Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Internal Auditor (Cia) Part 3 - Full Study Course

    Posted By: ELK1nG
    Certified Internal Auditor (Cia) Part 3 - Full Study Course

    Certified Internal Auditor (Cia) Part 3 - Full Study Course
    Published 11/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 8.04 GB | Duration: 10h 18m

    Full study course and instructor support for the Certified Internal Auditor (CIA) Part 3.

    What you'll learn
    What you need to be proficient at for the Certified Internal Auditor (CIA) Part 3 exam.
    Learn how organizations plan their strategy, measure their performance and are structured to achieve their objectives.
    Know about the type of data analytics and their role in internal auditing.
    Learn about controls related to physical and information security and data privacy and protection.
    Understand emerging cyber and technological risks.
    Learn about common IT systems and their development.
    Know about key IT controls and about disaster recovery planning.
    Understand key concepts in financial and management accounting, such as business cycles, budgeting and transfer pricing.
    Learn how to analyze financial data. Know about key concepts related to management accounting.
    Requirements
    No prerequisite knowledge expected. The different parts of the CIA can be performed in any order.
    Description
    We are glad to bring you a preparation course for the Part 3 of the Institute of Internal Auditor’s (IIA) Certified Internal Auditor (CIA) certification. This course will review all key content necessary for the exam and includes practice questions and tips on exam strategy. The course will help you learn about the essential business knowledge an internal auditor needs to know, about key concepts in information security and information technology, as well as an introduction to financial and management accounting.It will review the key notions necessary for the exam and includes practice questions in each section and tips on exam strategy. Most importantly, it aims to help you ‘think’ like an internal auditor, which I find is essential for scoring highly on the exam as well as being a great internal auditor.The course covers: Business EssentialsLearn how organizations plan their strategy, measure their performance and are structured to achieve their objectives. Know about the type of data analytics and their role in internal auditing.Information SecurityLearn about controls related to physical and information security and data privacy and protection. Understand emerging cyber and technological risks.Information TechnologyLearn about common IT systems and their development. Know about key IT controls and about disaster recovery planning.Financial and Management AccountingUnderstand key concepts in financial and management accounting, such as business cycles, budgeting and transfer pricing. Learn how to analyze financial data. Know about key concepts related to management accounting.

    Overview

    Section 1: CIA Part 3 Introduction and Exam Strategy

    Lecture 1 CIA Part 3 Introduction and Exam Strategy

    Lecture 2 CIA Part 3 Tips & Tricks

    Lecture 3 Certification Overview

    Lecture 4 Exam Planning

    Lecture 5 Awareness and Proficiency of the Course Content

    Lecture 6 Exam Format and Strategy

    Lecture 7 CIA Part 3 Syllabus

    Section 2: Business Essentials

    Lecture 8 Strategic Planning

    Lecture 9 Setting the Strategy and Objectives

    Lecture 10 Competitive Strategies

    Lecture 11 Strategic Considerations to Compete in a Market

    Lecture 12 Key Performance Indicators

    Lecture 13 Balanced Scorecard

    Lecture 14 Leading, Coincident and Lagging Indicators

    Lecture 15 KPI Targets

    Lecture 16 Steps to Developing KPIs

    Lecture 17 Productivity

    Lecture 18 Organizational Behavior

    Lecture 19 Motivation

    Lecture 20 Maslow's Hierarchy of Needs

    Lecture 21 Herzberg's Motivation-Hygiene Theory

    Lecture 22 McGregor's Theory X and Theory Y

    Lecture 23 Locke and Latham's Goal-Setting Theory

    Lecture 24 Skinner's Reinforcement Theory

    Lecture 25 Question on Skinner's Reinforcement Theory

    Lecture 26 Definitions of Organizational Structure and Culture

    Lecture 27 Reinforcing Organizational Culture

    Lecture 28 Big Five Traits Theory

    Lecture 29 Myers-Briggs Type Indicators

    Lecture 30 Job Design

    Lecture 31 Leadership vs Management Skills

    Lecture 32 Management Control Techniques

    Lecture 33 Bases of Power

    Lecture 34 Leadership Grid

    Lecture 35 Centralized vs Decentralized

    Lecture 36 Departmentalization

    Lecture 37 Business Processes - Sales

    Lecture 38 Business Processes - Procurement

    Lecture 39 Project Management Lifecycle

    Lecture 40 Project Management Lifecycle Pain Curve

    Lecture 41 Project Management Lifecycle Curve

    Lecture 42 Project Management Triangle

    Lecture 43 Gantt Charts and Project Network Analysis

    Lecture 44 Theory of Constraints

    Lecture 45 Program Evaluation Review Technique (PERT) - Critical Path Method (CPM)

    Lecture 46 Contract Elements

    Lecture 47 Contract Elements to Verify

    Lecture 48 Contract Pricing Forms

    Lecture 49 Question on Contract Pricing Forms

    Lecture 50 Definition of Data Analytics

    Lecture 51 Data and Information Security Governance

    Lecture 52 Challenges of Data Analytics and Big Data

    Lecture 53 Question on Challenges of Data Analytics and Big Data 1

    Lecture 54 Question on Challenges of Data Analytics and Big Data 2

    Lecture 55 Descriptive Data Analytics

    Lecture 56 Diagnostic Data Analytics

    Lecture 57 Predictive Data Analytics

    Lecture 58 Prescriptive Data Analytics

    Lecture 59 Data Analytics Process

    Lecture 60 Use of Data Analytics in Internal Audit

    Lecture 61 Question on Use of Data Analytics in Internal Audit

    Lecture 62 Question on Use of Data Analytics in Internal Audit

    Section 3: Information Security

    Lecture 63 Definition of Information Security

    Lecture 64 Data Integrity, Confidentiality and Data Availability

    Lecture 65 IT General Controls

    Lecture 66 Segregation of IT Duties

    Lecture 67 Question on Segregation of IT Duties

    Lecture 68 Threats and Controls to Physical Security

    Lecture 69 Question on Threats and Controls to Physical Security 1

    Lecture 70 Question on Threats and Controls to Physical Security 2

    Lecture 71 Identity Access Management

    Lecture 72 Access and Authorization Controls - Risks

    Lecture 73 Identity Access Management - Activities

    Lecture 74 Authentication

    Lecture 75 IT Departmentalization

    Lecture 76 Question on IT Departmentalization 1

    Lecture 77 Question on IT Departmentalization 2

    Lecture 78 Types of Information Security Controls

    Lecture 79 Encryption

    Lecture 80 Firewalls

    Lecture 81 Data Privacy and Protection

    Lecture 82 Data Protection Framework

    Lecture 83 Question on Data Protection Framework

    Lecture 84 Smart Devices and Their Risks

    Lecture 85 Question on Smart Devices and Their Risks

    Lecture 86 Question onQuestion on Data Protection Framework

    Lecture 87 Asset-Threat-Vulnerability Triangle

    Lecture 88 Cybersecurity Risks

    Lecture 89 Cybersecurity Threats

    Lecture 90 Question on Cybersecurity Threats 1

    Lecture 91 Question on Cybersecurity Threats 2

    Lecture 92 Question on Cybersecurity Threats 3

    Lecture 93 Question on Cybersecurity Threats 4

    Lecture 94 IT Management and Governance Controls Against Cybersecurity Threats

    Lecture 95 Application and Access Controls

    Lecture 96 Technical IT Infrastructure Controls

    Lecture 97 External Connections Controls

    Lecture 98 Verifying 3rd Party Information Security

    Lecture 99 Illicit Software Use

    Lecture 100 Insider Threat

    Lecture 101 Question on Insider Threat

    Lecture 102 Question on Data Privacy and Protection

    Lecture 103 Cybersecurity Governance and Policies

    Lecture 104 Information Security Framework

    Lecture 105 The Three Lines of Defense Model in Cybersecurity

    Lecture 106 Question on Cybersecurity Governance and Policies

    Section 4: Information Technology

    Lecture 107 The Layers Model of IT Management

    Lecture 108 Systems Development Life Cycle (SDLC) Model

    Lecture 109 Auditing the Systems Development Life Cycle (SDLC) Model

    Lecture 110 Types of Systems Development Methods

    Lecture 111 Waterfall Method

    Lecture 112 Spiral Method

    Lecture 113 Rapid Development

    Lecture 114 Agile Method

    Lecture 115 Question on Types of Systems Development Methods

    Lecture 116 Application Testing Methods

    Lecture 117 Question on Application Testing Methods

    Lecture 118 Databases - Terminology

    Lecture 119 Relational Databases

    Lecture 120 Software and Application Controls

    Lecture 121 Common Applications

    Lecture 122 IT Reporting Structure

    Lecture 123 IT Control Framework - COBIT

    Lecture 124 IT Control Framework - COBIT Principles

    Lecture 125 IT Infrastructure

    Lecture 126 Business Continuity and Disaster Recovery Planning (BCP-DRP)

    Lecture 127 Question on Business Continuity and Disaster Recovery Planning (BCP-DRP)

    Lecture 128 Data Backup and Recovery Controls

    Section 5: Financial and Management Accounting

    Lecture 129 Aspects of Finance and Accounting

    Lecture 130 Qualities of Financial Information

    Lecture 131 Dual-entry Accounting

    Lecture 132 Exercise on Dual-entry Accounting

    Lecture 133 Cash-basis and Accrual-basis Accounting

    Lecture 134 Financial Statements

    Lecture 135 Financial Statement Assertions

    Lecture 136 Revenue Recognition - Point of Sale Recognition

    Lecture 137 Revenue Recognition - Instalment Sales Method

    Lecture 138 Revenue Recognition - Cost Recovery Method

    Lecture 139 Revenue Recognition - Completed Contract Method

    Lecture 140 Revenue Recognition - Percentage of Completion Method

    Lecture 141 Strait Line Depreciation

    Lecture 142 Activity Method Depreciation

    Lecture 143 Accelerated Depreciation

    Lecture 144 Sum-of-the-year's-digits Depreciation

    Lecture 145 Lessee Lease Methods

    Lecture 146 Lessor Lease Methods

    Lecture 147 Types of Ratio Analyses

    Lecture 148 Debt and Leverage Ratios

    Lecture 149 Liquidity Ratios

    Lecture 150 Question on Liquidity Ratios

    Lecture 151 Net Working Capital

    Lecture 152 Profitability Ratios

    Lecture 153 Return on Assets

    Lecture 154 Price to Earnings Ratio (PE Ratio)

    Lecture 155 Book Value Per Common Share

    Lecture 156 Investment Valuation Ratios

    Lecture 157 Activity Ratios

    Lecture 158 Capital Structure and Budgeting

    Lecture 159 Present and Future Value

    Lecture 160 Net Present Value (NPV) and Internal Rate of Return (IRR)

    Lecture 161 Payback Period

    Lecture 162 Accounting Rate of Return (IRR)

    Lecture 163 Responsibility Accounting

    Lecture 164 Cost Accounting Terminology

    Lecture 165 Cost Accounting - Types of Costs

    Lecture 166 Cost-Volume-Profit (CVP) Analysis

    Lecture 167 Product Costing Systems

    Lecture 168 Cost Allocation and Cost Accumulation Systems

    Lecture 169 Activity Based Costing (ABC)

    Lecture 170 Question on Cost Allocation and Cost Accumulation Systems

    Students preparing for the Certified Internal Auditor (CIA) exam.,Internal auditors.,External auditors.,Financial controllers or management accountants.,Finance, accounting or business students.,Risk managers.,Accountants (CPA, ACCA, Chartered Accountants, etc.).,Anyone working with internal auditors or undergoing an internal audit.