Book a Free Demo / Get Full Programme Details

Accounting Assistant Using Tally ERP9

In line with the Hon. Prime Minister’s vision, the National Skill Development Corporation, under the Ministry for Skill Development and Entrepreneurship (MSDE), was launched in 2015 with the aim of equipping Indian youth with employable skills.
The Government of Maharashtra too has prioritized the Skill Development mission and set a vision of equipping 45 million individuals with employable skills by the year 2022.

  • Hrishi Computer Education is registered under the Maharashtra State Skill Development Society (MSSDS), which functions as the sole nodal agency for planning, co-ordination, execution & monitoring of the Skill Development Initiative of the Government of Maharashtra. We offer the government-funded course Accounting Assistant using Tallyfree of cost to students.
  • If you wish to pursue a career in finance or accounting and want to pursue an accounting course in Mumbai North (Vasai, Virar, Palghar) region, then this ‘Accounting Assistant using Tally’ course will be an ideal choice. As an ISO 9000:2001 certified and government-recognized institute, Hrishi Computer Education is one of the top institutes for pursuing this free accounting course in Mumbai North region.
  • Tally .ERP9 is the most popular business accounting and management software in India that can be used to easily map all operations of a business . The Accounting Assistant with Tally ERP9 course covers concepts, tools and techniques of employing Tally for accounting, payroll handling, budgeting, recording transactions, taxation, billing, auditing and generating reports and invoices. Following the introduction of the Goods & Services Tax (GST) in July 2017, this course also covers training in GST.


Deendayal Antyodaya Yojana-National Urban Livelihoods Mission (DAY-NULM)

  • National Urban Livelihoods Mission (NULM) was launched by the Ministry of Housing and Urban Poverty Alleviation.
  • The NULM will focus on organizing urban poor in their strong grassroots level institutions, creating opportunities for skill development leading to market-based employment and helping them to set up self-employment venture by ensuring easy access to credit.

Pramod Mahajan Kaushlya V Vikas Abhiyan (PMKVVA)

  • Pramod Mahajan Kaushlya V Vikas Abhiyan (PMKVVA) is the flagship scheme of the Ministry of Skill Development & Entrepreneurship (MSDE).
  • The objective of this Skill Certification Scheme is to enable a large number of Indian youth to take up industry-relevant skill training that will help them in securing a better livelihood.


500 hrs.


6 Days/ 4 Hours

Download Brochure

View Details

Course Fees

View Details

The complete syllabus of this accounting course is given below:


  • Identification of Different parts of a Computer System
  • Turning a computer system on and off
  • History and Generation of Computer
  • Advantage and disadvantage of computer
  • Block Diagram of a Computer
  • Description of Different parts of a Computer
  • System Software and Application Software
  • Identifying different Desktop Icons. My Computer, My Documents
  • Changing Desktop Backgrounds, Mouse pointer, Screen Saver
  • Notepad, WordPad, MS Paint
  • Introduction to MS office
  • Word processing software
  • Electronic spreadsheet
  • Document formatting options
  • Tables, bullets and numbering
  • Font alignment, paragraph formatting
  • Insert picture, clipart, shapes, word art
  • Header & footer, text box
  • Page layout, mail merge
  • Spelling & grammar
  • Cell formatting options
  • Formulas and function
  • Charts
  • Sort, filter, what if analysis grouping
  • Subtotal
  • Creating slide show by using animation technique
  • Slide master
  • Clip art picture editing


  • Basics of Accounting
  • What is book keeping
  • What is account
  • Rules of Accounting
  • Introduction to tally
  • Types of business organization
  • Features Of Business Organization
  • Nature Of Business Organization
  • Company Creation
  • Ledgers & Groups
  • Vouchers(Purchase & Sales)
  • Vouchers(Receipt, Payment)
  • Vouchers(Contra, Journal)
  • Stock Items
  • Stock Category
  • Stock Group
  • Go-down
  • Units of Measures
  • Purchase Order
  • Sale Order
  • Cost Center
  • Bank Reconciliation
  • Point of Sale
    • Single Payment Mode
    • Multiple Payment Mode
    • Invoice Printing
  • Debit Note Credit Note
  • Bill wise Details
  • Price List
  • Multiple Currency
  • Split Financial Year
  • Import & Export of Data(In Excel & other format)
  • Financial Statements
  • (Balance sheet, Profit & loss ,Trial Balance)
  • Statement of Account
  • Statutory & Taxation Reports

Advanced Tally.ERP9

  • Multiple Groups
  • Multiple Ledgers
  • Voucher Types And Creations
  • Rejection in/out
  • Delivery Note
  • Receipt Note
  • Stock Journal & Physical Journal
  • Manufacturing Journal
  • Financial Statements
  • (Balance sheet, Profit & Loss, Trial Balance)
  • Statement of Account

  • Technological Advantages of Tally.ERP 9
  • Tally.NET and Management & Controls
  • Online Help & Support

  • Creating Budgets
  • Displaying Budgets and Variances for Groups & Ledgers
  • Displaying Budgets for Cost Centre
  • Scenario Management – In Tally
  • Costing System
  • Cost Classification Based on Behavior
  • Cost Accounting
  • Enabling Job Costing in Tally.ERP 9
  • Creating Masters for Job Costing
  • Creating Jobs as Job Cost Centers
  • Creating Stock Item with Bill of Materials
  • Job Costing Reports
  • Job Work Analysis Report
  • Material Consumption
  • Process Costing
  • Overhead Allocation
  • Variance Analysis


  • Introduction to GST
  • Dual GST Concept
  • ITC mechanism
  • Time of supply
  • Place of supply
  • Integrated Tax Concept
  • GST on Goods(single rate)
  • GST on Services(single rate)
  • Registration of GST
  • Filing Returns of GST
  • Reverse Charge Mechanism
  • Composition Scheme under GST
  • Job Work System
  • Imports & Exports under GST
  • Branch Transfers Under GST
  • Custom Duty Under GST
  • Accounting of Capital Goods in GST
  • Single rates transaction on goods
  • Single rates transaction on services
  • Reverse Charge Mechanism
  • Input Tax Credit mechanism
  • Registration of GST
  • Filing Returns of GST
  • Multiple rates transactions on goods
  • Multiple rates transactions on services
  • Transactions on Capital Goods
  • Composition scheme
  • GST on imports and custom duty
  • Job work Out
  • Job work In
  • Branch Transfers within and between states

Live Case Studies

  • Bank Reconciliation
  • Auditing
  • Finalization
  • MIS Reporting using excel
  • Advanced Functions of Excel
  • Bills Receivables
  • Bills Payables
  • Payment Management (ECS, Investment and EPI)
  • Cash and Bank Balance Tracking
  • Purchase Order Processing
  • Sales Order Processing
  • Order Tracking (Challans)
  • Bank Reconciliation
  • Debtors & Creditors Tracking
  • Inventory Management
  • Debit and Credit Notes
  • GST Calculation
  • GST payment monthly
  • Enabling Payroll in Tally.ERP 9
  • Employee Setup, Groups, Master
  • Pay Heads & Salary Details Setup
  • Processing Payroll in Tally.ERP 9
  • Payment of Provident Fund
  • Payment of ESI
  • Payroll Reports
  • Pay Slip & Pay Sheet
  • Payroll statement & Register

Cyber security

  • Understanding security
  • Need of the information security
  • Basics of IS (CIA)
  • History and evolution of IS
  • Dimensions of information security
  • Intranet / internet
  • Information security and cyber security relationship
  • Why care about security?
  • Challenges to information security
  • Benefits of information of security
  • Understanding techniques to enforce IS in an organization
  • Identifying tools to enforce information security
  • Identifying frameworks to enforce information security
  • Overview of information security threats
  • Types of threats – Dos, malicious codes, Espionage, etc.
  • Identification of threats
  • Probing of threats
  • Scanning of threats
  • Modus operandi
  • Sources of threats
  • External threats
  • Internal threats
  • Best practices or guidelines used to identify threats
  • Conducts regular education and awareness trainings for employees and third parties
  • Best practices or guidelines used in mitigation of threats
  • Deploying up to date technology
  • Maintaining systems and procedures
  • Educating users
  • Conducting regular education and awareness trainings for employees and third parties
  • Collaborate with peers and experts through different forums to understand contemporary issues and solutions
  • Why do information security vulnerabilities exists
  • Types of technical vulnerabilities
  • Types of native vulnerabilities
  • Understanding security vulnerabilities
  • Flaws in software or protocol designs
  • Weaknesses in How protocols and software are implemented
  • Weaknesses in system and network configurations
  • Weaknesses in web or cloud applications
  • Weaknesses in online e-transactions
  • Browser security and role of cookies and pop-ups
  • Security holes in browser, web applications, OS and smartphones
  • Identifying role of social sites and media in cyber security and vulnerability
  • Understanding vulnerability assessment tools and techniques
  • Techniques to exploit vulnerabilities
  • Identify security vulnerabilities on a regular basis using requisite tools and processes.
  • How to fix the security gaps and holes
  • Identifying liabilities of service providers, software vendors, software authors, system owners, and third parties
  • Best practices and guidelines to mitigate security vulnerabilities
  • What is Risk?
  • Relationship between threat, vulnerability and Risk
  • What is the value of an Asset?
  • What is a threat source/Agent?
  • Examples of some vulnerabilities that are not always obvious
  • What is risk likelihood and consequences?
  • What is impact?
  • Control effectiveness
  • Risk management
  • Purpose of Risk management
  • Risk Assessment (Phases)
  • Why is Risk Assessment Difficult?
  • Types of Risk Assessment
  • Different approaches to risk analysis
  • Best practices and guidelines in assessing and calculating risks
  • Develop and implement policies and procedures to mitigate risks arising from ICT supply chain and outsourcing.
  • Best practices and guidelines in mitigating risks.
  • Need for legal framework and its enforcement
  • Types of law
  • Foundational concepts of law
  • Common laws – criminal
  • Common laws – civil
  • Common laws – administrative
  • Intellectual property laws
  • More intellectual property laws
  • Software licensing
  • Historic examples of computer crimes
  • Who perpetrates these crimes?
  • IT (Amendment) Act 2008
  • Cyber crimes
  • Authorities
  • Enforcement and penalties
  • Security measures and privacy protection
  • Digital signature legal ecosystem
  • Intermediary guidelines
  • National cyber security policy identification protection & prosecuting
  • Computer crime and its barriers
  • Countries working together
  • Security principle for international use
  • Determine if a crime has indeed been committed
  • When should law enforcement investigating
  • Investigation of any crime
  • Role of evidence in a trial
  • General rules for evidence
  • Evidence requirements
  • Evidence collection topics
  • Chain of custody
  • How is evidence processed?
  • Evidence types
  • Hearsay rule exception
  • Privacy of sensitive data
  • Privacy issues
  • Section 43A, 72 of IT (Amendment) Act, justice A.P. Shah report
  • European union principles on privacy
  • US laws on privacy
  • Routing data through different countries
  • Employee privacy issues
  • Sets of ethics
  • Ethics – Mile2
  • Ethics – computer ethics Institute
  • Ethics – internet Architecture Board
  • GAISP –Generally Accepted information security principles
  • Understanding privacy as a domain
  • Relationship between security and privacy
  • Revitalizing security program to enable privacy protection
  • Assess privacy implications of security technologies
  • Privacy impact assessment
  • Develop and implement privacy protection measures within the organization
  • Understanding security frameworks
  • Security standards
  • Understanding organizations requirements from an information security point of view
  • Security policy, procedures, and practices
  • Security policy
  • Security-Related procedures
  • Security practices
  • Security compliances
  • Develop information security policies and procedures
  • Implement information security policies and procedures
  • Collaborate with other departments within the organization for effective implementation of security provisions
  • Understand the organization and individual behaviors for information security
  • Enforcing and maintaining strategies for effective implementation of security practices
  • Update and upgrade key performance indicators for security implementation
  • Best practices and guidelines in developing information security policies and procedure

Online Marketing

  • Surfing of different web sites. Study to create e-mail account. Study of chatting.
  • Practical related with e-bay and similar open source tools.
  • What is internet marketing? What is chatting?
  • E-bay and similar open source tools
  • Types of basic modules
  • Types of advanced modules.
  • What is international selling?

Soft and Entrepreneurship Skills

  • Development Competency/ Proficiency in English/Vernacular
  • Effective Communication
  • Self & Time Management
  • Motivation Techniques
  • Interpersonal Skill Development
  • Computer Literacy
  • Life Skills
  • Entrepreneurship
  • Occupational safety, Health and Environment Education


Book a Free Demo / Get Full Programme Details

HRISHI Computer Education, one of the leading IT/ Computer Education Institutes in Vasai-Virar, is run under the visionary leadership of Mrs. Surekha Bhosale.