Certified Internal Auditor (Cia) Part 3 - Full Study Course
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.04 GB | Duration: 10h 18m
Published 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.04 GB | Duration: 10h 18m
Full study course and instructor support for the Certified Internal Auditor (CIA) Part 3.
What you'll learn
What you need to be proficient at for the Certified Internal Auditor (CIA) Part 3 exam.
Learn how organizations plan their strategy, measure their performance and are structured to achieve their objectives.
Know about the type of data analytics and their role in internal auditing.
Learn about controls related to physical and information security and data privacy and protection.
Understand emerging cyber and technological risks.
Learn about common IT systems and their development.
Know about key IT controls and about disaster recovery planning.
Understand key concepts in financial and management accounting, such as business cycles, budgeting and transfer pricing.
Learn how to analyze financial data. Know about key concepts related to management accounting.
Requirements
No prerequisite knowledge expected. The different parts of the CIA can be performed in any order.
Description
We are glad to bring you a preparation course for the Part 3 of the Institute of Internal Auditor’s (IIA) Certified Internal Auditor (CIA) certification. This course will review all key content necessary for the exam and includes practice questions and tips on exam strategy. The course will help you learn about the essential business knowledge an internal auditor needs to know, about key concepts in information security and information technology, as well as an introduction to financial and management accounting.It will review the key notions necessary for the exam and includes practice questions in each section and tips on exam strategy. Most importantly, it aims to help you ‘think’ like an internal auditor, which I find is essential for scoring highly on the exam as well as being a great internal auditor.The course covers: Business EssentialsLearn how organizations plan their strategy, measure their performance and are structured to achieve their objectives. Know about the type of data analytics and their role in internal auditing.Information SecurityLearn about controls related to physical and information security and data privacy and protection. Understand emerging cyber and technological risks.Information TechnologyLearn about common IT systems and their development. Know about key IT controls and about disaster recovery planning.Financial and Management AccountingUnderstand key concepts in financial and management accounting, such as business cycles, budgeting and transfer pricing. Learn how to analyze financial data. Know about key concepts related to management accounting.
Overview
Section 1: CIA Part 3 Introduction and Exam Strategy
Lecture 1 CIA Part 3 Introduction and Exam Strategy
Lecture 2 CIA Part 3 Tips & Tricks
Lecture 3 Certification Overview
Lecture 4 Exam Planning
Lecture 5 Awareness and Proficiency of the Course Content
Lecture 6 Exam Format and Strategy
Lecture 7 CIA Part 3 Syllabus
Section 2: Business Essentials
Lecture 8 Strategic Planning
Lecture 9 Setting the Strategy and Objectives
Lecture 10 Competitive Strategies
Lecture 11 Strategic Considerations to Compete in a Market
Lecture 12 Key Performance Indicators
Lecture 13 Balanced Scorecard
Lecture 14 Leading, Coincident and Lagging Indicators
Lecture 15 KPI Targets
Lecture 16 Steps to Developing KPIs
Lecture 17 Productivity
Lecture 18 Organizational Behavior
Lecture 19 Motivation
Lecture 20 Maslow's Hierarchy of Needs
Lecture 21 Herzberg's Motivation-Hygiene Theory
Lecture 22 McGregor's Theory X and Theory Y
Lecture 23 Locke and Latham's Goal-Setting Theory
Lecture 24 Skinner's Reinforcement Theory
Lecture 25 Question on Skinner's Reinforcement Theory
Lecture 26 Definitions of Organizational Structure and Culture
Lecture 27 Reinforcing Organizational Culture
Lecture 28 Big Five Traits Theory
Lecture 29 Myers-Briggs Type Indicators
Lecture 30 Job Design
Lecture 31 Leadership vs Management Skills
Lecture 32 Management Control Techniques
Lecture 33 Bases of Power
Lecture 34 Leadership Grid
Lecture 35 Centralized vs Decentralized
Lecture 36 Departmentalization
Lecture 37 Business Processes - Sales
Lecture 38 Business Processes - Procurement
Lecture 39 Project Management Lifecycle
Lecture 40 Project Management Lifecycle Pain Curve
Lecture 41 Project Management Lifecycle Curve
Lecture 42 Project Management Triangle
Lecture 43 Gantt Charts and Project Network Analysis
Lecture 44 Theory of Constraints
Lecture 45 Program Evaluation Review Technique (PERT) - Critical Path Method (CPM)
Lecture 46 Contract Elements
Lecture 47 Contract Elements to Verify
Lecture 48 Contract Pricing Forms
Lecture 49 Question on Contract Pricing Forms
Lecture 50 Definition of Data Analytics
Lecture 51 Data and Information Security Governance
Lecture 52 Challenges of Data Analytics and Big Data
Lecture 53 Question on Challenges of Data Analytics and Big Data 1
Lecture 54 Question on Challenges of Data Analytics and Big Data 2
Lecture 55 Descriptive Data Analytics
Lecture 56 Diagnostic Data Analytics
Lecture 57 Predictive Data Analytics
Lecture 58 Prescriptive Data Analytics
Lecture 59 Data Analytics Process
Lecture 60 Use of Data Analytics in Internal Audit
Lecture 61 Question on Use of Data Analytics in Internal Audit
Lecture 62 Question on Use of Data Analytics in Internal Audit
Section 3: Information Security
Lecture 63 Definition of Information Security
Lecture 64 Data Integrity, Confidentiality and Data Availability
Lecture 65 IT General Controls
Lecture 66 Segregation of IT Duties
Lecture 67 Question on Segregation of IT Duties
Lecture 68 Threats and Controls to Physical Security
Lecture 69 Question on Threats and Controls to Physical Security 1
Lecture 70 Question on Threats and Controls to Physical Security 2
Lecture 71 Identity Access Management
Lecture 72 Access and Authorization Controls - Risks
Lecture 73 Identity Access Management - Activities
Lecture 74 Authentication
Lecture 75 IT Departmentalization
Lecture 76 Question on IT Departmentalization 1
Lecture 77 Question on IT Departmentalization 2
Lecture 78 Types of Information Security Controls
Lecture 79 Encryption
Lecture 80 Firewalls
Lecture 81 Data Privacy and Protection
Lecture 82 Data Protection Framework
Lecture 83 Question on Data Protection Framework
Lecture 84 Smart Devices and Their Risks
Lecture 85 Question on Smart Devices and Their Risks
Lecture 86 Question onQuestion on Data Protection Framework
Lecture 87 Asset-Threat-Vulnerability Triangle
Lecture 88 Cybersecurity Risks
Lecture 89 Cybersecurity Threats
Lecture 90 Question on Cybersecurity Threats 1
Lecture 91 Question on Cybersecurity Threats 2
Lecture 92 Question on Cybersecurity Threats 3
Lecture 93 Question on Cybersecurity Threats 4
Lecture 94 IT Management and Governance Controls Against Cybersecurity Threats
Lecture 95 Application and Access Controls
Lecture 96 Technical IT Infrastructure Controls
Lecture 97 External Connections Controls
Lecture 98 Verifying 3rd Party Information Security
Lecture 99 Illicit Software Use
Lecture 100 Insider Threat
Lecture 101 Question on Insider Threat
Lecture 102 Question on Data Privacy and Protection
Lecture 103 Cybersecurity Governance and Policies
Lecture 104 Information Security Framework
Lecture 105 The Three Lines of Defense Model in Cybersecurity
Lecture 106 Question on Cybersecurity Governance and Policies
Section 4: Information Technology
Lecture 107 The Layers Model of IT Management
Lecture 108 Systems Development Life Cycle (SDLC) Model
Lecture 109 Auditing the Systems Development Life Cycle (SDLC) Model
Lecture 110 Types of Systems Development Methods
Lecture 111 Waterfall Method
Lecture 112 Spiral Method
Lecture 113 Rapid Development
Lecture 114 Agile Method
Lecture 115 Question on Types of Systems Development Methods
Lecture 116 Application Testing Methods
Lecture 117 Question on Application Testing Methods
Lecture 118 Databases - Terminology
Lecture 119 Relational Databases
Lecture 120 Software and Application Controls
Lecture 121 Common Applications
Lecture 122 IT Reporting Structure
Lecture 123 IT Control Framework - COBIT
Lecture 124 IT Control Framework - COBIT Principles
Lecture 125 IT Infrastructure
Lecture 126 Business Continuity and Disaster Recovery Planning (BCP-DRP)
Lecture 127 Question on Business Continuity and Disaster Recovery Planning (BCP-DRP)
Lecture 128 Data Backup and Recovery Controls
Section 5: Financial and Management Accounting
Lecture 129 Aspects of Finance and Accounting
Lecture 130 Qualities of Financial Information
Lecture 131 Dual-entry Accounting
Lecture 132 Exercise on Dual-entry Accounting
Lecture 133 Cash-basis and Accrual-basis Accounting
Lecture 134 Financial Statements
Lecture 135 Financial Statement Assertions
Lecture 136 Revenue Recognition - Point of Sale Recognition
Lecture 137 Revenue Recognition - Instalment Sales Method
Lecture 138 Revenue Recognition - Cost Recovery Method
Lecture 139 Revenue Recognition - Completed Contract Method
Lecture 140 Revenue Recognition - Percentage of Completion Method
Lecture 141 Strait Line Depreciation
Lecture 142 Activity Method Depreciation
Lecture 143 Accelerated Depreciation
Lecture 144 Sum-of-the-year's-digits Depreciation
Lecture 145 Lessee Lease Methods
Lecture 146 Lessor Lease Methods
Lecture 147 Types of Ratio Analyses
Lecture 148 Debt and Leverage Ratios
Lecture 149 Liquidity Ratios
Lecture 150 Question on Liquidity Ratios
Lecture 151 Net Working Capital
Lecture 152 Profitability Ratios
Lecture 153 Return on Assets
Lecture 154 Price to Earnings Ratio (PE Ratio)
Lecture 155 Book Value Per Common Share
Lecture 156 Investment Valuation Ratios
Lecture 157 Activity Ratios
Lecture 158 Capital Structure and Budgeting
Lecture 159 Present and Future Value
Lecture 160 Net Present Value (NPV) and Internal Rate of Return (IRR)
Lecture 161 Payback Period
Lecture 162 Accounting Rate of Return (IRR)
Lecture 163 Responsibility Accounting
Lecture 164 Cost Accounting Terminology
Lecture 165 Cost Accounting - Types of Costs
Lecture 166 Cost-Volume-Profit (CVP) Analysis
Lecture 167 Product Costing Systems
Lecture 168 Cost Allocation and Cost Accumulation Systems
Lecture 169 Activity Based Costing (ABC)
Lecture 170 Question on Cost Allocation and Cost Accumulation Systems
Students preparing for the Certified Internal Auditor (CIA) exam.,Internal auditors.,External auditors.,Financial controllers or management accountants.,Finance, accounting or business students.,Risk managers.,Accountants (CPA, ACCA, Chartered Accountants, etc.).,Anyone working with internal auditors or undergoing an internal audit.