IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology
Your IIA IIA-CIA-Part3 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the IIA-CIA-Part3 certification test. Ace your IIA IIA-CIA-Part3 at the first attempt and obtain the Certified Internal Auditor - Part 3, Business Analysis and Information Technology credential with ease.
Curriculum for IIA-CIA-Part3 Video Course
CIA Part 3 Introduction and Exam Strategy
Video Name | Time | |
---|---|---|
1. CIA Part 3 Introduction and Exam Strategy | 2:57 | |
2. CIA Part 3 Tips & Tricks | 5:26 | |
3. Certification Overview | 2:23 | |
4. Exam Planning | 2:44 | |
5. Awareness and Proficiency of the Course Content | 1:47 | |
6. Exam Format and Strategy | 4:49 | |
7. CIA Part 3 Syllabus | 2:11 |
Video Name | Time | |
---|---|---|
1. Strategic Planning | 1:46 | |
2. Setting the Strategy and Objectives | 2:10 | |
3. Competitive Strategies | 5:21 | |
4. Strategic Considerations to Compete in a Market | 2:48 | |
5. Key Performance Indicators | 2:26 | |
6. Balanced Scorecard | 4:01 | |
7. Leading, Coincident and Lagging Indicators | 2:45 | |
8. KPI Targets | 2:03 | |
9. Steps to Developing KPIs | 4:13 | |
10. Productivity | 3:30 | |
11. Organizational Behavior | 2:23 | |
12. Motivation | 3:26 | |
13. Maslow's Hierarchy of Needs | 7:57 | |
14. Herzberg's Motivation-Hygiene Theory | 3:59 | |
15. McGregor's Theory X and Theory Y | 2:17 | |
16. Locke and Latham's Goal-Setting Theory | 3:49 | |
17. Skinner's Reinforcement Theory | 3:35 | |
18. Question on Skinner's Reinforcement Theory | 0:41 | |
19. Definitions of Organizational Structure and Culture | 2:29 | |
20. Reinforcing Organizational Culture | 6:01 | |
21. Big Five Traits Theory | 5:11 | |
22. Myers-Briggs Type Indicators | 6:28 | |
23. Job Design | 3:46 | |
24. Leadership vs Management Skills | 3:57 | |
25. Management Control Techniques | 2:56 | |
26. Bases of Power | 4:41 | |
27. Leadership Grid | 3:28 | |
28. Centralized vs Decentralized | 8:18 | |
29. Departmentalization | 6:02 | |
30. Business Processes - Sales | 3:36 | |
31. Business Processes - Procurement | 2:18 | |
32. Project Management Lifecycle | 1:37 | |
33. Project Management Lifecycle Pain Curve | 2:54 | |
34. Project Management Lifecycle Curve | 2:08 | |
35. Project Management Triangle | 2:39 | |
36. Gantt Charts and Project Network Analysis | 7:51 | |
37. Theory of Constraints | 1:37 | |
38. Program Evaluation Review Technique (PERT) - Critical Path Method (CPM) | 2:47 | |
39. Contract Elements | 6:39 | |
40. Contract Elements to Verify | 1:49 | |
41. Contract Pricing Forms | 4:56 | |
42. Question on Contract Pricing Forms | 0:30 | |
43. Definition of Data Analytics | 2:13 | |
44. Data and Information Security Governance | 2:15 | |
45. Challenges of Data Analytics and Big Data | 6:38 | |
46. Question on Challenges of Data Analytics and Big Data 1 | 0:35 | |
47. Question on Challenges of Data Analytics and Big Data 2 | 3:14 | |
48. Descriptive Data Analytics | 3:02 | |
49. Diagnostic Data Analytics | 3:42 | |
50. Predictive Data Analytics | 3:16 | |
51. Prescriptive Data Analytics | 1:35 | |
52. Data Analytics Process | 7:10 | |
53. Use of Data Analytics in Internal Audit | 9:32 | |
54. Question on Use of Data Analytics in Internal Audit | 1:30 | |
55. Question on Use of Data Analytics in Internal Audit | 1:53 |
Video Name | Time | |
---|---|---|
1. Definition of Information Security | 5:36 | |
2. Data Integrity, Confidentiality and Data Availability | 2:47 | |
3. IT General Controls | 8:30 | |
4. Segregation of IT Duties | 5:06 | |
5. Question on Segregation of IT Duties | 1:48 | |
6. Threats and Controls to Physical Security | 7:03 | |
7. Question on Threats and Controls to Physical Security 1 | 1:34 | |
8. Question on Threats and Controls to Physical Security 2 | 2:08 | |
9. Identity Access Management | 2:35 | |
10. Access and Authorization Controls - Risks | 7:01 | |
11. Identity Access Management - Activities | 6:29 | |
12. Authentication | 1:04 | |
13. IT Departmentalization | 6:40 | |
14. Question on IT Departmentalization 1 | 2:29 | |
15. Question on IT Departmentalization 2 | 2:51 | |
16. Types of Information Security Controls | 11:41 | |
17. Encryption | 1:59 | |
18. Firewalls | 4:35 | |
19. Data Privacy and Protection | 6:58 | |
20. Data Protection Framework | 12:24 | |
21. Question on Data Protection Framework | 2:00 | |
22. Smart Devices and Their Risks | 7:57 | |
23. Question on Smart Devices and Their Risks | 3:32 | |
24. Question on Question on Data Protection Framework | 5:00 | |
25. Asset-Threat-Vulnerability Triangle | 8:05 | |
26. Cybersecurity Risks | 2:17 | |
27. Cybersecurity Threats | 33:40 | |
28. Question on Cybersecurity Threats 1 | 0:25 | |
29. Question on Cybersecurity Threats 2 | 0:59 | |
30. Question on Cybersecurity Threats 3 | 1:01 | |
31. Question on Cybersecurity Threats 4 | 0:34 | |
32. IT Management and Governance Controls Against Cybersecurity Threats | 7:12 | |
33. Application and Access Controls | 7:05 | |
34. Technical IT Infrastructure Controls | 2:31 | |
35. External Connections Controls | 3:54 | |
36. Verifying 3rd Party Information Security | 6:54 | |
37. Illicit Software Use | 7:49 | |
38. Insider Threat | 9:09 | |
39. Question on Insider Threat | 0:29 | |
40. Question on Data Privacy and Protection | 2:06 | |
41. Cybersecurity Governance and Policies | 5:51 | |
42. Information Security Framework | 5:22 | |
43. The Three Lines of Defense Model in Cybersecurity | 3:36 | |
44. Question on Cybersecurity Governance and Policies | 2:28 |
Video Name | Time | |
---|---|---|
1. The Layers Model of IT Management | 3:08 | |
2. Systems Development Life Cycle (SDLC) Model | 5:35 | |
3. Auditing the Systems Development Life Cycle (SDLC) Model | 4:31 | |
4. Types of Systems Development Methods | 4:10 | |
5. Waterfall Method | 0:19 | |
6. Spiral Method | 0:44 | |
7. Rapid Development | 1:27 | |
8. Agile Method | 4:55 | |
9. Question on Types of Systems Development Methods | 2:20 | |
10. Application Testing Methods | 8:38 | |
11. Question on Application Testing Methods | 1:38 | |
12. Databases - Terminology | 4:04 | |
13. Relational Databases | 2:38 | |
14. Software and Application Controls | 5:25 | |
15. Common Applications | 3:33 | |
16. IT Reporting Structure | 6:21 | |
17. IT Control Framework - COBIT | 1:35 | |
18. IT Control Framework - COBIT Principles | 5:28 | |
19. IT Infrastructure | 5:27 | |
20. Business Continuity and Disaster Recovery Planning (BCP-DRP) | 5:50 | |
21. Question on Business Continuity and Disaster Recovery Planning (BCP-DRP) | 0:21 | |
22. Data Backup and Recovery Controls | 5:05 |
Video Name | Time | |
---|---|---|
1. Aspects of Finance and Accounting | 2:28 | |
2. Qualities of Financial Information | 5:07 | |
3. Dual-entry Accounting | 1:09 | |
4. Exercise on Dual-entry Accounting | 1:27 | |
5. Cash-basis and Accrual-basis Accounting | 3:15 | |
6. Financial Statements | 1:30 | |
7. Financial Statement Assertions | 2:18 | |
8. Revenue Recognition - Point of Sale Recognition | 1:15 | |
9. Revenue Recognition - Instalment Sales Method | 1:27 | |
10. Revenue Recognition - Cost Recovery Method | 0:52 | |
11. Revenue Recognition - Completed Contract Method | 1:31 | |
12. Revenue Recognition - Percentage of Completion Method | 1:13 | |
13. Strait Line Depreciation | 1:03 | |
14. Activity Method Depreciation | 1:19 | |
15. Accelerated Depreciation | 1:32 | |
16. Sum-of-the-year's-digits Depreciation | 0:51 | |
17. Lessee Lease Methods | 3:58 | |
18. Lessor Lease Methods | 3:00 | |
19. Types of Ratio Analyses | 3:08 | |
20. Debt and Leverage Ratios | 3:38 | |
21. Liquidity Ratios | 1:50 | |
22. Question on Liquidity Ratios | 0:58 | |
23. Net Working Capital | 0:44 | |
24. Profitability Ratios | 2:17 | |
25. Return on Assets | 0:45 | |
26. Price to Earnings Ratio (PE Ratio) | 1:18 | |
27. Book Value Per Common Share | 0:35 | |
28. Investment Valuation Ratios | 1:07 | |
29. Activity Ratios | 3:54 | |
30. Capital Structure and Budgeting | 0:54 | |
31. Present and Future Value | 1:12 | |
32. Net Present Value (NPV) and Internal Rate of Return (IRR) | 1:48 | |
33. Payback Period | 0:58 | |
34. Accounting Rate of Return (IRR) | 0:38 | |
35. Responsibility Accounting | 1:51 | |
36. Cost Accounting Terminology | 1:23 | |
37. Cost Accounting - Types of Costs | 2:32 | |
38. Cost-Volume-Profit (CVP) Analysis | 2:21 | |
39. Product Costing Systems | 2:03 | |
40. Cost Allocation and Cost Accumulation Systems | 4:11 | |
41. Activity Based Costing (ABC) | 2:26 | |
42. Question on Cost Allocation and Cost Accumulation Systems | 1:39 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo