When a company has poor financial performance, the financial person is often the first to go. Proactive efforts by financial managers can prevent the need for a company to “catch...
Estate planning continues to evolve, and staying informed about the latest trends and strategies is crucial for professionals in the field. This forward-looking course delves into...
'Whether your organization is developing a new control framework or seeking to strengthen its current controls; practical development and implementation is critical. This course...
Don't just wing it when you can soar! To catch the eye of resource providers and fulfill the needs of leadership, it is essential that not-for-profits prepare financial statements...
This highly informative course comprehensively covers all the latest tax law developments. The focus is on individual taxation and discussion of the planning opportunities...
Human Resources is a wonderful profession, but finding the right technology is challenging. While you may think you have settled your information technology tools, you might be...
This course explores actual fraud circumstances through the lens of potential prevention. We will examine how selected frauds were accomplished and consider what internal controls...
Numbers and especially the digits within those numbers can conceal a lot of information. Benford's Law and other digital analysis techniques can be the keys to unlocking that...
This course explores the increasingly complex features of Excel that facilitate efficient data analysis. We will introduce numerous analytical methods and techniques by using...
This discussion outlines situations where ‘legal’ and ‘ethical’ are not necessarily in alignment. How should you handle these issues? We will detail a better thought process to...
Getting rich requires many things. First, you need to know how to overcome previous limitations you may have had about making a lot of money. Second, you need to know and use the...
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent...