This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed...
Many people that use Microsoft Excel know a great deal about the functionality of the application. There are, however, a tremendous number of hidden tools that a high percentage of...
Client and Engagement Management - Managing the Black Holes That Erode Profitability will provide guidance on how to maximize return on time spent with critical areas, such as...
FASB has proposed changes to the principal financial statements. This course presents examples of each new statement and discusses the changes-existing and proposed-in disclosure...
If you are an experienced Excel user seeking to elevate your skills, join the K2 team for K2's Advanced Excel. In this laptop-friendly program, you will learn critical advanced...
The annual budgeting process is often criticized as an accounting exercise that is obsolete soon after it is published, prone to gamesmanship, cumbersome, not volume sensitive, and...
The budgeting process can be a time consuming and frustrating process for accountants. The constraints and pressures can lead to poor decisions in both the technical and human...
Two seemingly similar products can have very different costs, yet many companies are completely oblivious to these differences causing them to lose money or competitive bids. When...
With new accounting standards, the economic landscape and evolving technology, accounting, financial reporting and finance continue to grow in complexity. FASB has tried to address...
Tax developments have been in the forefront of the news, and tax practitioner can find it challenging to remain up-to-date with these changes. This 8 hour program will cover tax...
This is the beginning of a series that will cover major aspects of the Controllership function. Controllers are essential to the day-to-day accounting for organizations. Yet, the...
Until recently, a percentage of organizations discounted the risk related to external fraud attempts. Most were only concerned with protecting physical assets such as inventory or...