Skip to main content

CPE Catalog

Note

AICPA On-Demand & Self-Study courses take up to 24 hours to process. 

Showing 26223 All Results

Best Practices in Obligating Coronavirus State and Local Fiscal Recovery Funds

-

Online

1.00 Credits

Obligating Coronavirus State and Local Fiscal Recovery Funds (SLFRF) by December 31, 2024 is essential to ensure a recipient does not have to return funds to the Treasury. There are a number of requirements to properly obligate SLFRF funds and opportunities to make changes to projects after the obligation deadline. In this course, we will define what an obligation is under SLFRF, review guidance from the Treasury, learn how to meet the SLFRF obligation deadline in multiple areas, and identify when changes can be made to estimates, contracts, and subawards after the obligation deadline.

K2's Next Level Home Networking

-

Online

1.00 Credits

In this two-hour course, accounting professionals and technology enthusiasts will explore advanced home networking concepts to support remote work and modern digital needs. Learn to select prosumer-grade hardware, configure multi-SSID networks, and integrate functionalities like VPNs, media servers, and remote file access to boost productivity and security. Discover cutting-edge technologies, including SPF+ (10G networking), to future-proof your setup for data-intensive workflows. With practical demonstrations and relevant use cases, this session equips you with the tools to optimize your home network for efficiency, security, and scalability.

SECURE Act 2.0: What You Need to Know

-

Online

1.00 Credits

Signed by President Biden on December 29, 2022 as part of the Consolidation Appropriations Act, this program provides an explanation of the Secure Act 2.0 provisions impacting individuals and business taxpayers. Learn what you need to know for this filing season and how to plan for future years for your clients. **Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.

The Ethics Hour: Ethics is the Engine to Better Leadership: Taking Action, featuring Bob Mims and Don Minges

-

Online

1.00 Credits

Ethics is grounded in leadership and the finest leaders are always ethical. Every effective leader is ethical, in words and actions. The best leaders communicate effectively. Being trustworthy is more than being honest and fair. In today’s turbulent environment, leadership matters more than ever as the talented staff will readily move to ethical leaders. We must enhance our leadership skills to remain valuable. Simple stated - we all want to work for, and with, an ethical leader.

Preparing to be a Forensic Accountant - Cloud Forensics

-

Online

1.40 Credits

Cloud computing has become a source of cyber-crime. “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable for presentation in a court of law.” Cloud forensics is a combination of the varied types of accounting forensics including: •    Digital forensics •    Network forensics. •    Hardware forensics In cloud crime, the cloud is considered the object when the target of the crime is the cloud service provider they are directly affected by the act. It is considered the subject of the crime when the criminal act is committed within the cloud environment. It is considered the tool when it is used to plan or conduct a crime. This course will delve into the many concepts involved in cloud forensics. The course complements other courses in the series of Becoming a Forensic Accountant.  

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

-

Online

1.60 Credits

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody

-

Online

2.00 Credits

Fraud poses a significant risk to businesses, organizations, and individuals, leading to financial losses, reputational damage, and legal consequences. This comprehensive course, led by Dr. Richard G. Brody, an esteemed expert in forensic accounting and fraud prevention, explores the underlying mechanisms, motivations, and methods of fraudulent behavior. Through real-world case studies, expert analysis, and interactive discussions, participants will gain critical insights into the psychology of fraud, organizational vulnerabilities, and ethical breakdowns that enable misconduct. The course equips attendees with the latest fraud detection techniques, risk assessment strategies, and internal control best practices to proactively identify and mitigate fraud risks while fostering a culture of integrity and accountability.

Bears Will Be Bears - Fraudsters Too

-

Online

2.00 Credits

Bears are intelligent and motivated to find food. When I left some fried chicken in my Jeep while in Gatlinburg, a bear tore a hole in the top and ate the chicken and part of my Jeep. He was just a bear being a bear. I'm responsible because I left the chicken in the Jeep and gave him the opportunity. Similarly, people are intelligent and motivated to survive. If we give them opportunity by not implementing good internal controls, they will take our assets. This session reviews the investigation and prosecution of the former director of a conference center who took advantage of lax internal controls of a joint-venture and stole thousands. She was just a fraudster being a fraudster.

Is Activity-Based Costing the Right Tool for Your Organization?

-

Online

2.00 Credits

This session provides a refresher regarding the fundamentals of activity-based costing (ABC). We will examine theoretical concepts before exploring practical possibilities for implementing ABC. A major focus of the course will be factors to consider when determining whether this managerial accounting tool is an appropriate resource for an organization.

Tax Power Ethics for Tax Professionals

-

Online

2.00 Credits

Award winning discussion leader, former state accountancy board chair, and lifelong tax practitioner Mark Hugh will review ethics for tax professionals: the AICPA Code of Professional Conduct and interpretations; the Statements on Standards for Tax Services; tax preparer standards in the Internal Revenue Code; the rules for practice with and before the IRS, including IRS Circular 230; new developments; and discuss examples of best practices and case studies.

K2'S Top Tech Productivity Tips And Tricks

-

Online

2.00 Credits

The world of work changed radically and became much more virtual after the pandemic’s onset in 2020.  Over two years into the “new normal,” our team has compiled a list of the top technology productivity tips, tricks, and traps.  In this session, you will learn about shortcuts and hacks to help you accomplish more in Excel, Teams, Outlook, virtual meetings, and many other applications you use every day. Attend this session and learn the best tips to help you and your team accomplish more in less time.  

Devious Ethics: Avoiding Snakes in Suits

-

Online

2.00 Credits

Good people believe everyone else is just like them. They cannot imagine someone could con them or their company and have no guilt or remorse about what they have done. Lack of guilt and empathy are key traits of a psychopath. Most of us envision psychopaths to be cold-blooded serial killers who are locked away in prison. However, experts estimate that 4% of corporate executives are psychopaths who may initially appear to be more normal than the rest of us. Psychopaths may present a convincing picture of virtue while helping themselves to money, status and sex while leaving a path of shattered expectations, empty wallets, and broken hearts in their wake. Learn how to recognize and deal with others who have no conscience. 

The Three Million Dollar Ribbon

-

Online

2.00 Credits

Two conmen used lies and falsified documents to convince the State of Tennessee to give them a $3,000,000 economic development grant to create 1,000 jobs by purchasing and rehabilitating a vacant factory in rural Tennessee. Instead, they spent most of the money on an extravagant lifestyle and invested over $1M in a scheme to defraud the U.S. Federal Emergency Management Agency (FEMA) out of over $30,000,000 pursuant to a contract to provide the tarps for areas such as Puerto Rico, affected by hurricanes. This session provides a detailed case study of how the investigators accumulated, organized, and analyzed hundreds of documents, identified the falsifications and misrepresentations, conducted multiple interviews, and ultimately convicted the conmen. This case study provides multiple takeaways for detecting and investigating grant fraud, which is especially relevant in light of the numerous federal stimulus programs in recent years.

Creating an Ethical Work Environment

-

Online

2.00 Credits

This session introduces theories on human nature and organizational factors affecting ethical choices. Robbie examines the role of gossip in the workplace, provides tools for ethical decision making and offers concrete actions for creating and sustaining an ethical work environment. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.

Federal Tax Update for Business with Doug Van Der Aa

-

Online

4.00 Credits

This program will address recent legislation, rulings and developments affecting business taxpayers and provide practitioners with a comprehensive update for the upcoming tax season. **Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.

Federal Tax Update for Individuals with Doug Van Der Aa

-

Online

4.00 Credits

This program will address recent legislation, rulings and developments affecting individual taxpayers and provide practitioners with a comprehensive update for the upcoming tax season. **Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.

Common Financial Statement Disclosures

-

Online

2.00 Credits

Financial statement disclosures are important to provide the information necessary for financial statement users to make economic decisions. Disclosures further explain and clarify information provided in the basic financial statements, but also provide critical information about subsequent events, litigation risk, and other concerns. This course focuses on the most common financial statement disclosures for small- or medium-sized nonpublic entities. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.

Data Analytics: Practical Insights for Today's Accountant

-

Online

2.00 Credits

This session explores tools and techniques that can enhance the efficiency and effectiveness of client engagements and business processes using data analysis tools. We will introduce some of today's popular and software tools and examine the AICPA's Five-step approach to incorporating data analytics into public accounting engagements.

IFRS Update

-

Online

2.00 Credits

Companies reporting under International Financial Reporting Standards (IFRS) continue to face a steady flow of new standards and interpretations. The resulting changes range from significant amendments of fundamental principles to some minor changes from the annual improvements process. The changes will affect different areas of accounting, such as recognition, measurement, presentation and disclosure.  It can be time-consuming and confusing to keep up-to-date on the resulting impact on financial statements and disclosures. This course will provide an executive summary of recent IFRS updates with current and upcoming effective dates.  

Predictive Accounting: Driver-Based Budgeting & Rolling Financial Forecasts

-

Online

2.00 Credits

The annual budgeting process is often criticized as an accounting exercise that is obsolete soon after it is published, prone to gamesmanship, cumbersome, not volume sensitive, and disconnected from the organization's strategy and risk management processes. You can resolve these deficiencies using capacity-sensitive driver-based projections. Driver-based budgeting allows for quick scenario planning and far easier analysis of a growing organization whose future may look nothing like today. The driver-based budgets can be periodically refreshed to create rolling financial forecasts extending well beyond the fiscal year end. Learn how managerial accounting can become managerial economics.