Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address
Loading...
Certified Internal Auditor - Part 3, Business Analysis and Information Technology Video Course

IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology

Your IIA IIA-CIA-Part3 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the IIA-CIA-Part3 certification test. Ace your IIA IIA-CIA-Part3 at the first attempt and obtain the Certified Internal Auditor - Part 3, Business Analysis and Information Technology credential with ease.

# of Students
111
# of Lectures
170
Course Length
10 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for IIA-CIA-Part3 Video Course

CIA Part 3 Introduction and Exam Strategy

  Video Name Time
  1. CIA Part 3 Introduction and Exam Strategy 2:57
  2. CIA Part 3 Tips & Tricks 5:26
  3. Certification Overview 2:23
  4. Exam Planning 2:44
  5. Awareness and Proficiency of the Course Content 1:47
  6. Exam Format and Strategy 4:49
  7. CIA Part 3 Syllabus 2:11
  Video Name Time
  1. Strategic Planning 1:46
  2. Setting the Strategy and Objectives 2:10
  3. Competitive Strategies 5:21
  4. Strategic Considerations to Compete in a Market 2:48
  5. Key Performance Indicators 2:26
  6. Balanced Scorecard 4:01
  7. Leading, Coincident and Lagging Indicators 2:45
  8. KPI Targets 2:03
  9. Steps to Developing KPIs 4:13
  10. Productivity 3:30
  11. Organizational Behavior 2:23
  12. Motivation 3:26
  13. Maslow's Hierarchy of Needs 7:57
  14. Herzberg's Motivation-Hygiene Theory 3:59
  15. McGregor's Theory X and Theory Y 2:17
  16. Locke and Latham's Goal-Setting Theory 3:49
  17. Skinner's Reinforcement Theory 3:35
  18. Question on Skinner's Reinforcement Theory 0:41
  19. Definitions of Organizational Structure and Culture 2:29
  20. Reinforcing Organizational Culture 6:01
  21. Big Five Traits Theory 5:11
  22. Myers-Briggs Type Indicators 6:28
  23. Job Design 3:46
  24. Leadership vs Management Skills 3:57
  25. Management Control Techniques 2:56
  26. Bases of Power 4:41
  27. Leadership Grid 3:28
  28. Centralized vs Decentralized 8:18
  29. Departmentalization 6:02
  30. Business Processes - Sales 3:36
  31. Business Processes - Procurement 2:18
  32. Project Management Lifecycle 1:37
  33. Project Management Lifecycle Pain Curve 2:54
  34. Project Management Lifecycle Curve 2:08
  35. Project Management Triangle 2:39
  36. Gantt Charts and Project Network Analysis 7:51
  37. Theory of Constraints 1:37
  38. Program Evaluation Review Technique (PERT) - Critical Path Method (CPM) 2:47
  39. Contract Elements 6:39
  40. Contract Elements to Verify 1:49
  41. Contract Pricing Forms 4:56
  42. Question on Contract Pricing Forms 0:30
  43. Definition of Data Analytics 2:13
  44. Data and Information Security Governance 2:15
  45. Challenges of Data Analytics and Big Data 6:38
  46. Question on Challenges of Data Analytics and Big Data 1 0:35
  47. Question on Challenges of Data Analytics and Big Data 2 3:14
  48. Descriptive Data Analytics 3:02
  49. Diagnostic Data Analytics 3:42
  50. Predictive Data Analytics 3:16
  51. Prescriptive Data Analytics 1:35
  52. Data Analytics Process 7:10
  53. Use of Data Analytics in Internal Audit 9:32
  54. Question on Use of Data Analytics in Internal Audit 1:30
  55. Question on Use of Data Analytics in Internal Audit 1:53
  Video Name Time
  1. Definition of Information Security 5:36
  2. Data Integrity, Confidentiality and Data Availability 2:47
  3. IT General Controls 8:30
  4. Segregation of IT Duties 5:06
  5. Question on Segregation of IT Duties 1:48
  6. Threats and Controls to Physical Security 7:03
  7. Question on Threats and Controls to Physical Security 1 1:34
  8. Question on Threats and Controls to Physical Security 2 2:08
  9. Identity Access Management 2:35
  10. Access and Authorization Controls - Risks 7:01
  11. Identity Access Management - Activities 6:29
  12. Authentication 1:04
  13. IT Departmentalization 6:40
  14. Question on IT Departmentalization 1 2:29
  15. Question on IT Departmentalization 2 2:51
  16. Types of Information Security Controls 11:41
  17. Encryption 1:59
  18. Firewalls 4:35
  19. Data Privacy and Protection 6:58
  20. Data Protection Framework 12:24
  21. Question on Data Protection Framework 2:00
  22. Smart Devices and Their Risks 7:57
  23. Question on Smart Devices and Their Risks 3:32
  24. Question on Question on Data Protection Framework 5:00
  25. Asset-Threat-Vulnerability Triangle 8:05
  26. Cybersecurity Risks 2:17
  27. Cybersecurity Threats 33:40
  28. Question on Cybersecurity Threats 1 0:25
  29. Question on Cybersecurity Threats 2 0:59
  30. Question on Cybersecurity Threats 3 1:01
  31. Question on Cybersecurity Threats 4 0:34
  32. IT Management and Governance Controls Against Cybersecurity Threats 7:12
  33. Application and Access Controls 7:05
  34. Technical IT Infrastructure Controls 2:31
  35. External Connections Controls 3:54
  36. Verifying 3rd Party Information Security 6:54
  37. Illicit Software Use 7:49
  38. Insider Threat 9:09
  39. Question on Insider Threat 0:29
  40. Question on Data Privacy and Protection 2:06
  41. Cybersecurity Governance and Policies 5:51
  42. Information Security Framework 5:22
  43. The Three Lines of Defense Model in Cybersecurity 3:36
  44. Question on Cybersecurity Governance and Policies 2:28
  Video Name Time
  1. The Layers Model of IT Management 3:08
  2. Systems Development Life Cycle (SDLC) Model 5:35
  3. Auditing the Systems Development Life Cycle (SDLC) Model 4:31
  4. Types of Systems Development Methods 4:10
  5. Waterfall Method 0:19
  6. Spiral Method 0:44
  7. Rapid Development 1:27
  8. Agile Method 4:55
  9. Question on Types of Systems Development Methods 2:20
  10. Application Testing Methods 8:38
  11. Question on Application Testing Methods 1:38
  12. Databases - Terminology 4:04
  13. Relational Databases 2:38
  14. Software and Application Controls 5:25
  15. Common Applications 3:33
  16. IT Reporting Structure 6:21
  17. IT Control Framework - COBIT 1:35
  18. IT Control Framework - COBIT Principles 5:28
  19. IT Infrastructure 5:27
  20. Business Continuity and Disaster Recovery Planning (BCP-DRP) 5:50
  21. Question on Business Continuity and Disaster Recovery Planning (BCP-DRP) 0:21
  22. Data Backup and Recovery Controls 5:05
  Video Name Time
  1. Aspects of Finance and Accounting 2:28
  2. Qualities of Financial Information 5:07
  3. Dual-entry Accounting 1:09
  4. Exercise on Dual-entry Accounting 1:27
  5. Cash-basis and Accrual-basis Accounting 3:15
  6. Financial Statements 1:30
  7. Financial Statement Assertions 2:18
  8. Revenue Recognition - Point of Sale Recognition 1:15
  9. Revenue Recognition - Instalment Sales Method 1:27
  10. Revenue Recognition - Cost Recovery Method 0:52
  11. Revenue Recognition - Completed Contract Method 1:31
  12. Revenue Recognition - Percentage of Completion Method 1:13
  13. Strait Line Depreciation 1:03
  14. Activity Method Depreciation 1:19
  15. Accelerated Depreciation 1:32
  16. Sum-of-the-year's-digits Depreciation 0:51
  17. Lessee Lease Methods 3:58
  18. Lessor Lease Methods 3:00
  19. Types of Ratio Analyses 3:08
  20. Debt and Leverage Ratios 3:38
  21. Liquidity Ratios 1:50
  22. Question on Liquidity Ratios 0:58
  23. Net Working Capital 0:44
  24. Profitability Ratios 2:17
  25. Return on Assets 0:45
  26. Price to Earnings Ratio (PE Ratio) 1:18
  27. Book Value Per Common Share 0:35
  28. Investment Valuation Ratios 1:07
  29. Activity Ratios 3:54
  30. Capital Structure and Budgeting 0:54
  31. Present and Future Value 1:12
  32. Net Present Value (NPV) and Internal Rate of Return (IRR) 1:48
  33. Payback Period 0:58
  34. Accounting Rate of Return (IRR) 0:38
  35. Responsibility Accounting 1:51
  36. Cost Accounting Terminology 1:23
  37. Cost Accounting - Types of Costs 2:32
  38. Cost-Volume-Profit (CVP) Analysis 2:21
  39. Product Costing Systems 2:03
  40. Cost Allocation and Cost Accumulation Systems 4:11
  41. Activity Based Costing (ABC) 2:26
  42. Question on Cost Allocation and Cost Accumulation Systems 1:39

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • IIA
Next Step
Next Step