CPE Catalog & Events
Budget Mastery: The Human Side of Budgeting-Navigating People's Issues with 360 Insight
-
Online
2.00 Credits
Understanding your own leadership tendencies and applying them to your strengths? Understanding core personality types Learning what type of person you are? Managing and coping with the budget team Effectively dealing with the A, B, C and other players?
A Fox in the Henhouse/Courthouse
-
Online
1.00 Credits
Internal Controls Fraud Prevention Fraud Investigation
K2's AI - Better Prompts, Better Results
-
Online
1.00 Credits
Components of effective AI prompts The pros and cons of a single large prompt versus multiple small prompts Using prompts to format AI-generated output
K2's Next Level Home Networking
-
Online
1.00 Credits
Explanation of common network services such as file sharing, VPN's, media servers, and network isolation using multiple SSIDs Hardware options and examples of solutions for every budget Tips and tricks for rebuilding your home network to meet your needs today and into the future
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 3 (Steganography)
-
Online
1.60 Credits
Forensic Accounting Accounting Auditing Finance
Fraud Unmasked: Understanding and Preventing White-Collar Crime with Dr. Richard G. Brody
-
Online
2.00 Credits
Fraud Prevention Accounting Business Ethics
The Single Audit from Beginning to End Update
-
Online
8.00 Credits
Introduction Applicable AICPA standards Applicable OMB Circular Gathering information - determining the major programs Identifying risk – identifying the applicable compliance requirements Assessing risk – considering the internal controls over compliance requirements Designing procedures that are responsive to assessed risks – the tests of internal controls and compliance Evaluating single audit evidence
K2's Excel Tips, Tricks, and Techniques for Accountants
-
Online
8.00 Credits
Fundamental Excel techniques all accounting and financial professionals should know and use Creating date-based calculations in Excel How to create Excel templates Key options you should enable in Excel Linking data in Excel
Preparing and Reviewing Workpapers - Essential Tips for Avoiding Deficient Audit and Other Attest Engagements
-
Online
8.00 Credits
Best practices for documenting complex and subjective procedures and conclusions, such as estimates, substantive analytic procedures, etc. that impact the nature and extent of audit documentation needed to support audit conclusions Discussing the financial statement audit risk concept, including how proper application better ensures a higher quality audit Tips for an efficient workpaper review process that complies with relevant standards Understanding the quality control standards and guidance related to a CPA firm’s responsibilities for its system of quality control Explain the importance of establishing, applying, and monitoring quality control policies and procedures related to audit documentation
Ethical Leadership: Guiding Principles When Others Falter
-
Online
2.00 Credits
Understanding yourself and others in the workplace How emotion plays a vital role in ethical dilemmas and in solutions What are some of the various outlooks on ethics? Recognizing lies Managing ethics towards solutions
Planning in an Uncertain World
-
Online
2.00 Credits
Why great predictions are not intuitive but the result of critical thinking, gathering information and updating predictions when needed How to separate correlation from causation How to recognize and overcome bias Who is Thomas Bayes and why he matters
Ask Me No Questions and I Will Tell You No Lies - The Art of Interviewing & Interrogation
-
Online
3.00 Credits
Defining an interview Why we choose to believe or not believe someone Types of individuals you will be talking with Why people lie Types of liars Unsharable needs Verbal and nonverbal clues How to listen Obtaining a confession
Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)
-
Online
1.00 Credits
Forensic Accounting Accounting Finance Auditing
Surgent's Lessons Learned from Successful Companies
-
Virtual
2.00 Credits
Creating a visionary company Traits of successful, visionary companies Goal setting to create a successful organization The role of experimentation and failure in achieving success How successful organizations emphasize learning new skills The role of effective communication in achieving corporate success The importance of emotional intelligence in building corporate culture How leadership can direct a company toward success
Measuring Audit Risks
-
Online
3.00 Credits
The planning process – When it starts and when it ends Determining the audit objectives The importance of the nature, timing and extent of the audit process The importance of professional skepticism The preliminary engagement activities Documentation of audit risk Determining materiality
Revenue Recognition - Topic 606 Disclosures
-
Online
1.20 Credits
Revenue Recognition Accounting
Comprehensive Estate Planning: Administration & Postmortem Strategies
-
Online
8.00 Credits
Introduction to Estate Administration How to Read a last will and testament Understanding the Entities Administration the Estate and Orderly Process The Probate process and the courts Special Issues in Estate Administration Postmortem Issues Regarding Income Taxation of Descendants and Estates Post Mortem Opportunities on the Estate Income Tax Return Available Post Mortem Estate Tax Elections Portability Election Disclaimers
The Ethics Hour: Accounting Scandals: What Happened and Why? Can We Prevent Them?, featuring Tracy Cooper and Don Minges
-
Online
1.00 Credits
Why do some choose to deceive, cheat and steal Can accounting scandals be prevented A brief history of accounting scandals What to look for What should ethical professionals like you do
Global Internal Audit Standards (GIAS) Domain II - Part 2
-
Online
2.00 Credits
Internal Audit Standards GIAS Accounting Internal Controls
K2's Securing Your Data: Practical Tools For Protecting Information
-
Online
4.00 Credits
Understanding today’s cybersecurity risks Identifying major cybersecurity risks Implementing specific steps to reduce risk