CPE Catalog
Note
AICPA On-Demand & Self-Study courses take up to 24 hours to process.
ACPEN: K2's Choosing Your CPA Firm Tech Stack
-
Online
2.00 Credits
In today's fast-evolving landscape, CPA firms face a flood of new tools promising efficiency and innovation. This course helps practitioners assess the real return on investment (ROI) from their technology stack, &-comparing suite-based solutions with best-in-breed applications and examining the latest Agentic AI and Generative AI offerings. Attendees will learn how to evaluate productivity, integration, and strategic alignment to maximize firm performance. Whether upgrading your stack or validating your current tools, this session offers practical insights for tech-savvy decision-making and smarter technology investments tailored to the unique needs of accounting professionals. Presented by: Randolph (Randy) JohnstonType: Live Webcast Replay
ACPEN: Navigating Mergers & Acquisitions with AI: The Future of Deals
-
Online
4.00 Credits
Mergers and acquisitions can be complex, risky, and filled with unexpected challenges—but they don’t have to be overwhelming. This course provides a clear and practical overview of the M&A process, helping professionals understand the critical stages of evaluating opportunities, structuring deals, conducting due diligence, and navigating post-transaction integration. Participants will learn practical techniques that help organizations avoid the common traps that derail many transactions while improving the likelihood of successful outcomes. The session also explores how emerging AI tools are beginning to enhance deal analysis, uncover deeper insights, and support better decision-making throughout the M&A process. Presented by: James LindellType: Live Webcast Replay
ACPEN: Grow Your Business from Within – Striking the Right Balance Between a CPA Firm's Financial, People, and Client Success
-
Online
8.00 Credits
There are multiple tangible and intangible factors that can drive a CPA Firm's long-term success. Specifically, public accountants must place a priority on being both efficient and value-added business advisors when performing audit and other services. This course provides proven tips and techniques for ensuring your firm has the capacity to grow and expand your "business" from within in a healthy way, considering how to improve in three key areas: financial success, satisfaction of people, and outstanding client service. Presented by: Jennifer LouisType: Live Webcast Replay
ACPEN: The Controllership Series – The Controller’s Skillset
-
Online
1.00 Credits
This another course in our series on the controllership function. The controller's role encompasses many traditional responsibilities. The breadth and depth of the controller skill set has expanded and will continue to expand as the business world evolves. The controller position will typically lead teams of financial and accounting experts. Recognizing that leadership and team management skills are must-haves; they need to be able to command their team's respect, inspire them to act, and ensure that such actions are aligned with your organization's overall vision. These skills, along with tactical knowledge will ensure the controller's success. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: Understand Yours and Other People's Styles: Meet Them in the Middle and Be More Effective in Generating Great Results!
-
Online
1.00 Credits
Understanding your own and the people style of others whom you are dealing with which can establish rapport more easily, help you become more persuasive, and avoid miscommunication with the possibility of rubbing someone the wrong way. In our session, you will gain insights into your people style, ways to improve communication connectivity and how to understand your team's functionality (or more likely dysfunctionality). Presented by: Mario FloresType: Live Webcast Replay
ACPEN: Ethics Aren't for the Byrdes in Ozark
-
Online
1.00 Credits
Professional codes of ethics provide guidance to professionals who are frequently required to choose between doing the right thing and the wrong thing. Sometimes, professionals violate their ethical code and do the wrong thing for what they rationalize is the right reason. This session uses the popular television show "Ozark" and its multiple examples of seemingly good people doing bad things for the right reason to define ethics as well as explore why people make unethical choices and how they justify those choices. Presented by: Daniel PorterType: Live Webcast Replay
ACPEN: Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: Leases Accounting under Topic 842 – Answers to FAQ After Implementation
-
Online
2.00 Credits
Lease accounting under FASB ASC 842 is now fully effective for all entities. Transitioning to new GAAP always leads to implementation issues and concerns. This course will answer the most common questions asked related to the latest lease accounting and financial reporting requirements after adoption and transition. Presented by: Jennifer LouisType: Live Webcast Replay
ACPEN: Consulting Services Secrets
-
Online
1.00 Credits
Award winning discussion leader Mark Hugh discusses how to create and capture value with consulting services. Whether you want to consult a little or full time, this valuable course reviews identifying a specialty, growing a practice, capturing value, creating deliverables, and effective marketplace marketing strategies. Presented by: Mark HughType: Live Webcast Replay
ACPEN: Business Valuation - Asset Approach
-
Online
1.00 Credits
This course provides a comprehensive introduction to the business valuation process, beginning with key terminology, professional standards, and the rules that guide the appraisal profession. Participants will explore the three primary approaches to value—Asset, Income, and Market—before focusing in depth on the Asset Approach. The course examines when and why this method is used, its advantages and limitations, and how to apply it effectively in real-world scenarios. Through practical examples and clear explanations of each of the three methods within the Asset Approach, learners will gain both the confidence and competence to apply valuation principles in their professional practice. Presented by: James LairdType: Live Webcast Replay
ACPEN: Best-In-Class Recruiting Strategies
-
Online
1.00 Credits
With over 4.3 employees leaving their jobs as of early 2022, The Great Resignation presents a huge challenge for companies as they attract and retain talent. During this course, you'll learn practical strategies you can implement immediately to ensure you have the right tools in your toolbox to win the war on talent. Presented by: Kelly SimantsType: Live Webcast Replay
ACPEN: Introduction to Forensic Accounting
-
Online
1.80 Credits
This course provides a high-level overview and introduction into the world of the forensic accountant. Most accountants have an understanding of the concept of fraud and how it impacts companies, but many individuals do not have a full comprehension of the variance in the work performed by a forensic accountant versus a typical management accountant. This course is meant for those individuals interested in understanding the variances in the job tasks and responsibilities of forensic accountants versus typical financial or management accountants. Forensic accountants or auditors take a unique focus on performing their work. Typically, when a person with forensic experience is called in to examine financial records, it is due to suspicion of fraud, evaluation of assets, or even to track down fundamentally incorrect accounting – intentional or not. As fraud continues to raise its head in business processes, forensic accountants are discovering new and unique ways to identify, examine, and support their hypotheses and investigative techniques. The work performed by a forensic specialist can be interesting and full of potential potholes if evidence isn’t examined according to proper protocols and standards. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: How to Audit Prepaid Expenses
-
Online
2.00 Credits
Understanding how to effectively audit prepaid expenses is a key skill for audit staff. This course provides a comprehensive overview of the fundamentals, including the applicable audit assertions and common risks and threats associated with the prepaid expense balance. Participants will learn how to perform substantive auditing procedures to ensure accuracy and reliability, with guidance on applying these techniques to real-world scenarios. Designed to enhance practical knowledge, this session equips auditors with the tools and confidence needed to navigate prepaid expense audits with proficiency. Presented by: Jaclyn VenoType: Live Webcast Replay
ACPEN: The Controllership Series - The Treasury Function Part 1 - Cash and Investing
-
Online
2.00 Credits
This course corresponds to our Controllership series. This course is dedicated to exploring the traditional controller role and stepping out of the box to identify areas where the controller can continue to add strategic value to their organizations. Within this segment of our controllership series, we discuss the area of cash and investments and explore how the controller can move these responsibilities into more of a strategic role. In today’s world, the role of cash management is often a pivotal role in the organization. In economically difficult times, controllers may find that they spend a great deal of their time on understanding and managing the organizations' cash position. This is certainly important and, in some areas, can be seen as a staple of the lifeblood of the organization’s ongoing viability. This course takes a look at some of the typical objectives involved in Cash management and then evaluates how those objectives can be further stretched into strategic pillars of the organization. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: K2's AI: Real Tools, Real Results
-
Online
2.00 Credits
This session teaches professionals how to move beyond theory and start using AI to work smarter, faster, and more accurately. This hands-on session explores how public accounting and industry finance teams can use AI tools for tasks like reporting, forecasting, audit analytics, and client service. Participants will see real-world examples of automation, gain practical implementation tips, and learn how to balance innovation with professional responsibility. Discover how to measure your AI ROI, enhance productivity, and position your firm or department for success in the AI-driven accounting era. Presented by: Randolph (Randy) JohnstonType: Live Webcast Replay
ACPEN: K2's Tech Tuneup Tips
-
Online
2.00 Credits
Technology issues rarely come from major failures-they come from small inefficiencies that compound over time. This practical session focuses on high-impact, low-effort technology tuneups that accounting professionals can apply immediately. Participants will learn proven tips for improving workstation performance, tightening security, streamlining workflows, reducing digital friction, and extending the life and value of existing technology investments. The emphasis is on practical configuration changes, overlooked features, and operational habits that deliver measurable productivity gains without requiring major system replacements. Presented by: Randolph (Randy) JohnstonType: Live Webcast Replay
ACPEN: K2’s NextGen Document Management, Workflows, And Portals
-
Online
2.00 Credits
The next generation of paperless technology has arrived. This session explores how firms are modernizing document management, client collaboration, and internal workflows using AI-enhanced systems and integrated portals. Learn how new-generation (“NextGen or NGX”) paperless ecosystems combine security, automation, and accessibility to streamline client communications and approvals. The session will review leading document management and workflow tools, portal features, and how integration across accounting, tax, and client service platforms drives productivity and compliance. Attendees will leave equipped to evaluate and implement modern document systems that enhance client experience while maintaining robust security and compliance controls. Presented by: Randolph (Randy) JohnstonType: Live Webcast Replay
ACPEN: The Controllership Series - The Controllers Role in Cybersecurity
-
Online
1.00 Credits
The controller's role encompasses many traditional responsibilities. The breadth and depth of the controller skill set has expanded and will continue to expand as the business world evolve. In years-gone-by, the concept of information technology and cybersecurity were left to our IT professionals. However, with the prevalent threat that exists in these areas, it is now one of the components of the controller’s skill set that should be in their toolbox. Presented by: Lynn FountainType: Live Webcast Replay
ACPEN: HR Investigations – Episode 1 – Introduction-Assessing-Planning
-
Online
1.00 Credits
Human Resources professionals are often tasked with investigating allegations of employee misconduct, discrimination, and others. Investigation training is traditionally presented from the position of an outsider looking in, such as a governmental agency, law firm, or private investigator. HR investigations require similar skills, but the environment and the approach are quite different. This session is an introduction to these differences and provides best practices for assessing allegations of employee misconduct and planning the investigation. Attendees will end the session with takeaways to immediately implement in future HR investigations. Episodes 2 and 3 complete the series. Presented by: Daniel PorterType: Live Webcast Replay
ACPEN: Preparing to be a Forensic Accountant - Focus on Digital Forensics
-
Online
1.80 Credits
Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in financial reporting misconduct. Forensic accountants apply a range of skills and methods to determine whether there has been financial reporting misconduct. Financial forensic engagements may fall into several categories. For example: Economic damages calculations, whether suffered through tort or breach of contract. Post-acquisition disputes such as earnouts or breaches of warranties Bankruptcy, insolvency and reorganization Securities and tax fraud Money laundering Business valuation Computer forensics/e-discovery This session is designed to delve into further investigative procedures used including digital forensics. Future sessions will focus on computer forensics, network forensics and mobile forensics. Presented by: Lynn FountainType: Live Webcast Replay