Curriculum For This Course
Video tutorials list
-
CIA Part 3 Introduction and Exam Strategy
Video Name Time 1. CIA Part 3 Introduction and Exam Strategy 2:57 2. CIA Part 3 Tips & Tricks 5:26 3. Certification Overview 2:23 4. Exam Planning 2:44 5. Awareness and Proficiency of the Course Content 1:47 6. Exam Format and Strategy 4:49 7. CIA Part 3 Syllabus 2:11 -
Business Essentials
Video Name Time 1. Strategic Planning 1:46 2. Setting the Strategy and Objectives 2:10 3. Competitive Strategies 5:21 4. Strategic Considerations to Compete in a Market 2:48 5. Key Performance Indicators 2:26 6. Balanced Scorecard 4:01 7. Leading, Coincident and Lagging Indicators 2:45 8. KPI Targets 2:03 9. Steps to Developing KPIs 4:13 10. Productivity 3:30 11. Organizational Behavior 2:23 12. Motivation 3:26 13. Maslow's Hierarchy of Needs 7:57 14. Herzberg's Motivation-Hygiene Theory 3:59 15. McGregor's Theory X and Theory Y 2:17 16. Locke and Latham's Goal-Setting Theory 3:49 17. Skinner's Reinforcement Theory 3:35 18. Question on Skinner's Reinforcement Theory 0:41 19. Definitions of Organizational Structure and Culture 2:29 20. Reinforcing Organizational Culture 6:01 21. Big Five Traits Theory 5:11 22. Myers-Briggs Type Indicators 6:28 23. Job Design 3:46 24. Leadership vs Management Skills 3:57 25. Management Control Techniques 2:56 26. Bases of Power 4:41 27. Leadership Grid 3:28 28. Centralized vs Decentralized 8:18 29. Departmentalization 6:02 30. Business Processes - Sales 3:36 31. Business Processes - Procurement 2:18 32. Project Management Lifecycle 1:37 33. Project Management Lifecycle Pain Curve 2:54 34. Project Management Lifecycle Curve 2:08 35. Project Management Triangle 2:39 36. Gantt Charts and Project Network Analysis 7:51 37. Theory of Constraints 1:37 38. Program Evaluation Review Technique (PERT) - Critical Path Method (CPM) 2:47 39. Contract Elements 6:39 40. Contract Elements to Verify 1:49 41. Contract Pricing Forms 4:56 42. Question on Contract Pricing Forms 0:30 43. Definition of Data Analytics 2:13 44. Data and Information Security Governance 2:15 45. Challenges of Data Analytics and Big Data 6:38 46. Question on Challenges of Data Analytics and Big Data 1 0:35 47. Question on Challenges of Data Analytics and Big Data 2 3:14 48. Descriptive Data Analytics 3:02 49. Diagnostic Data Analytics 3:42 50. Predictive Data Analytics 3:16 51. Prescriptive Data Analytics 1:35 52. Data Analytics Process 7:10 53. Use of Data Analytics in Internal Audit 9:32 54. Question on Use of Data Analytics in Internal Audit 1:30 55. Question on Use of Data Analytics in Internal Audit 1:53 -
Information Security
Video Name Time 1. Definition of Information Security 5:36 2. Data Integrity, Confidentiality and Data Availability 2:47 3. IT General Controls 8:30 4. Segregation of IT Duties 5:06 5. Question on Segregation of IT Duties 1:48 6. Threats and Controls to Physical Security 7:03 7. Question on Threats and Controls to Physical Security 1 1:34 8. Question on Threats and Controls to Physical Security 2 2:08 9. Identity Access Management 2:35 10. Access and Authorization Controls - Risks 7:01 11. Identity Access Management - Activities 6:29 12. Authentication 1:04 13. IT Departmentalization 6:40 14. Question on IT Departmentalization 1 2:29 15. Question on IT Departmentalization 2 2:51 16. Types of Information Security Controls 11:41 17. Encryption 1:59 18. Firewalls 4:35 19. Data Privacy and Protection 6:58 20. Data Protection Framework 12:24 21. Question on Data Protection Framework 2:00 22. Smart Devices and Their Risks 7:57 23. Question on Smart Devices and Their Risks 3:32 24. Question on Question on Data Protection Framework 5:00 25. Asset-Threat-Vulnerability Triangle 8:05 26. Cybersecurity Risks 2:17 27. Cybersecurity Threats 33:40 28. Question on Cybersecurity Threats 1 0:25 29. Question on Cybersecurity Threats 2 0:59 30. Question on Cybersecurity Threats 3 1:01 31. Question on Cybersecurity Threats 4 0:34 32. IT Management and Governance Controls Against Cybersecurity Threats 7:12 33. Application and Access Controls 7:05 34. Technical IT Infrastructure Controls 2:31 35. External Connections Controls 3:54 36. Verifying 3rd Party Information Security 6:54 37. Illicit Software Use 7:49 38. Insider Threat 9:09 39. Question on Insider Threat 0:29 40. Question on Data Privacy and Protection 2:06 41. Cybersecurity Governance and Policies 5:51 42. Information Security Framework 5:22 43. The Three Lines of Defense Model in Cybersecurity 3:36 44. Question on Cybersecurity Governance and Policies 2:28 -
Information Technology
Video Name Time 1. The Layers Model of IT Management 3:08 2. Systems Development Life Cycle (SDLC) Model 5:35 3. Auditing the Systems Development Life Cycle (SDLC) Model 4:31 4. Types of Systems Development Methods 4:10 5. Waterfall Method 0:19 6. Spiral Method 0:44 7. Rapid Development 1:27 8. Agile Method 4:55 9. Question on Types of Systems Development Methods 2:20 10. Application Testing Methods 8:38 11. Question on Application Testing Methods 1:38 12. Databases - Terminology 4:04 13. Relational Databases 2:38 14. Software and Application Controls 5:25 15. Common Applications 3:33 16. IT Reporting Structure 6:21 17. IT Control Framework - COBIT 1:35 18. IT Control Framework - COBIT Principles 5:28 19. IT Infrastructure 5:27 20. Business Continuity and Disaster Recovery Planning (BCP-DRP) 5:50 21. Question on Business Continuity and Disaster Recovery Planning (BCP-DRP) 0:21 22. Data Backup and Recovery Controls 5:05 -
Financial And Management Accounting
Video Name Time 1. Aspects of Finance and Accounting 2:28 2. Qualities of Financial Information 5:07 3. Dual-entry Accounting 1:09 4. Exercise on Dual-entry Accounting 1:27 5. Cash-basis and Accrual-basis Accounting 3:15 6. Financial Statements 1:30 7. Financial Statement Assertions 2:18 8. Revenue Recognition - Point of Sale Recognition 1:15 9. Revenue Recognition - Instalment Sales Method 1:27 10. Revenue Recognition - Cost Recovery Method 0:52 11. Revenue Recognition - Completed Contract Method 1:31 12. Revenue Recognition - Percentage of Completion Method 1:13 13. Strait Line Depreciation 1:03 14. Activity Method Depreciation 1:19 15. Accelerated Depreciation 1:32 16. Sum-of-the-year's-digits Depreciation 0:51 17. Lessee Lease Methods 3:58 18. Lessor Lease Methods 3:00 19. Types of Ratio Analyses 3:08 20. Debt and Leverage Ratios 3:38 21. Liquidity Ratios 1:50 22. Question on Liquidity Ratios 0:58 23. Net Working Capital 0:44 24. Profitability Ratios 2:17 25. Return on Assets 0:45 26. Price to Earnings Ratio (PE Ratio) 1:18 27. Book Value Per Common Share 0:35 28. Investment Valuation Ratios 1:07 29. Activity Ratios 3:54 30. Capital Structure and Budgeting 0:54 31. Present and Future Value 1:12 32. Net Present Value (NPV) and Internal Rate of Return (IRR) 1:48 33. Payback Period 0:58 34. Accounting Rate of Return (IRR) 0:38 35. Responsibility Accounting 1:51 36. Cost Accounting Terminology 1:23 37. Cost Accounting - Types of Costs 2:32 38. Cost-Volume-Profit (CVP) Analysis 2:21 39. Product Costing Systems 2:03 40. Cost Allocation and Cost Accumulation Systems 4:11 41. Activity Based Costing (ABC) 2:26 42. Question on Cost Allocation and Cost Accumulation Systems 1:39
Add Comment