Additional information
| Credits | 1.0 |
|---|---|
| Format | On Demand |
| Field of Study Department | Auditing (Technical) |
| CPE Approved | Yes |

Simple fraud schemes that use social engineering techniques are gaining popularity in the United States. These schemes rely on trickery to persuade an unsuspecting employee to divert cash or sensitive information to the fraudster. This course examines techniques being employed such as email spoofing, phishing and vishing using actual recent cases and discusses techniques to minimize the possibility of this type of fraud in your organization.
| Credits | 1.0 |
|---|---|
| Format | On Demand |
| Field of Study Department | Auditing (Technical) |
| CPE Approved | Yes |
This course was very helpful and I have already found myself using what I learned to prepare, sort, and filter tables in Excel.
Excel: Audit & Analytical Uses for Filters & Tables (AUMC)
Excel: Audit & Analytical Uses for Filters & Tables (AUMC)
Need more than one course? Get this course PLUS 12-month unlimited access to every other course we offer with an Unlimited CPE Subscription for only $149!