CPE Catalog
Note
AICPA On-Demand & Self-Study courses take up to 24 hours to process.
From Numbers to Narrative: Effectively Presenting Your Budget and Reporting
-
Online
2.00 Credits
Perhaps the most important element of the budget process is its communication. If management does not understand the budget – there is an issue. Knowing the right ways to communicate at all levels is essential to stakeholders laying an ownership claim to successful budgets. This session reveals several key guidelines in successful budget presentations and will identify key problems in how people often communicate financial plans. Presenting your budget and reporting is the final part of a four part series, but can easily stand on its own course that is intended to be fun, enjoyable and educational.
Mental Illness & Depression: Understanding & Supporting Employees Under the ADA
-
Online
1.00 Credits
This webinar aims to provide HR professionals with a comprehensive understanding of mental illness and depression under the Americans with Disabilities Act (ADA). It will cover key aspects of the law, provide practical advice, and address common challenges.
Productivity Hacks for Working Remote
-
Online
1.20 Credits
In this course, we will share tips and tricks for working remotely. You will learn what to do/what not to do in a virtual working environment, strategies for leading teams remotely, employee engagement ideas, and techniques and tools for teleworking.
Powerful Public Speaking
-
Online
1.50 Credits
How you say what you say is more important than what you say. According to a UCLA study, 93% of a communicators effectiveness is based on non-verbal cues. This foundational program include a focus on the verbal, vocal and visual delivery techniques appropriate for the business environment, which can improve a speakers credibility, influence and impact. Depending on the course length other topics include; managing fear, organizing your presentation, increasing attention and interaction, handling questions, infusing humor, creating impactful visuals, and more.
Profiles in Fraud
-
Online
2.00 Credits
Nobody is immune to fraud risk. This course opens with stories of real fraud perpetrators then examines the similarities between the fraud perpetrators, discovering that they all have many common traits. It finishes with techniques accountants can use to deter these behaviors. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Unlocking Deep Secrets: Case Studies in Financial Analysis
-
Online
2.00 Credits
Unlock the secrets to understanding a company's financial health and management performance through comprehensive financial analysis. This seminar will guide you through essential tools such as vertical analysis, horizontal analysis, and ratio analysis to gain deep insights into business performance. - Vertical Analysis: Learn how to express each line item of financial statements as a percentage, making it easier to compare companies of different sizes and identify key trends. - Horizontal Analysis: Discover how to compare financial information over multiple periods to spot significant changes and trends, providing a clearer picture of a company's growth and performance. - Ratio Analysis: Dive into calculating and interpreting financial ratios to assess profitability, liquidity, and solvency. Understand how these ratios reveal the effectiveness of management and the potential of the business. This seminar goes beyond just teaching terms and formulas. We will apply these analytical tools to real-world financial data, demonstrating how to derive meaningful insights and make informed decisions. Join us to enhance your financial analysis skills and gain a competitive edge in evaluating business performance. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Behavioral Finance Biases
-
Online
1.00 Credits
If you have been a practitioner for any length of time, you know that there is often a difference between what clients should do and what they actually do. Have you ever wondered why that is? In this course, we will explore how we make decisions with less-than-perfect information. Through real-life examples and case studies, we will examine common behavioral biases and how to deal with them. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
K2's Advanced Topics In Power BI
-
Online
2.00 Credits
So, you've been using Power BI to create fundamental reports and dashboards, and now you're ready for even more advanced reporting & if so, this session is for you. In this session, you will learn how to extend your Power BI environment by incorporating tools such as Data Analysis Expressions, Key Performance Indicators, Hierarchies, and Apps and Content Packs, among others. By taking advantage of the tools and techniques covered in this session, you will be able to move beyond simple reports and dashboards in Power BI and truly leverage the power of this awesome reporting tool.
K2's Top Ten Productivity Booster Apps In Microsoft 365
-
Online
2.00 Credits
This two-hour CPE course is designed for accounting professionals and technology enthusiasts seeking to enhance productivity through Microsoft 365's versatile applications. Participants will explore ten key apps - including Shared Mailboxes, Planner, Lists, To Do, Stream, Viva Learning, Forms, Bookings, Approvals, and Places - and learn to integrate them effectively into their workflows. The course emphasizes practical applications within accounting contexts, aiming to streamline operations and foster collaboration.
A Fox in the Henhouse/Courthouse
-
Online
1.00 Credits
The ancient Romans had a saying about using caution when appointing someone to a position of trust, "don't set a wolf to watch the sheep". That saying is in use today and has changed to include "don't put a fox to guard the henhouses";. The thought is similar, but the wolf and fox are vastly different animals. Wolves rely upon their strength to survive while foxes rely on their cunning. Like foxes, fraudsters rely upon their cunning to defeat or circumvent internal controls. This session reviews the investigation of a deputy court clerk who exploited a weakness in internal controls and committed fraud in the courthouse.
Rewards & Recognition Strategies for Leaders
-
Online
1.00 Credits
Whether you are responsible for managing 1 employee or 20, your leadership can make or break your team. Learn practical leadership strategies that you can implement when you return to your office. In today’s competitive market, it’s more imperative than ever that as leaders we are inspiring and motivating our teams to success.
Ultimate Small Business HR Guide: Essential Tips for Success
-
Online
1.00 Credits
As a small business owner or manager, navigating the complexities of HR can be challenging, but it's crucial for your company's success. This comprehensive webinar will provide you with practical, informative, and encouraging tips to help you build a strong HR foundation for your small business. From recruitment strategies to employee retention, legal compliance to company culture, we'll cover all the essential aspects of HR that will contribute to your business's growth. Let's create a thriving workplace where both your business and your employees can flourish.
Businesses Receiving Government Assistance
-
Online
2.00 Credits
Many for-profit entities receive government assistance or are required to have financial statement or compliance audits due to law or regulation. This course will discuss the requirements under Generally Accepted Auditing Standards relevant to for-profit entity audits.
K2's AI - Better Prompts, Better Results
-
Online
1.00 Credits
Generative AI is seemingly everywhere, and business professionals are embracing the technology. And for a good reason - generative AI provides opportunities for enormous gains in efficiency and productivity. However, those gains can be even greater if you understand best practices for issuing AI prompts. In this session, you will learn the best ways to ask questions of your AI platforms so that you get the information you seek quickly and easily. Stop wasting time with inefficient and ineffective prompts! Learn the best ways to get the information you seek!
AICPA's New SSTS #4 - New Ethics Standard for Tax Resolution
-
Online
1.00 Credits
This 1-hour course is designed for CPAs and EAs who want to stay ahead in the ever-evolving field of tax resolution. Dive into the latest updates to the AICPA Statements on Standards for Tax Services (SSTS) #4 and explore their practical implications for your practice. Through real-world examples and case studies, you'll gain a deeper understanding of how to navigate ethical challenges while maintaining compliance with professional standards. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
K2's Next Level Home Networking
-
Online
1.00 Credits
In this two-hour course, accounting professionals and technology enthusiasts will explore advanced home networking concepts to support remote work and modern digital needs. Learn to select prosumer-grade hardware, configure multi-SSID networks, and integrate functionalities like VPNs, media servers, and remote file access to boost productivity and security. Discover cutting-edge technologies, including SPF+ (10G networking), to future-proof your setup for data-intensive workflows. With practical demonstrations and relevant use cases, this session equips you with the tools to optimize your home network for efficiency, security, and scalability.
Ethics in Communicating & Reporting
-
Online
1.00 Credits
This course on ethics in communication and reporting covers essential topics to ensure integrity and professionalism in our interactions. We begin with the fundamentals of ethical communication, emphasizing the importance of honesty, transparency, and respect. We then explore four must-have communication skills crucial for effective and ethical exchanges. The session also provides practical application steps on how to improve these ethical communication skills in daily practice. Finally, we discuss the problems associated with unethical behavior in reporting and communication, highlighting the potential consequences and the importance of maintaining ethical standards to build trust and credibility.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.
Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody
-
Online
2.00 Credits
Fraud poses a significant risk to businesses, organizations, and individuals, leading to financial losses, reputational damage, and legal consequences. This comprehensive course, led by Dr. Richard G. Brody, an esteemed expert in forensic accounting and fraud prevention, explores the underlying mechanisms, motivations, and methods of fraudulent behavior. Through real-world case studies, expert analysis, and interactive discussions, participants will gain critical insights into the psychology of fraud, organizational vulnerabilities, and ethical breakdowns that enable misconduct. The course equips attendees with the latest fraud detection techniques, risk assessment strategies, and internal control best practices to proactively identify and mitigate fraud risks while fostering a culture of integrity and accountability.
Revenue Recognition - Allocate the Transaction Price
-
Online
1.80 Credits
The updated revenue recognition standard outlines five steps for proper compliance. At the surface, these steps seem simplistic. However, there are many considerations that should be considered within each step based on your process and industry.