Practitioners | 6.0 | Online | $49.99 | View | |||
All CPAs and Tax Practitioners deal with very sensitive client data. Cybercriminals are highly sophisticated, well-funded, and technologically adept at hacking computers and sealing information. CPAs and tax practitioners are some of their most highly desired targets. Cybercriminals desire the client data of all CPAs and tax practitioners. If these cybercriminals can successfully obtain the client information of CPAs and tax practitioners, they can file fraudulent tax returns for refunds or commit identify theft. As a result, all CPAs and tax practitioners must protect their client’s information by protecting their computers, networks and by taking some simple safety approaches. This course will define information security, describe the numerous types of threats that exist today and define how to protect your computer systems and networks to keep client data safe. Learning Objectives At the end of this course, students will be able to: Identify the importance of information security for CPAs and Tax Practitioners, Define the term “identify theft” and recognize how identify theft most commonly occurs, Recognize why CPAs and Tax Professionals are being targeted by cybercriminals, Recognize the importance of encrypting client data, Identify the importance of creating internal controls and a security plan to protect client data, and Recognize the actions that must be taken in the event of a breach of sensitive client identity data.
CPE Credit: 6 CPE for CPAs and EAs Level: Intermediate Instructional Method: Self-Study NASBA Field of Study: Information Technology Program Prerequisites: None Advanced Preparation: None
Additional Contents : Complete, no additional material needed
|
|||||||
+ Power Query - Get & Transform Data with Excel | 2.0 | Online | $19.99 | View | |||
Course Description Get & Transform Data is an Excel feature available within the newest versions of Excel. It is a business intelligence tool that allows you to retrieve data from a variety of sources, clean it and then transform or refine the data as needed. For example, you can import a database file, parse data, split or combine columns, change data types, group data and more. You can then take that transformed data back into Excel and analyze it using your preferred methods. What makes this feature exciting is that Excel records all your steps so the data in the file can automatically be refreshed with Excel retrieving the source data, applying the same steps and updating the file for you. This is a huge time saver and will also reduce errors. Version: **This feature is only available in Excel versions starting with Excel 2016 but not all 2016 versions have it. ** To, see if you have this feature, simply click on the Data tab in Excel. You should see a section of the ribbon called Get & Transform. If you do not see this section, then you do not have the Get & Transform Data feature and will not be able to do any of the exercises in this eBook. Objectives:
Prerequisites: Intermediate to Advanced Knowledge in Excel.
Additional Contents : Complete, no additional material needed
|
|||||||
+ Dynamic Array Formulas and Other New Excel Functions | 1.5 | Online | $19.99 | View | |||
This course overviews some new features and functions that Microsoft offers in Excel 2019 and/or Microsoft 365. The eBook has an accompanying workbook that you can work through along with an answer sheet. The course introduces the concept of dynamic arrays and related formulas such as SORT(), SORTBY() and Filter(). XLOOKUP() is an update and is intended to effectively replace VLOOKUP(). XLOOKUP() is a must know function and totally improves all the problems of VLOOKUP(). UNIQUE() allows you to identify unique values in a range. The course also covers CONCAT() and TEXTJOIN() which are new text functions that Excel has introduced. CONCAT() is intended to replace the older CONCATENATE(). The course ends with a discussion of some other new functions including IFS(), SWITCH() and MINIFS(). Please make sure that you have the proper Excel version or some or all of these functions will not be available to you. If you are not sure, go to Excel and try typing in an equal sign and then one of the new functions listed here. If the function does not start to display then you probably do not have access to it. Even if you do not have access to the new functions the course is worthwhile as you can use it to determine if you should upgrade to a newer Excel version. Learning Objectives Upon completion of this course, you should be able to: • Define an array • Recognize how a dynamic array works • Recognize new Excel functions and how to use them
Prerequisites: You need Excel 2019 and/or Office365 to use these functions. Click on Account in Excel and it will show you what version you have. Please read last paragraph of course description. Level: Overview NASBA Category: Computer Software and Applications Recommended CPE: 1 Hour
Additional Contents : Complete, no additional material needed
|
|||||||
+ Cyber Security A Guide for Accountants | 6.0 | Online | $54.99 | View | |||
Course Description
The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This course is designed to help you navigate the complexities of this field. It is divided into four parts:
Additional Contents : Complete, no additional material needed |
|||||||
+ Use Pivot Tables in Excel to Organize, Summarize & Analyze Data | 5.0 | Online | $44.99 | View | |||
Learn how to manage and organize data more effectively and transform it into information.
Additional Contents : Complete, no additional material needed
|
|||||||
+ Drive Your Dashboard with Excel | 11.0 | Online | $74.99 | View | |||
Course Objective: To improve analysis of key performance measurements through effective presentation of information.
Additional Contents : Complete, no additional material needed |