CPE Catalog
Note
AICPA On-Demand & Self-Study courses take up to 24 hours to process.
2025 Accounting & Auditing Update
-
Online
3.00 Credits
Stay informed and prepared with this comprehensive annual update on the latest developments in accounting and auditing. We'll begin with a deep dive into the Accounting Standards Updates (ASUs) effective in 2025, followed by insights from the FAF's 2024 PCC Review and an overview of FASB's Invitation to Comment - Agenda Consultation, which will shape the future of accounting standards. On the auditing side, we'll tackle the essential changes in quality management standards that firms must implement by the end of 2025. The session will also highlight common deficiencies identified by the DOL in EBP (Employee Benefit Plan) engagements and provide a peek at upcoming projects from the Auditing Standards Board (ASB). Join us to gain practical insights and actionable takeaways to navigate these updates with confidence.
Surgent's What Practitioners Need to Know About Estate Planning and Administering a Client’s Estate
-
Online
3.00 Credits
Even though the current transfer tax exemption is extremely high to the point that few decedents have a federal estate tax liability, administering an estate is a burden for many family members. In many cases, the family members will look to their professional advisors for help in estate planning and administering an estate. The purpose of this program is to discuss those issues that practitioners with clients involved in estate planning administration need to know to advise those clients. Lack of planning and preparedness in estate issues can cost the heirs time and money upon a decedent's death.
The Art of Marketing for CPAs
-
Online
4.00 Credits
To make more money in less time, all accountants need to learn to market themselves effectively to their clients or their firm. For better or worse, promotions and more money go to those who are the best marketers, rather than the most competent accountants. In this fascinating and fun workshop, participants will learn seven key ways to get more clients and/or promotions through the art of marketing.
Disrupt to Dominate: Mastering Change Leadership
-
Online
4.00 Credits
In an era defined by rapid change and uncertainty, effective leadership requires more than just managing teams; it demands the courage to disrupt and innovate. This course is your blueprint for transforming potential chaos into a strategic advantage and is designed for leaders at all levels-whether you're a seasoned CEO, an ambitious small business owner, or an individual contributor aspiring to influence greater change. You'll gain the insights and tools needed to not only adapt to change but to lead it effectively and confidently. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
2025 Individual Federal Tax Update - Navigating the Current Tax Landscape
-
Online
8.00 Credits
Looking to stay ahead in tax matters? Join our Individual Tax Update course for an essential deep dive into Form 1040 essentials. Designed for tax pros eager to sharpen their skills, this course unpacks recent tax code changes and equips you with the know-how to navigate them effortlessly. From mastering IRS Form 1040 to leveraging new tax benefits, you'll emerge ready to optimize returns for your clients while staying compliant with the latest regulations. Don't miss out on this opportunity to boost your expertise and ensure financial success for both you and your clients! **Please Note: If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.
The Bookkeeper Goes to Prison
-
Online
2.00 Credits
This course profiles Brenda, a financial executive from the state of Washington. Despite earning her college degree, Brenda did not find employment in her area of study. Instead, she landed a series of dead-end jobs. Business reversals frequently led to the loss of employment. When a company that she knew to be unethical offered her an executive position that included bookkeeping tasks, including overseeing all finances, she accepted. While on the job, Brenda saw owners of the company misappropriating funds. Rather than reporting the fraud, she created an elaborate scheme to benefit herself - without the owner's knowledge. Her bad decisions led to a guilty plea for wire fraud, after authorities accused her of absconding with more than $600,000 in corporate funds. A prison term of 20 months followed. Listen and learn from Brenda's experience. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
K2's Effective Automation And Outsourcing
-
Online
1.00 Credits
While outsourcing and automation have been used in multinational corporations, the decline in accounting program enrollment at many universities has made finding qualified entry-level staff more challenging and forced a new conversation about these tools in small and mid-sized businesses. This session will discuss the business environment for outsourcing and review the ethical, regulatory, and practical considerations associated with revealing data and relying on the work of others in your organization.
Preparing to be a Forensic Accountant - Focus on Document Review and Handwriting Analysis
-
Online
2.00 Credits
Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in financial reporting misconduct. Forensic accountants apply a range of skills and methods to determine whether there has been financial reporting misconduct. Financial forensic engagements may fall into several categories. Economic damages calculations, whether suffered through tort or breach of contract. Post-acquisition disputes such as earnouts or breaches of warranties Bankruptcy, insolvency and reorganization Securities and tax fraud Money laundering Business valuation Computer forensics/e-discovery This session is designed to delve a bit deeper into the world of forensic accounting and identify some of the specific areas of expertise required to become a forensic accountant. We will then first delve deeper into the art of document analysis and handwriting analysis.
AI 101 for CPAs: Core Concepts and Practical Applications
-
Online
2.00 Credits
New to AI? Start here. This beginner-friendly course explains how generative AI works, what terms like "LLM" and "agentic AI" really mean, and how CPAs can safely put these tools to use. You'll leave with a solid understanding of AI fundamentals and how they apply to accounting, tax, and finance. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Develop Your Emotional Intelligence to Be More Successful in Life and Leadership
-
Online
2.00 Credits
The difference between star performers and average ones in leadership roles is attributable largely to emotional intelligence (EQ). It’s surprising, then, that EQ is underrated as an essential ingredient for success in life and leadership. This presentation highlights the importance of EQ and provides participants with actionable tools to develop better relationships within and outside of the workplace, build healthy teams, and navigate constant change.
Current Cybersecurity Risk Management Trends
-
Online
2.00 Credits
One of the top concerns of any organization's leadership is how to mitigate the risk of cybersecurity threats, along with the prevention and detection of fraud. This course will focus on the most common cybersecurity vulnerabilities and fraud trends, and best practices for managing them. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Hot Topics Accounting Update - 2026
-
Online
2.00 Credits
Many accountants desire to have a quick overview of only the most current issues in accounting and financial reporting. This course will provide an executive summary of the most important changes in U.S. GAAP. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
The Ethics of Care in the Workplace
-
Online
2.00 Credits
Ethics involve relationship to self, others, and the world in which we live. In the busyness of our world we often act out of habit without realizing that what we do truly matters. We matter! This session explores ethical values and principles as they apply to creating an Ethic of Care in the workplace with specific emphasis on compassion, accountability and respect. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Getting On Top of It All: How to Work Smarter, Not Harder - Part 1
-
Online
4.00 Credits
There is always too much to do and too little time to do it all. Fortunately, if you know the right ways to manage people, projects and your time, you can get on top of everything by working smarter. In this seminar you'll learn the best ways to get more done in less time, how to stay sane with all you have to do, and how to get other people to do some of "your" work by building great relationships.
Corporate Storytelling in Financial Reporting
-
Online
1.00 Credits
Developments in the Management Commentary and MD&A Narrative reporting is entering a new era-one that moves beyond compliance checklists to focus on cohesive, decision-useful communication. This seminar examines the evolution of corporate narrative reporting through the revised 2025 IFRS Practice Statement 1: Management Commentary and the U.S. GAAP-based MD&A under SEC Regulation S-K, with key comparisons to help practitioners understand how each framework supports investor-focused disclosure. Using real-world examples and excerpts from the actual annual report of an IFRS reporting company, this seminar highlights how the revised Management Commentary guidance aims to improve the quality, relevance, and connectivity of narrative insights. Participants will explore its emphasis on strategy, risks, sustainability factors (ESG), key performance indicators (KPIs), and the integration of financial and non-financial information. The session also analyzes the modernization efforts in U.S. MD&A, including principles-based guidance, reduction of boilerplate disclosures, and expanded expectations for entity-specific analysis and trend-based insights. Through a comparative approach, participants learn how both frameworks are converging around common principles: enhanced connectivity, balanced presentation, entity-specific content, and alignment of strategy, performance, risk, and value creation. This practical seminar provides accounting, finance, and business professionals with the knowledge needed for better understanding the management commentary and MD&A. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
Preparing to be a Forensic Accountant - Focus on Network Forensics
-
Online
1.50 Credits
Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent of an attack. It is used in forensic accounting and with the expansion of information technology it has become a growing field. Network forensics is a relatively new field of forensic science. Computing has become network centric. Data is now available outside of disk-based digital evidence. Network forensics can be performed as a standalone investigation or alongside a computer forensics analysis. When used alongside a computer forensic analysis it is used to reveal links between digital devices or reconstruct how a crime was committed. Network investigations deal with volatile and dynamic information and is a sub-branch of digital forensics. It relates to the monitoring and analysis of computer network traffic for information gathering, legal evidence, or intrusion detection. This course is a complement to our other courses in the series on becoming a forensic accountant.
Introverts Have Real Power, Why Quiet Leaders are So Successful
-
Online
2.00 Credits
Leaders were once chosen for their character, but today we live in an age where loudmouthed extroverts seem to take center stage in everything, including business, politics and entertainment. While the talkative, charismatic leader makes the front page of business magazines, recent research shows that successful business leaders tend to be more reserved, pensive and sometimes outright shy. Learn why your desire to spend significant time inside your own head may be your greatest asset. Whether you are introverted or not, you likely work with, manage or are a related to an introvert. We will discuss proven methods to better understand introverts, how to manage them, and how to get the most out of their amazing talents. If you want to enhance your leadership skills, this seminar is for you.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1
-
Online
1.00 Credits
This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.
The Controllership Series: The Controllers Role in Internal Controls
-
Online
1.50 Credits
This course in part of our series on the Controllership Role. Internal control is relevant to everyone in the workplace. It represents our moral responsibility to understand and comply with organization policies and procedures. It also provides the means to hold individuals accountable for their work. The controller is an impactful position that affects a company's processes including financial, compliance and operational. Controller functions vary across companies often following the size and complexity of the business and the industry. Smaller companies require more versatility for the controller Larger companies are more able to segregate job responsibilities across other employees. The controller should be knowledgeable of the various controls to create a control system that will appropriately safeguard company assets and processes. Internal controls are typically comprised of control activities such as authorization, documentation, reconciliation, security and segregation of duties.
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.