Skip to main content

CPE Catalog

Note

AICPA On-Demand & Self-Study courses take up to 24 hours to process. 

Showing 11030 All Results

Forensic Data Analytics Supercourse for Fraud Prevention and Detection

-

Online

8.00 Credits

In this five part master series, class participants will gain a comprehensive view into the world of forensic data analytics (FDA). From understanding practical use cases of FDA in the audit, internal audit, investigations and proactive monitoring to understanding necessary data sources, validation proceudres, success factors and pitfalls to avoid. We will also explore hundreds of leading anti-fraud tests around corruption, conflicts of interest, fake vendor schemes, segregation of duties, revenue recognition and sales abuse, among dozens of other schemes.  Participants will develop their own library of anti-fraud tests from various open source locations and apply them in relevant contexts such as the COSO Fraud Risk Management Guide. Finally, participants will also peek into future innovations in FDA and how technologies such as ChatGPT, data visualization, machine learning, AI and cryptocurrencies are all impacting the discipline.  We can't promise you'll be a programmer after this course, but you will certainly be armed with the information needed to project manage an FDA project and "direct" the programmers to accomplish your fraud risk / FDA objectives.  

Mastering The Three Pillars of Cybersecurity: Exploring the Technology Pillar

-

Online

1.00 Credits

Are you  looking to fortify your practice against the ever-growing threats in the digital landscape? Join us for the second installment of our exclusive webinar series, "Mastering Cybersecurity," brought to you by Practice Protect. In today's digitally connected world, the need for comprehensive cybersecurity is paramount. With cyberattacks becoming more sophisticated, it's crucial to stay ahead of the curve in protecting your sensitive client data.  This webinar series is designed to equip CPAs with the knowledge and tools needed to secure their practices and client information effectively.

Strategies for Guiding Clients Through Challenging Situations: Tax Insights

-

Online

8.00 Credits

In this comprehensive course, practitioners gain a deep understanding of strategic planning considerations and potential hurdles encountered when clients face difficult circumstances. Delving into an array of scenarios often classified as "challenging," the course offers tax insights. From divorce and personal bankruptcy to intricate personal relationship matters, participants will equip themselves to adeptly guide clients through these challenging scenarios by understanding the tax implications.

Aligning Analytics to COSO's Fraud Risk Management Principles

-

Online

1.00 Credits

In this course, participants will learn about the five principals of COSO's Fraud Risk Management Guide and the linkages each principal has to the use of forensic data analytics to measurably demonstrate effectiveness and ROI.  We will also explore key elements to a successful program that is sustainable as well as pitfalls to avoid. Finally, we will cover several case studies that demonstrate the key concepts discussed. 

Cryptocurrencies for the CFO: Explaining Blockchain

-

Online

2.00 Credits

What exactly is cryptocurrency and its cousin named blockchain? Are they here to stay? This session will provide a big picture examination of the technologies and currencies by explaining how we got here. We discuss the systems and technical aspects of cryptocurrencies and blockchain. What is the broad view of the technologies that currently do, and will continue to, impact our workplace and lives?

K2'S 2023 Top Ten Outlook Tips

-

Online

2.00 Credits

Using Outlook for email management is routine for most business professionals these days. But unfortunately, using this tool for so long may cause some to perpetuate bad practices and habits when working in Outlook and exploring new options Outlook offers. In this session, you will discover ten valuable tips to take you to the next level of your email and work management.

Gamed: Why Performance Targets and Incentives Fail and How to Fix Them

-

Online

4.00 Credits

Target setting can drive breathtaking positive results, the moonlandings, the eradication of smallpox or the repair of the ozone layer, for example.  They can also have a dark side that can put executives in jail, bring global businesses to their knees and even cause wholesale loss of life.  Using practical examples and case studies, this course walks you through the steps you need to follow to design robust, effective and credible targets for your organization.

2023 Compliance Update on Arbitration Agreements, Severance Agreements, Confidentiality and Non-Disparagement Agreements

-

Online

1.00 Credits

In the last year, our country has seen the passage of multiple federal laws impacting the enforceability to common employment documents. Several federal agencies have also issued opinions that could impact common employment documents. This presentation will review those new laws and opinions and discuss the potential impact they may have on arbitration agreements, severance agreements, confidentiality agreement, and non-disparagement agreements.  

2024 White-Collar Crime: What Every CPA Should Know

-

Online

2.00 Credits

According to the FBI, “white-collar crime is … synonymous with the full range of frauds committed by business and government professionals … characterized by deceit, concealment, or violation of trust …. The motivation behind these crimes is financial—to obtain or avoid losing money, property, or services or to secure a personal or business advantage.”  CPAs can and should play a crucial role in preventing and detecting white-collar crime, as well as in prosecuting the perpetrators.  This session will explore whether we are up to this challenge, heighten awareness regarding the CPA’s role as a front-line defender of the public interest, and assess whether we are deserving of the public trust we enjoy.

Building Your Own Library of Anti-fraud & Continuous Monitoring Tests

-

Online

1.00 Credits

In this course, participants will gain a broad understanding of the various anti-fraud preventive and detective tests available to practitioners and take initial steps in building their own library of tests unique to their business or industry risks. Specific discussions and examples will include vendor analysis to look for potentially improper payments around conflicts of interests, fake vendor schemes, bribery & corruption, sanctions and trade compliance, anomalous payments, segregation of duties, among other risk categories.  Participants will also explore tests around customers or distributors that include margin analysis, free goods, discounts and revenue recognition. Further, we will explore employee related test to mitigate travel & entertainment expense abuses. We will also point out various online and public resources for participants to start building their own library of tests to support both reactive investigations as well as proactive prevention and detection.

A Better Way to Choose Your KPIs

-

Online

1.00 Credits

Selecting the right KPIs for your organization can be complex and stressful. Rather than resorting to brainstorming and internet searches, there is a better way to discover the best KPIs for your organization - the ROKS method. In this session Bernie Smith, creator of the ROKS method, walks you through the first five steps of this powerful approach, using real-world stories to bring each step to life.  

Preparing for & Conducting Discharge Meetings

-

Online

1.20 Credits

Over 80% of all employment-related lawsuits relate to termination.  Every termination should be treated as a potential lawsuit.  The facts supporting a leader's recommendation of discharge must be fully investigated. The discharge of an employee  requires prior review and approval.  Narrow self-interest, spite, or personal animosity must not play a part in making termination decisions.  This course provides practical knowledge and scripts for handling discharges with good judgment such that personal and employer liability is avoided.

The Controllership Series - Managerial Accounting Basics and Costs

-

Online

1.20 Credits

Managerial accounting provides economic and financial information for managers and other internal users. Managerial and Financial Accounting have similarities and differences. Each field of accounting deals with the economic events of a business. Both managerial and financial accounting require that a company’s economic events be quantified and communicated to interested parties. This another course in our series on the controller’s role. The controller’s role encompasses many traditional functions. Within this segment of our controllership series, we discuss the area of managerial accounting and the basic concepts that surround this discipline as it primarily relates to cost accounting issues.  

Communication Miracles At Work and In Life - Part 2

-

Online

4.00 Credits

Following on Part 1 of this course, in Part 2 you will learn advanced ways to solve problems without bruising egos, how to create profound trust quickly, and how to motivate clients and co-workers to do your bidding with a minimal amount of wasted time or hassles.    The bottom line will be better client and co-worker relationships, leading to increased enjoyment and productivity at work.

2024 Business Federal Tax Update

-

Online

8.00 Credits

Get ready to elevate your tax game with the 2025 Business Tax Update, designed exclusively for tax practitioners looking to sharpen their skills in business income taxation. This course doesn't just scratch the surface – it thoroughly explores the complexities of the tax code, ensuring you're equipped to navigate the ever-evolving tax landscape with confidence. From recent legislative updates to complex tax considerations like COVID-19-related subsidies, this course covers it all. Gain practical strategies and insights that you can immediately apply to assist your clients in optimizing their business income tax planning. Don't miss this opportunity to stay ahead in business taxation and enhance your expertise in a rapidly changing regulatory environment. With a focus on real-world application and comprehensive exploration of essential topics, the 2025 Business Tax Update promises to be a game-changer for your tax practice. Whether you're dealing with partnership, corporation, or LLC taxation issues, this course provides precise guidance tailored to diverse business clients. Plus, you'll gain invaluable insights into recent legislative changes, including their implications on tax code sections like Section 199A. Stay at the forefront of business taxation and ensure you're delivering top-notch advice to your clients by enrolling in this essential course today. **Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.

The Controllership Series - The Role of the Controller in ESG

-

Online

1.50 Credits

Why do for profit organizations exist??? To make money!!!!! What a great concept. But if the organization does not have the proper collections and credit procedures in place, they may not be able to access that money. Hence the importance of the credit and collection process. Credit and collections are critical areas for the financial statement controllers. Customer credit is a form of payment that allows small business customers to purchase a product or service before paying for it in full. The process works similarly to the way a credit card does - you procure something and pay it back later. Collections is a term used by a business when referring to money owed to that business by a customer. When a customer does not pay within the terms specified, the amount of the bill becomes past due and is sometimes submitted to a collection agency. The sales and collection process includes business activities related to selling products and services, maintaining customer records, billing customers, and recording payments from customers. It also includes activities necessary to manage accounts receivable, such as aging accounts and authorizing credit.  This course delves into the topics that impact the sales, credit and collections process for management. We discuss strategic steps management can take to ensure their processes are efficient and that they are able to actually collect their revenue.  

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

-

Online

1.60 Credits

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

Achieving Balance in Work and Life - Part 1

-

Online

4.00 Credits

Due to the constant stress of a fast paced life, overwork, and family demands, it’s easy to feel one’s life is out of balance. When this happens, all areas of your life can suffer. By learning key methods for setting priorities and goals, overcoming stress, and deciding what’s most important to you, you can achieve new levels of balance and greater results. Having more balance in your life will allow you to do less of what you don’t want and more of what is truly important to you.

Triple Your Memory, Prevent Dementia and Halve Your Stress - Part 1

-

Online

4.00 Credits

This is not your average CPE course! In this fun and practical course, you'll learn how to remember names, where you put things, what you read, or anything else 300% (or more) effectively than before. You will also learn how to prevent dementia, and halve your stress by using exercises that take under two minutes a day to do. Additionally, you'll receive information on ways to improve your memory by improving your overall health and wellness. This course will give you an overview of natural supplements to enhance your memory as well as share tips to improve your sleep. This course will change your life both now and in the future by making sure you know the best ways to remember information, handle stress and keep your mind sharp until the day you die. The information in this course to help increase your professional efficiency and improve your overall quality of life.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)

-

Online

1.00 Credits

This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.