Skip to main content

CPE Catalog & Events

Showing 16495 Online Results

Navigating IRS Authorizations: Understanding Power of Attorney, Form 2848, and Form 8821 - 2 hrs

Online

2.0 Credits

Member Price: $79

This two-hour course provides a comprehensive overview of the IRS collection process, guiding tax professionals through each stage, from the initial notice to enforced collection actions. Participants will gain insights into taxpayer expectations during the collection process, as well as strategies for resolving tax debts. The course highlights when to use Form 433-A or 433-B, the documentation needed, and the criteria for submitting an Offer in Compromise (OIC) to settle tax debts for less than the full amount owed. Attendees will also learn about the various payment options available and practical approaches to advising clients. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com

Not Just Your Everyday FASB Update

Online

4.0 Credits

Member Price: $129

This course highlights significant updates that affect financial reporting and related attestation services. We will explore novel FASB pronouncements while examining the enduring impact of lease accounting and revenue recognition standards. This course will provide reminders regarding both GAAP and non-GAAP financial reporting alternatives for closely held entities. We will also explore selected guidance regarding audit, review, and compilation engagements.

Partnership Property Distributions and the New Form 7217

Online

1.0 Credits

Member Price: $29

This program will address the complex rules for partnership distribution of property with a focus on liquidating of a partner's interest, Section 751 and how to complete the new Form 7217.

Performance Auditing Made Easy

Online

1.5 Credits

Member Price: $59

Unlike a traditional financial audit objective (Are the financial statements materially misstated), performance auditing can address a wide variety of objectives.  Is this program working? Can it be improved? Where can we save money? How can we operate more efficiently and effectively? Are management’s assertions supported? And so forth.  This session will explain what a performance audit is, describe the applicable standards, and provide examples that indicate the value of a performance audit.  Performance audits can add value to any entity and practitioners can profit from adding these assurance services to their practices.

Planning for Small Business Success

Online

4.0 Credits

Member Price: $129

Strategic Planning for SMEs

Preparing and Reviewing Workpapers for Higher Quality Audits

Online

4.0 Credits

Member Price: $129

This course will focus on preparing financial statement audit documentation critical for high quality audits that can pass peer review.

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1

Online

1.0 Credits

Member Price: $39

This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.  

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 1

Online

1.0 Credits

Member Price: $39

This course is a continuation of our series on preparing to become a forensic accountant. Within this segment we focus on elements of computer forensics. This session is designed to delve into further investigative procedures used in computer forensics.  

Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)

Online

1.5 Credits

Member Price: $59

This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques. Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved. There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination. This session will review these methods and also discuss relevant software.  

Preparing to be a Forensic Accountant - Focus on Digital Forensics

Online

1.5 Credits

Member Price: $59

Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in financial reporting misconduct. Forensic accountants apply a range of skills and methods to determine whether there has been financial reporting misconduct. Financial forensic engagements may fall into several categories. For example: Economic damages calculations, whether suffered through tort or breach of contract. Post-acquisition disputes such as earnouts or breaches of warranties Bankruptcy, insolvency and reorganization Securities and tax fraud Money laundering Business valuation Computer forensics/e-discovery This session is designed to delve into further investigative procedures used including digital forensics. Future sessions will focus on computer forensics, network forensics and mobile forensics.  

Preparing to be a Forensic Accountant - Focus on Document Review and Handwriting Analysis

Online

2.0 Credits

Member Price: $79

Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in financial reporting misconduct. Forensic accountants apply a range of skills and methods to determine whether there has been financial reporting misconduct. Financial forensic engagements may fall into several categories.  Economic damages calculations, whether suffered through tort or breach of contract. Post-acquisition disputes such as earnouts or breaches of warranties Bankruptcy, insolvency and reorganization Securities and tax fraud Money laundering Business valuation Computer forensics/e-discovery This session is designed to delve a bit deeper into the world of forensic accounting and identify some of the specific areas of expertise required to become a forensic accountant. We will then first delve deeper into the art of document analysis and handwriting analysis.  

Preparing to be a Forensic Accountant - Focus on Network Forensics

Online

1.5 Credits

Member Price: $59

Network forensics - defined as the investigation of network traffic patterns and data captured in transit between computing devices - can provide insight into the source and extent of an attack. It is used in forensic accounting and with the expansion of information technology it has become a growing field. Network forensics is a relatively new field of forensic science. Computing has become network centric. Data is now available outside of disk-based digital evidence. Network forensics can be performed as a standalone investigation or alongside a computer forensics analysis. When used alongside a computer forensic analysis it is used to reveal links between digital devices or reconstruct how a crime was committed. Network investigations deal with volatile and dynamic information and is a sub-branch of digital forensics. It relates to the monitoring and analysis of computer network traffic for information gathering, legal evidence, or intrusion detection. This course is a complement to our other courses in the series on becoming a forensic accountant.  

SECURE Act 2.0: What You Need to Know

Online

1.0 Credits

Member Price: $29

Signed by President Biden on December 29, 2022 as part of the Consolidation Appropriations Act, this program provides an explanation of the Secure Act 2.0 provisions impacting individuals and business taxpayers. Learn what you need to know for this filing season and how to plan for future years for your clients. **Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com.

Small Business Risk Avoidance

Online

4.0 Credits

Member Price: $129

Enterprise Risk Management for SMEs

Taxation of the Cannabis Industry

Online

2.0 Credits

Member Price: $79

This course provides a comprehensive analysis of the taxation issues affecting the cannabis industry. It covers the historical context of U.S. taxation, the distinctions between industrial hemp and marijuana, and the specific tax codes and regulations that apply to the cannabis business. Participants will gain insights into state marijuana laws, the unique challenges of a cash-intensive industry, and pertinent federal court cases. *Please Note:  If you need credit reported to the IRS for this IRS approved program, please download the IRS CE request form on the Course Materials Tab and submit to kori.herrera@acpen.com

The CFO Series-Artificial Intelligence: A Practical Guide for Financial Leaders and CFOs

Online

2.0 Credits

Member Price: $79

In today's world, AI hype bombards us from every direction. Every system seems to boast magical AI capabilities, leading to confusion and overwhelming information. This course cuts through the noise to reveal the true, practical applications of AI for your business today. Our goal is to give you real world examples of using AI on a day-to-day basis, with a clear understanding of its particular strengths and limitations.

The Controllership Series - The Controller's Skillset

Online

1.0 Credits

Member Price: $59

This another course in our series on the controllership function. The controller's role encompasses many traditional responsibilities. The breadth and depth of the controller skill set has expanded and will continue to expand as the business world evolves. The controller position will typically lead teams of financial and accounting experts. Recognizing that leadership and team management skills are must-haves; they need to be able to command their team's respect, inspire them to act, and ensure that such actions are aligned with your organization's overall vision. These skills, along with tactical knowledge will ensure the controller's success.

The Controllership Series: The Controllers Role in Internal Controls

Online

1.5 Credits

Member Price: $59

This course in part of our series on the Controllership Role. Internal control is relevant to everyone in the workplace. It represents our moral responsibility to understand and comply with organization policies and procedures. It also provides the means to hold individuals accountable for their work. The controller is an impactful position that affects a company's processes including financial, compliance and operational. Controller functions vary across companies often following the size and complexity of the business and the industry. Smaller companies require more versatility for the controller Larger companies are more able to segregate job responsibilities across other employees. The controller should be knowledgeable of the various controls to create a control system that will appropriately safeguard company assets and processes. Internal controls are typically comprised of control activities such as authorization, documentation, reconciliation, security and segregation of duties.

The Original Secure Act and Secure Act 2.0 Retirement Planning Strategies

Online

4.0 Credits

Member Price: $129

Congress was EXTREMELY busy. There are over 50 tax-related provisions within SECURE 2.0 which an advisor needs to be able to master.  This course will provide the participants with everything that they need to know about SECURE 2.0 so that they will be able to better serve their clients’ retirement planning needs. **Please Note: If you need credit reported to the IRS for this IRS-approved program, please download the IRS CE request form on the Course Materials Tab and submit it to kori.herrera@acpen.com.

The Psychology of Fraud

Online

1.5 Credits

Member Price: $59

We all know that Fraud Happens. But, why? Why do people we think we can trust let us down? This session will explore the minds of white-collar criminals and examine some recent high-profile fraud cases. Why did they do it? How did they do it? What were the warning signs? If you think that fraud cannot happen to your organization, this session might give you pause.