
“How do I look up a value in list ONE and pick up a related value from list TWO”
“How do I avoid my lookup formula displaying an ugly error when it can’t find a match?”
“I’ve heard of VLOOKUP but what’s HLOOKUP and what’s XLOOKUP?”
These are just a few of the questions I get asked on a regular basis. You can get the answers to these questions (and more) by attending this training session dedicated to mastering the various lookup functions that are built into Excel.
Why you should attend
VLOOKUP, HLOOKUP, XLOOKUP are some of the most well-known (and most useful) formulas in Excel. Used properly, they will help you to improve the accuracy and integrity of your Excel workbooks, save a ton of time and minimize data entry errors.
This training is categorized as intermediate and is aimed at users who want to learn about the Lookup functions in Excel. Although the training will be delivered using the latest version of Excel, this training is relevant for users of all versions of Excel.
Note: XLOOKUP is only available in certain versions of Excel.
Elevate your Excel prowess with this training. Aimed at users already versed in Excel’s core functions (SUM, X/VLOOKUP, COUNTIF etc), this course introduces users to some of the new innovative functions added since 2020, exclusively available to Microsoft 365 and Excel 2021 users.
These cutting-edge tools are designed to streamline your formula creation process, enhance your data interaction, and expand your analytical capabilities. Embrace the simplicity of extracting unique values, sorting and filtering datasets, creating dynamic, self-updating lists and much more!
Whether you’re looking to improve efficiency, accuracy, or both, these features will set you on a path to becoming an Excel ninja. Ensure your skill set remains at the forefront of technological advancements with these essential, transformative functions that redefine what’s possible in Excel.
Whether you need to build an Excel-based dashboard, perform some serious data analysis, or simply summarize data for a personal project, Pivot Tables are one of the most powerful tools in Excel’s data analysis and Business Intelligence (BI) toolkit.
With just a few clicks of the mouse (and no complicated formulas!) you can quickly and easily build the reports, dashboards and charts that help you to summarize, analyze, interpret and understand your data which in turn helps you to spot trends and get answers to the important questions on which you base your key business decisions.
Pivot Tables have a reputation for being complicated and scary but by attending this training, you’ll be pleasantly surprised at how easy it is to use and create them.
From global enterprises to early-stage startups and small businesses, people everywhere use Pivot Tables to summarize and understand their data. Learning how to create Pivot Tables is one of the must have skills for anyone who needs to use Excel to quickly build reports and summaries. This training will provide you with a solid foundation that you can use to build your own pivot tables and reports.
Microsoft Excel contains almost 500 built-in worksheet functions. Strip away the ones nobody uses. Discount the ones that have a specialized use-case and you’re left with a small set of functions that all Excel users should know, regardless of their job function, industry, or business sector. This webinar covers ten of Excel’s most popular productivity-boosting functions.
IMPORTANT: Several of the functions XLOOKUP, UNIQUE, SORT, FILTER are only available to Office 365 subscribers and users of Excel 2021). Please check that this training is relevant for your version of Excel.
Revolutionize the way you communicate data with this cutting-edge training on Excel visual storytelling. Discover the power of visual data representation to transform complex numerical information into compelling, insightful visual narratives. The era of simple bar and pie charts has moved on. Today’s data-driven environment demands more dynamic visualizations and infographics. Our session will guide you through Excel’s innovative non-chart tools, empowering you to captivate your audience with data.
Are you ready to embark on a journey that will revolutionize the way you work with data? Welcome to “Power BI Demystified: Transforming Data into Stunning Visuals”
Discover the power of Microsoft’s revolutionary application, Power BI. Designed for beginners, this comprehensive training session will introduce you to the world of data visualization and insights like never before.
Say goodbye to the days of relying on IT departments for subpar reports – with Power BI, you take the reins, becoming a self-service reporting pro.
Please note that Power BI Desktop is exclusively available for Windows and is not compatible with Mac or mobile devices.
Venue: Recorded Webinar

Telehealth completely changed in 2020 when the Public Health Emergency was put into effect. Now in 2025, many of those temporary changes are expiring and the telehealth business has exploded. These methods of communication between provider and patient are loved by many, and the convenience of telehealth in healthcare has become a common occurrence. This webinar will be reviewing the current parts of telehealth that are being considered permanent in the 2026 Physicians Fee Schedule Final Rule and the new evaluation and management services that are new codes for CPT in 2025 related to telehealth. We will find out what the do’s and don’ts of telehealth that are here to stay, as well as implementing these new codes and regulations into your practice. These new rules and codes are important to any one currently offering telehealth as well all who are considering it to add it to their practice in order to be compliant and maximize reimbursement for the services performed. Areas Covered in this Webinar The CMS Telehealth List and how to use it Medicare’s rules G codes for Medicare telehealth CPT addition of 17 codes to the E/M section for Telehealth Education for office staff Implementation on your software programs Who Will Benefit Physicians Advanced Nurses Physicians Assistant Billers Coders Compliance Managers Administrators Case Managers Claims Processors
HIPAA Breach Risk Assessments determine whether a Ransomware attack constitutes a HIPAA Breach that triggers Breach Notification Rule reports and notifications. A Ransomware attack is automatically presumed to be a HIPAA Breach unless you do a HIPAA Breach Risk Assessment that demonstrates the attack resulted in only a low probability of compromise to the affected protected health information (PHI). This webinar explains how to do a Ransomware HIPAA Breach Risk Assessment. The Problem Solved by this Webinar The HHS Office for Civil Rights (OCR) declared that a breach of unsecured PHI is presumed to have occurred when electronic protected health information (ePHI) is encrypted as the result of a ransomware attack on a HIPAA-regulated entity (health care provider, health plan, health care clearinghouse, or business associate). The entity must then comply with the applicable breach notification provisions, including notifying affected individuals without unreasonable delay, the Secretary of HHS, and the media (for breaches affecting over 500 individuals), in accordance with HIPAA breach notification requirements. However, it is not a breach if the ransomware-victimized entity can demonstrate that there is a low probability that the encrypted ePHI has been compromised. This webinar explains how to do that. Areas Covered in the Webinar A Breach Risk Assessment can determine whether a ransomware attack is a breach of unsecured ePHI, triggering embarrassing reports and notifications. Factors that can be applied in performing a Breach Risk Assessment. OCR’s guidance about specific factors that can demonstrate a low probability of compromise to ePHI encrypted by a ransomware attack. How to perform a Breach Risk Assessment step-by-step. How to document a Breach Risk Assessment and why you must document it. What to do if you cannot demonstrate a low probability of compromise to ePHI. Why You Should Attend This Webinar Attend this webinar to learn how to perform a Breach Risk Assessment with a special emphasis on ransomware attacks. Ransomware attacks may have only a low probability of compromising ePHI. A Breach Risk Assessment can determine whether a ransomware attack resulted only in a low probability of compromise to ePHI and provide Covered Entities and Business Associates with Documentation to overcome the presumption that the ransomware attack was a Breach.. Who Will Benefit Health Care Covered Entities HIPAA Compliance Officials – Privacy and Security Officers Chief Compliance Officer Practice Managers Health Information Technology Supervisors Risk Managers Group Health Plan Administrators Third Party Group Health Plan Administrators Covered Entity Senior Management and Owners Health Care Providers practicing as individuals or in small groups Attorneys for Covered Entities – In-house and Outside Counsel Business Associates HIPAA Compliance Officials – Privacy and Security Officers Chief Compliance Officer Business Associate Senior Management and Owners Risk Managers Attorneys for Business Associates – In-house and Outside Counsel
Over the last few years, the U.S. Department of Health and Human Services, Office for Civil Rights has made modifications to patient privacy requirements. The agency is on track for enhancing care coordination, empowering patients, and reducing administrative burden. In addition, on the Security Rule side, the agency released a proposed rule to overhaul significant requirements and make cybersecurity safeguards a priority. Knowing what an organization must do to meet these new regulatory requirements can be challenging. The webinar will address what has already changed in privacy, cover proposed Privacy Rule modifications, and cover the Security Rule overhaul proposals. Timeline and compliance implications will be covered. After completing this webinar, a Covered Entity or Business Associate will have a clear understanding of what has changed and what will change. Objectives Who Must Comply with HIPAA Requirements? What are the HIPAA Security and Privacy Rules? What Has Already Changed in Privacy? What are the Proposed Privacy Rule Modifications? What are the proposed Security Rule modifications? What is the Timeline & Compliance Implications? What recommendations should be followed now? Q&A Webinar Highlights Learn from an expert on the implementation of the HIPAA rules Understand what the HIPAA management process currently requires Learn how to implement these changes for your organization Who Should Attend Compliance Officer HIPAA Privacy Officer HIPAA Security Officer Medical/Dental Office Managers Practice Managers Information Systems Manager Chief Information Officer General Counsel/lawyer Practice Management Consultants Any Business Associates that access protected health information
Many providers have considered outsourcing functions in the revenue cycle. Like all businesses, some third-party companies do excellent work for providers, but there may be others that look for ways to take advantage of their provider. Outsourcing has its own pros & cons that must be carefully considered. We will review major common areas that providers must weigh strategically before making a decision whether to outsource and selecting the best partner for your needs. It is vital providers know exactly who is handling their claims and what they are doing with their information. Definitions of third-party vendors Legal responsibilities of the provider Common industry trends Important questions to ask vendors & contractors Who Will Benefit Physicians Practice managers Medical assistants Nurses Compliance staff Billers Coders Revenue Cycle Risk Management Mid level providers