Home
0
Home
Use Landscape to see Search/Filter
Item Types:
Field of Study:
Authors:
CPE Hours:
Keyword:
Hide left panel Collapse Menu
Show left panel
Recent Searches
No recent searches found.
A~B
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

Power Query is an Excel feature available within the newest versions of Excel. It used to be an add-in feature called Power Query. Microsoft calls it Power Query as well as Get and Transform and it  is a business intelligence tool  that allows you to retrieve data from a variety of sources, clean it and then transform or refine the data as needed. For example, you can import a database file, parse data, split or combine columns, change data types, group data and more. You can then take that transformed data back into Excel and analyze it using your preferred methods. What makes this feature exciting is that Excel records all your steps so  the data in the file can automatically be refreshed with Excel retrieving the source data, applying the same steps and updating the file for you. This is a huge time saver and will also reduce errors.

Version:   **This feature is only available in Excel versions starting with Excel 2016.  To, see if you have this feature, simply click on the Data tab in Excel. You should see a section of the ribbon called Get & Transform. If you do not see this section, then you do not have the Get & Transform Data feature and will not be able to do any of the exercises in this eBook. If you have the older add-in feature called Power Query you should be able to follow along just fine.  You can also download an add-in version if you have an earlier Excel version.

Update: This course is based upon Microsoft 365 and updates through November 5, 2024. Depending upon your version, some of the screenshots and commands may differ.

Power Query in Excel: Get and Transform Data (2 Hrs)
A/B
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

Power Query is an Excel feature available within the newest versions of Excel. It used to be an add-in feature called Power Query. Microsoft calls it Power Query as well as Get and Transform and it  is a business intelligence tool  that allows you to retrieve data from a variety of sources, clean it and then transform or refine the data as needed. For example, you can import a database file, parse data, split or combine columns, change data types, group data and more. You can then take that transformed data back into Excel and analyze it using your preferred methods. What makes this feature exciting is that Excel records all your steps so  the data in the file can automatically be refreshed with Excel retrieving the source data, applying the same steps and updating the file for you. This is a huge time saver and will also reduce errors.

Version:   **This feature is only available in Excel versions starting with Excel 2016.  To, see if you have this feature, simply click on the Data tab in Excel. You should see a section of the ribbon called Get & Transform. If you do not see this section, then you do not have the Get & Transform Data feature and will not be able to do any of the exercises in this eBook. If you have the older add-in feature called Power Query you should be able to follow along just fine.  You can also download an add-in version if you have an earlier Excel version.

Update: This course is based upon Microsoft 365 and updates through November 5, 2024. Depending upon your version, some of the screenshots and commands may differ.

Power Query in Excel: Get and Transform Data (2 Hrs)
Recent Searches
No recent searches found.
Similar Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

Power Query is an Excel feature available within the newest versions of Excel. It used to be an add-in feature called Power Query. Microsoft calls it Power Query as well as Get and Transform and it  is a business intelligence tool  that allows you to retrieve data from a variety of sources, clean it and then transform or refine the data as needed. For example, you can import a database file, parse data, split or combine columns, change data types, group data and more. You can then take that transformed data back into Excel and analyze it using your preferred methods. What makes this feature exciting is that Excel records all your steps so  the data in the file can automatically be refreshed with Excel retrieving the source data, applying the same steps and updating the file for you. This is a huge time saver and will also reduce errors.

Version:   **This feature is only available in Excel versions starting with Excel 2016.  To, see if you have this feature, simply click on the Data tab in Excel. You should see a section of the ribbon called Get & Transform. If you do not see this section, then you do not have the Get & Transform Data feature and will not be able to do any of the exercises in this eBook. If you have the older add-in feature called Power Query you should be able to follow along just fine.  You can also download an add-in version if you have an earlier Excel version.

Update: This course is based upon Microsoft 365 and updates through November 5, 2024. Depending upon your version, some of the screenshots and commands may differ.

Power Query in Excel: Get and Transform Data (2 Hrs)
Suggested Courses

The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This cybersecurity course for accountants online is designed to help you navigate the complexities of this field. It is divided into four parts:

Part I: Adopt A Security Mindset - Cybersecurity is not just about techniques, it is also about a mindset, which is critical to crime prevention efforts. Part I introduces the concepts and understanding of the field of cybersecurity. It discusses some common cybersecurity myths and explains how to address them, and identifies cybersecurity frameworks for managing risk and reducing vulnerabilities. It also describes different types of cyberattacks and threat sources.

Part II: Create A Security-Conscious Culture - Cybersecurity is only important to an organization if the board and management make it so. A successful cybersecurity program requires ongoing governance. Part II explains how to design and implementation of a holistic IT governance. It also provides guidance on how to develop an effective security policy.

Part III: Apply Security Countermeasures - Cybercriminals are constantly evolving their capability to exploit vulnerabilities inherent in the global business ecosystem.  Organizations need an innovative approach; allocating and prioritizing resources to effectively protect critical assets.  Part III discusses various strategies to help an organization advance to a high level of performance in its security ecosystem. It also includes recommended steps that organizations can take to address cloud privacy and security concern. Finally, it identifies key controls designed to protect data on portable devices and the network connected to the devices.

Part IV: Meet Regulatory Compliance - Compliance is challenging for many organizations, especially in heavily regulated industries such as healthcare and financial services. Understanding significant implications in the disclosure and governance of personal information reduces the risks of non-compliance, which may result in civil and criminal penalties, loss of public trust and reputation, and unnecessary down time. Part IV highlights key federal laws that concern cybersecurity and privacy and discusses examples of states that have enacted comprehensive consumer data privacy laws. It also describes some legal challenges in the cross-border data flow. It also reviews the major laws for regulating the healthcare and financial services industries.

Cybersecurity- A Guide for Accountants (10 Hrs)

Power Query is an Excel feature available within the newest versions of Excel. It used to be an add-in feature called Power Query. Microsoft calls it Power Query as well as Get and Transform and it  is a business intelligence tool  that allows you to retrieve data from a variety of sources, clean it and then transform or refine the data as needed. For example, you can import a database file, parse data, split or combine columns, change data types, group data and more. You can then take that transformed data back into Excel and analyze it using your preferred methods. What makes this feature exciting is that Excel records all your steps so  the data in the file can automatically be refreshed with Excel retrieving the source data, applying the same steps and updating the file for you. This is a huge time saver and will also reduce errors.

Version:   **This feature is only available in Excel versions starting with Excel 2016.  To, see if you have this feature, simply click on the Data tab in Excel. You should see a section of the ribbon called Get & Transform. If you do not see this section, then you do not have the Get & Transform Data feature and will not be able to do any of the exercises in this eBook. If you have the older add-in feature called Power Query you should be able to follow along just fine.  You can also download an add-in version if you have an earlier Excel version.

Update: This course is based upon Microsoft 365 and updates through November 5, 2024. Depending upon your version, some of the screenshots and commands may differ.

Power Query in Excel: Get and Transform Data (2 Hrs)
Course Details

Excel Magic (Part 5): Building Interactive Budgeting Model in Excel (Video) (Course Id 2220)

QAS / Registry
This is a Course Preview, to take the course please select or purchase the course and click one of the Take Course icons on your My Courses page.

  Add to Cart 
Author : Lenny Wu, CPA, CGA, MBA
Course Length : Pages: 21 ||| Review Questions: 5 ||| Final Exam Questions: 10
CPE Credits : 1.5
IRS Credits : 0
Price : $29.95
Passing Score : 70%
Course Type: Video - NASBA QAS - NASBA Registry
Technical Designation: NonTechnical
Primary Subject-Field Of Study:

Computer Software & Applications - Computer Software & Applications for Course Id 2220

Description :

The course is presented in three parts.

First, the course reveals the 3 environments forecasts and budgets are made and compare each one of them.

Next, the course presents 6 challenges in budget modeling and reporting. They include:

  • How to accommodate Operation Team’s need to work from Excel while all budgets are in the Planning system?
  • How to build an interactive budgeting model in Excel?
  • How to write into a PivotTable?

Last, we provide 6 solutions to the above 6 challenges in budget modeling and reporting. They include:

  • Building an interactive budgeting model that allows the Operation Team to make changes to forecasts and budgets and see the results instantaneously
  • Building an “editable” PivotTable that allows Operation Team to put forecasts and budgets directly in the PivotTable report
  • Consolidating Actuals, Forecasts and Budgets from different data sources by using Power Query
  • Building integrated Slides from Excel Reports
Usage Rank : 12000
Release : 2023
Version : 1.0
Prerequisites :
  • Basic Excel knowledge
  • Excel Pivot Table: basics
  • Power Query: Ultimate Data Transformation
  • Example: be able to open one Excel file and connect to external data files, etc.
  • Experience Level : Overview
    Additional Contents : Complete, no additional material needed.
    Additional Links :
    Advance Preparation :
  • Basic Excel knowledge
  • Excel Pivot Table: basics
  • Power Query: Ultimate Data Transformation
  • Example: be able to open one Excel file and connect to external data files, etc.
  • Delivery Method : QAS Self Study
    Intended Participants : Anyone needing Continuing Professional Education (CPE).
    Revision Date : 30-Jan-2024
    NASBA Course Declaration : Participants must complete the final examination within one year of purchase and with a minimum passing grade of 70% or better to receive CPE credit unless otherwise noted on the Course History page (i.e. California Ethics must score 90% or better). After logging in click on the Course History links on your My Courses page for the Begin date and Expire date for the Final Exam.
    Approved Audience :

    Video - NASBA QAS - NASBA Registry - 2220

    Keywords : Computer Software & Applications, Excel, Magic, Part5, Building, Interactive, Budgeting, Model, Excel, Video, cpe, cpa, online course
    Learning Objectives :

    Course Learning Objectives

    After this course, you will be able to:
    • Understand when and how to build an interactive budgeting model in Excel
    • Identify reasons in building a PivotTable report vs a regular report with formulas
    • Discover techniques on building an “editable” PivotTable
    • Understand ways to report budgets from the System using a PivotTable
    • Explore methods of consolidating Actuals and Budgets from multiple data sources

    Course Contents :

    Chapter 1 - Excel Magic (Part 5): Building Interactive Budgeting Model in Excel

    Chapter 1 Review Questions

    Glossary/Index

    Click to go to: Excel Courses for Accountants | Excel CPE Courses for CPAs
    Thank you for taking one of our free courses. We would like to be able to let you know when we add free courses or have special offers and will never spam you or share your address with anyone. If you are Ok with that please reply with "Ok" or if not please reply "No Thanks". Either way enjoy your free CPE course.
      
    Exam completed on .

    Do you want to add the course again?