Browse Courses
Browse for courses by
Category to browse
 Course NoNameRecommended CPE 
  TECH-COMPIT-4941 Accountant's Guide to Computers and Information Technology 6.00 
  TECH-DIGASSETS-2582 Accounting for Digital Assets in Estate Planning 1.00 
  TECH-AI-26004 AI Essentials for CPAs – Exploring Cutting-Edge Technology 8.00 
  TECH-AIAUD-26004 AI Series – Audit & Compliance 1.00 
  TECH-AIADOPT-26004 AI Series – Considerations for Organizations When Adopting AI 1.00 
  TECH-AITAX-26004 AI Series – Considerations in Tax Preparation & Research 1.00 
  TECH-AIETH-26004 AI Series – Ethics & Regulations 1.00 
  TECH-AIFUTURE-26004 AI Series – Future Trends in AI & Software for CPAs 1.00 
  TECH-AINTRO-26004 AI Series – Introduction to Artificial Intelligence 1.00 
  TECH-AIDATA-26004 AI Series – Leveraging AI for Data Analysis & Reporting 1.00 
  TECH-BIZINFO-N10780 Business Data: Assessment 0.20 
  TECH-BIZINFO-N10830 Business Data: Disposal & Response 0.20 
  TECH-DISPOS-N10930 Business Data: Disposal Part 1 0.20 
  TECH-DISPOS-N10940 Business Data: Disposal Part 2 0.20 
  TECH-DISPOS-N10950 Business Data: Disposal Part 3 0.20 
  TECH-BIZINFO-N10770 Business Data: Overview 0.20 
  TECH-BIZINFO-N10790 Business Data: Security Part 1 0.20 
  TECH-BIZINFO-N10800 Business Data: Security Part 2 0.20 
  TECH-BIZINFO-N10810 Business Data: Security Part 3 0.20 
  TECH-BIZINFO-N10820 Business Data: Security Part 4 0.20 
  TECH-CPSEC-2743 Computer and Data Security Basics for the CPA 1.00 
  TECH-COMPSEC-4953 Cybersecurity – A Guide for Accountants 10.00 
  TECH-BREACH-N10260 Data Breach: Fix Vulnerabilities 0.20 
  TECH-BREACH-N10270 Data Breach: Notification 0.20 
  TECH-BREACH-N10240 Data Breach: Overview 0.20 
  TECH-BREACH-N10250 Data Breach: Securing Operations 0.20 
  TECH-CONFID-26004 Ethics – Protecting Confidential Client Information 2.00 
  TECH-INFOSEC-10249 Information Security - Self Study 2.00 
  TECH-INFOSEC-N10090 Information Security: Best Practices Part 1 0.20 
  TECH-INFOSEC-N10100 Information Security: Best Practices Part 2 0.20 
  TECH-INFOSEC-N10070 Information Security: Detect and Respond 0.20 
  TECH-INFOSEC-N10010 Information Security: Fundamentals 0.20 
  TECH-INFOSEC-N10040 Information Security: Identify 0.20 
  TECH-INFOSEC-N10020 Information Security: Managing Risk Part 1 0.20 
  TECH-INFOSEC-N10030 Information Security: Managing Risk Part 2 0.20 
  TECH-INFOSEC-N10050 Information Security: Protection Part 1 0.20 
  TECH-INFOSEC-N10060 Information Security: Protection Part 2 0.20 
  TECH-INFOSEC-N10080 Information Security: Recover 0.20 
  TECH-SECURE-3184 Keeping Taxpayer Data Secure 3.00 
  TECH-CUSTINFO-N10170 Security: Customer Information 0.20 
  TECH-RPA-26004 Understanding the Basics of Robotic Process Automation (RPA) 1.00 
  IT-DATABASE-12189 Unleashing Excel: Database Techniques - Self Study 2.00 



 (1s390ms)
A4S-WEB2 18.188.252.23 url(WWW.CPEDEPOT.COM)-domain(WWW.CPEDEPOT.COM)-anon

Search Courses

Group Plan

Group plans are convenient and cost effective!

Authors Wanted

We are looking for authors!