Certified Internal Auditor (Cia) Part 3 – Full Study Course
Free Download Certified Internal Auditor (Cia) Part 3 – Full Study Course
Last updated 2/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.49 GB | Duration: 10h 18m
Full study course and instructor support for the Certified Internal Auditor (CIA) Part 3.
What you'll learn
What you need to be proficient at for the Certified Internal Auditor (CIA) Part 3 exam.
Learn how organizations plan their strategy, measure their performance and are structured to achieve their objectives.
Know about the type of data analytics and their role in internal auditing.
Learn about controls related to physical and information security and data privacy and protection.
Understand emerging cyber and technological risks.
Learn about common IT systems and their development.
Know about key IT controls and about disaster recovery planning.
Understand key concepts in financial and management accounting, such as business cycles, budgeting and transfer pricing.
Learn how to analyze financial data. Know about key concepts related to management accounting.
Requirements
No prerequisite knowledge expected. The different parts of the CIA can be performed in any order.
Description
We are glad to bring you a preparation course for the Part 3 of the Institute of Internal Auditor's (IIA) Certified Internal Auditor (CIA) certification. This course will review all key content necessary for the exam and includes practice questions and tips on exam strategy. The course will help you learn about the essential business knowledge an internal auditor needs to know, about key concepts in information security and information technology, as well as an introduction to financial and management accounting. It will review the key notions necessary for the exam and includes practice questions in each section and tips on exam strategy. Most importantly, it aims to help you 'think' like an internal auditor, which I find is essential for scoring highly on the exam as well as being a great internal auditor.The course covers: Business EssentialsLearn how organizations plan their strategy, measure their performance and are structured to achieve their objectives. Know about the type of data analytics and their role in internal auditing.Information SecurityLearn about controls related to physical and information security and data privacy and protection. Understand emerging cyber and technological risks.Information TechnologyLearn about common IT systems and their development. Know about key IT controls and about disaster recovery planning. Financial and Management AccountingUnderstand key concepts in financial and management accounting, such as business cycles, budgeting and transfer pricing. Learn how to analyze financial data. Know about key concepts related to management accounting.
Overview
Section 1: CIA Part 3 Introduction and Exam Strategy
Lecture 1 CIA Part 3 Introduction and Exam Strategy
Lecture 2 Course Materials
Lecture 3 CIA Part 3 Tips & Tricks
Lecture 4 Certification Overview
Lecture 5 Exam Planning
Lecture 6 Awareness and Proficiency of the Course Content
Lecture 7 Exam Format and Strategy
Lecture 8 CIA Part 3 Syllabus
Section 2: Business Essentials
Lecture 9 Strategic Planning
Lecture 10 Setting the Strategy and Objectives
Lecture 11 Competitive Strategies
Lecture 12 Strategic Considerations to Compete in a Market
Lecture 13 Key Performance Indicators
Lecture 14 Balanced Scorecard
Lecture 15 Leading, Coincident and Lagging Indicators
Lecture 16 KPI Targets
Lecture 17 Steps to Developing KPIs
Lecture 18 Productivity
Lecture 19 Organizational Behavior
Lecture 20 Motivation
Lecture 21 Maslow's Hierarchy of Needs
Lecture 22 Herzberg's Motivation-Hygiene Theory
Lecture 23 McGregor's Theory X and Theory Y
Lecture 24 Locke and Latham's Goal-Setting Theory
Lecture 25 Skinner's Reinforcement Theory
Lecture 26 Question on Skinner's Reinforcement Theory
Lecture 27 Definitions of Organizational Structure and Culture
Lecture 28 Reinforcing Organizational Culture
Lecture 29 Big Five Traits Theory
Lecture 30 Myers-Briggs Type Indicators
Lecture 31 Job Design
Lecture 32 Leadership vs Management Skills
Lecture 33 Management Control Techniques
Lecture 34 Bases of Power
Lecture 35 Leadership Grid
Lecture 36 Centralized vs Decentralized
Lecture 37 Departmentalization
Lecture 38 Business Processes - Sales
Lecture 39 Business Processes - Procurement
Lecture 40 Project Management Lifecycle
Lecture 41 Project Management Lifecycle Pain Curve
Lecture 42 Project Management Lifecycle Curve
Lecture 43 Project Management Triangle
Lecture 44 Gantt Charts and Project Network Analysis
Lecture 45 Theory of Constraints
Lecture 46 Program Evaluation Review Technique (PERT) - Critical Path Method (CPM)
Lecture 47 Contract Elements
Lecture 48 Contract Elements to Verify
Lecture 49 Contract Pricing Forms
Lecture 50 Question on Contract Pricing Forms
Lecture 51 Definition of Data Analytics
Lecture 52 Data and Information Security Governance
Lecture 53 Challenges of Data Analytics and Big Data
Lecture 54 Question on Challenges of Data Analytics and Big Data 1
Lecture 55 Question on Challenges of Data Analytics and Big Data 2
Lecture 56 Descriptive Data Analytics
Lecture 57 Diagnostic Data Analytics
Lecture 58 Predictive Data Analytics
Lecture 59 Prescriptive Data Analytics
Lecture 60 Data Analytics Process
Lecture 61 Use of Data Analytics in Internal Audit
Lecture 62 Question on Use of Data Analytics in Internal Audit
Lecture 63 Question on Use of Data Analytics in Internal Audit
Section 3: Information Security
Lecture 64 Definition of Information Security
Lecture 65 Data Integrity, Confidentiality and Data Availability
Lecture 66 IT General Controls
Lecture 67 Segregation of IT Duties
Lecture 68 Question on Segregation of IT Duties
Lecture 69 Threats and Controls to Physical Security
Lecture 70 Question on Threats and Controls to Physical Security 1
Lecture 71 Question on Threats and Controls to Physical Security 2
Lecture 72 Identity Access Management
Lecture 73 Access and Authorization Controls - Risks
Lecture 74 Identity Access Management - Activities
Lecture 75 Authentication
Lecture 76 IT Departmentalization
Lecture 77 Question on IT Departmentalization 1
Lecture 78 Question on IT Departmentalization 2
Lecture 79 Types of Information Security Controls
Lecture 80 Encryption
Lecture 81 Firewalls
Lecture 82 Data Privacy and Protection
Lecture 83 Data Protection Framework
Lecture 84 Question on Data Protection Framework
Lecture 85 Smart Devices and Their Risks
Lecture 86 Question on Smart Devices and Their Risks
Lecture 87 Question on Question on Data Protection Framework
Lecture 88 Asset-Threat-Vulnerability Triangle
Lecture 89 Cybersecurity Risks
Lecture 90 Cybersecurity Threats
Lecture 91 Question on Cybersecurity Threats 1
Lecture 92 Question on Cybersecurity Threats 2
Lecture 93 Question on Cybersecurity Threats 3
Lecture 94 Question on Cybersecurity Threats 4
Lecture 95 IT Management and Governance Controls Against Cybersecurity Threats
Lecture 96 Application and Access Controls
Lecture 97 Technical IT Infrastructure Controls
Lecture 98 External Connections Controls
Lecture 99 Verifying 3rd Party Information Security
Lecture 100 Illicit Software Use
Lecture 101 Insider Threat
Lecture 102 Question on Insider Threat
Lecture 103 Question on Data Privacy and Protection
Lecture 104 Cybersecurity Governance and Policies
Lecture 105 Information Security Framework
Lecture 106 The Three Lines of Defense Model in Cybersecurity
Lecture 107 Question on Cybersecurity Governance and Policies
Section 4: Information Technology
Lecture 108 The Layers Model of IT Management
Lecture 109 Systems Development Life Cycle (SDLC) Model
Lecture 110 Auditing the Systems Development Life Cycle (SDLC) Model
Lecture 111 Types of Systems Development Methods
Lecture 112 Waterfall Method
Lecture 113 Spiral Method
Lecture 114 Rapid Development
Lecture 115 Agile Method
Lecture 116 Question on Types of Systems Development Methods
Lecture 117 Application Testing Methods
Lecture 118 Question on Application Testing Methods
Lecture 119 Databases - Terminology
Lecture 120 Relational Databases
Lecture 121 Software and Application Controls
Lecture 122 Common Applications
Lecture 123 IT Reporting Structure
Lecture 124 IT Control Framework - COBIT
Lecture 125 IT Control Framework - COBIT Principles
Lecture 126 IT Infrastructure
Lecture 127 Business Continuity and Disaster Recovery Planning (BCP-DRP)
Lecture 128 Question on Business Continuity and Disaster Recovery Planning (BCP-DRP)
Lecture 129 Data Backup and Recovery Controls
Section 5: Financial and Management Accounting
Lecture 130 Aspects of Finance and Accounting
Lecture 131 Qualities of Financial Information
Lecture 132 Dual-entry Accounting
Lecture 133 Exercise on Dual-entry Accounting
Lecture 134 Cash-basis and Accrual-basis Accounting
Lecture 135 Financial Statements
Lecture 136 Financial Statement Assertions
Lecture 137 Revenue Recognition - Point of Sale Recognition
Lecture 138 Revenue Recognition - Instalment Sales Method
Lecture 139 Revenue Recognition - Cost Recovery Method
Lecture 140 Revenue Recognition - Completed Contract Method
Lecture 141 Revenue Recognition - Percentage of Completion Method
Lecture 142 Strait Line Depreciation
Lecture 143 Activity Method Depreciation
Lecture 144 Accelerated Depreciation
Lecture 145 Sum-of-the-year's-digits Depreciation
Lecture 146 Lessee Lease Methods
Lecture 147 Lessor Lease Methods
Lecture 148 Types of Ratio Analyses
Lecture 149 Debt and Leverage Ratios
Lecture 150 Liquidity Ratios
Lecture 151 Question on Liquidity Ratios
Lecture 152 Net Working Capital
Lecture 153 Profitability Ratios
Lecture 154 Return on Assets
Lecture 155 Price to Earnings Ratio (PE Ratio)
Lecture 156 Book Value Per Common Share
Lecture 157 Investment Valuation Ratios
Lecture 158 Activity Ratios
Lecture 159 Capital Structure and Budgeting
Lecture 160 Present and Future Value
Lecture 161 Net Present Value (NPV) and Internal Rate of Return (IRR)
Lecture 162 Payback Period
Lecture 163 Accounting Rate of Return (IRR)
Lecture 164 Responsibility Accounting
Lecture 165 Cost Accounting Terminology
Lecture 166 Cost Accounting - Types of Costs
Lecture 167 Cost-Volume-Profit (CVP) Analysis
Lecture 168 Product Costing Systems
Lecture 169 Cost Allocation and Cost Accumulation Systems
Lecture 170 Activity Based Costing (ABC)
Lecture 171 Question on Cost Allocation and Cost Accumulation Systems
Students preparing for the Certified Internal Auditor (CIA) exam.,Internal auditors.,External auditors.,Financial controllers or management accountants.,Finance, accounting or business students.,Risk managers.,Accountants (CPA, ACCA, Chartered Accountants, etc.).,Anyone working with internal auditors or undergoing an internal audit.
Homepage
https://www.udemy.com/course/ciapart3/
Rapidgator
hfjfa.Certified.Internal.Auditor.Cia.Part.3..Full.Study.Course.part2.rar.html
hfjfa.Certified.Internal.Auditor.Cia.Part.3..Full.Study.Course.part1.rar.html
Fikper Free Links
hfjfa.Certified.Internal.Auditor.Cia.Part.3..Full.Study.Course.part1.rar.html
hfjfa.Certified.Internal.Auditor.Cia.Part.3..Full.Study.Course.part2.rar.html
No Password - Links are Interchangeable