IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology Certification Video Training Course
The complete solution to prepare for for your exam with IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology certification video training course. The IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including IIA IIA-CIA-Part3 exam dumps, study guide & practice test questions and answers.
IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology Certification Video Training Course Exam Curriculum
CIA Part 3 Introduction and Exam Strategy
-
1. CIA Part 3 Introduction and Exam Strategy2:57
-
2. CIA Part 3 Tips & Tricks5:26
-
3. Certification Overview2:23
-
4. Exam Planning2:44
-
5. Awareness and Proficiency of the Course Content1:47
-
6. Exam Format and Strategy4:49
-
7. CIA Part 3 Syllabus2:11
Business Essentials
-
1. Strategic Planning1:46
-
2. Setting the Strategy and Objectives2:10
-
3. Competitive Strategies5:21
-
4. Strategic Considerations to Compete in a Market2:48
-
5. Key Performance Indicators2:26
-
6. Balanced Scorecard4:01
-
7. Leading, Coincident and Lagging Indicators2:45
-
8. KPI Targets2:03
-
9. Steps to Developing KPIs4:13
-
10. Productivity3:30
-
11. Organizational Behavior2:23
-
12. Motivation3:26
-
13. Maslow's Hierarchy of Needs7:57
-
14. Herzberg's Motivation-Hygiene Theory3:59
-
15. McGregor's Theory X and Theory Y2:17
-
16. Locke and Latham's Goal-Setting Theory3:49
-
17. Skinner's Reinforcement Theory3:35
-
18. Question on Skinner's Reinforcement Theory0:41
-
19. Definitions of Organizational Structure and Culture2:29
-
20. Reinforcing Organizational Culture6:01
-
21. Big Five Traits Theory5:11
-
22. Myers-Briggs Type Indicators6:28
-
23. Job Design3:46
-
24. Leadership vs Management Skills3:57
-
25. Management Control Techniques2:56
-
26. Bases of Power4:41
-
27. Leadership Grid3:28
-
28. Centralized vs Decentralized8:18
-
29. Departmentalization6:02
-
30. Business Processes - Sales3:36
-
31. Business Processes - Procurement2:18
-
32. Project Management Lifecycle1:37
-
33. Project Management Lifecycle Pain Curve2:54
-
34. Project Management Lifecycle Curve2:08
-
35. Project Management Triangle2:39
-
36. Gantt Charts and Project Network Analysis7:51
-
37. Theory of Constraints1:37
-
38. Program Evaluation Review Technique (PERT) - Critical Path Method (CPM)2:47
-
39. Contract Elements6:39
-
40. Contract Elements to Verify1:49
-
41. Contract Pricing Forms4:56
-
42. Question on Contract Pricing Forms0:30
-
43. Definition of Data Analytics2:13
-
44. Data and Information Security Governance2:15
-
45. Challenges of Data Analytics and Big Data6:38
-
46. Question on Challenges of Data Analytics and Big Data 10:35
-
47. Question on Challenges of Data Analytics and Big Data 23:14
-
48. Descriptive Data Analytics3:02
-
49. Diagnostic Data Analytics3:42
-
50. Predictive Data Analytics3:16
-
51. Prescriptive Data Analytics1:35
-
52. Data Analytics Process7:10
-
53. Use of Data Analytics in Internal Audit9:32
-
54. Question on Use of Data Analytics in Internal Audit1:30
-
55. Question on Use of Data Analytics in Internal Audit1:53
Information Security
-
1. Definition of Information Security5:36
-
2. Data Integrity, Confidentiality and Data Availability2:47
-
3. IT General Controls8:30
-
4. Segregation of IT Duties5:06
-
5. Question on Segregation of IT Duties1:48
-
6. Threats and Controls to Physical Security7:03
-
7. Question on Threats and Controls to Physical Security 11:34
-
8. Question on Threats and Controls to Physical Security 22:08
-
9. Identity Access Management2:35
-
10. Access and Authorization Controls - Risks7:01
-
11. Identity Access Management - Activities6:29
-
12. Authentication1:04
-
13. IT Departmentalization6:40
-
14. Question on IT Departmentalization 12:29
-
15. Question on IT Departmentalization 22:51
-
16. Types of Information Security Controls11:41
-
17. Encryption1:59
-
18. Firewalls4:35
-
19. Data Privacy and Protection6:58
-
20. Data Protection Framework12:24
-
21. Question on Data Protection Framework2:00
-
22. Smart Devices and Their Risks7:57
-
23. Question on Smart Devices and Their Risks3:32
-
24. Question on Question on Data Protection Framework5:00
-
25. Asset-Threat-Vulnerability Triangle8:05
-
26. Cybersecurity Risks2:17
-
27. Cybersecurity Threats33:40
-
28. Question on Cybersecurity Threats 10:25
-
29. Question on Cybersecurity Threats 20:59
-
30. Question on Cybersecurity Threats 31:01
-
31. Question on Cybersecurity Threats 40:34
-
32. IT Management and Governance Controls Against Cybersecurity Threats7:12
-
33. Application and Access Controls7:05
-
34. Technical IT Infrastructure Controls2:31
-
35. External Connections Controls3:54
-
36. Verifying 3rd Party Information Security6:54
-
37. Illicit Software Use7:49
-
38. Insider Threat9:09
-
39. Question on Insider Threat0:29
-
40. Question on Data Privacy and Protection2:06
-
41. Cybersecurity Governance and Policies5:51
-
42. Information Security Framework5:22
-
43. The Three Lines of Defense Model in Cybersecurity3:36
-
44. Question on Cybersecurity Governance and Policies2:28
Information Technology
-
1. The Layers Model of IT Management3:08
-
2. Systems Development Life Cycle (SDLC) Model5:35
-
3. Auditing the Systems Development Life Cycle (SDLC) Model4:31
-
4. Types of Systems Development Methods4:10
-
5. Waterfall Method0:19
-
6. Spiral Method0:44
-
7. Rapid Development1:27
-
8. Agile Method4:55
-
9. Question on Types of Systems Development Methods2:20
-
10. Application Testing Methods8:38
-
11. Question on Application Testing Methods1:38
-
12. Databases - Terminology4:04
-
13. Relational Databases2:38
-
14. Software and Application Controls5:25
-
15. Common Applications3:33
-
16. IT Reporting Structure6:21
-
17. IT Control Framework - COBIT1:35
-
18. IT Control Framework - COBIT Principles5:28
-
19. IT Infrastructure5:27
-
20. Business Continuity and Disaster Recovery Planning (BCP-DRP)5:50
-
21. Question on Business Continuity and Disaster Recovery Planning (BCP-DRP)0:21
-
22. Data Backup and Recovery Controls5:05
Financial And Management Accounting
-
1. Aspects of Finance and Accounting2:28
-
2. Qualities of Financial Information5:07
-
3. Dual-entry Accounting1:09
-
4. Exercise on Dual-entry Accounting1:27
-
5. Cash-basis and Accrual-basis Accounting3:15
-
6. Financial Statements1:30
-
7. Financial Statement Assertions2:18
-
8. Revenue Recognition - Point of Sale Recognition1:15
-
9. Revenue Recognition - Instalment Sales Method1:27
-
10. Revenue Recognition - Cost Recovery Method0:52
-
11. Revenue Recognition - Completed Contract Method1:31
-
12. Revenue Recognition - Percentage of Completion Method1:13
-
13. Strait Line Depreciation1:03
-
14. Activity Method Depreciation1:19
-
15. Accelerated Depreciation1:32
-
16. Sum-of-the-year's-digits Depreciation0:51
-
17. Lessee Lease Methods3:58
-
18. Lessor Lease Methods3:00
-
19. Types of Ratio Analyses3:08
-
20. Debt and Leverage Ratios3:38
-
21. Liquidity Ratios1:50
-
22. Question on Liquidity Ratios0:58
-
23. Net Working Capital0:44
-
24. Profitability Ratios2:17
-
25. Return on Assets0:45
-
26. Price to Earnings Ratio (PE Ratio)1:18
-
27. Book Value Per Common Share0:35
-
28. Investment Valuation Ratios1:07
-
29. Activity Ratios3:54
-
30. Capital Structure and Budgeting0:54
-
31. Present and Future Value1:12
-
32. Net Present Value (NPV) and Internal Rate of Return (IRR)1:48
-
33. Payback Period0:58
-
34. Accounting Rate of Return (IRR)0:38
-
35. Responsibility Accounting1:51
-
36. Cost Accounting Terminology1:23
-
37. Cost Accounting - Types of Costs2:32
-
38. Cost-Volume-Profit (CVP) Analysis2:21
-
39. Product Costing Systems2:03
-
40. Cost Allocation and Cost Accumulation Systems4:11
-
41. Activity Based Costing (ABC)2:26
-
42. Question on Cost Allocation and Cost Accumulation Systems1:39
About IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology Certification Video Training Course
IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's IIA-CIA-Part3: Certified Internal Auditor - Part 3, Business Analysis and Information Technology video training course for passing certification exams is the only solution which you need.
Pass IIA IIA-CIA-Part3 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!
IIA-CIA-Part3 Premium Bundle
- Premium File 621 Questions & Answers. Last update: Dec 16, 2024
- Training Course 170 Video Lectures
Free IIA-CIA-Part3 Exam Questions & IIA IIA-CIA-Part3 Dumps | ||
---|---|---|
Iia.train4sure.iia-cia-part3.v2024-11-10.by.ximena.236q.ete |
Views: 64
Downloads: 206
|
Size: 3.26 MB
|
Iia.testking.iia-cia-part3.v2021-05-15.by.leonardo.171q.ete |
Views: 242
Downloads: 1433
|
Size: 226.92 KB
|
Iia.pass4sure.iia-cia-part3.v2020-11-27.by.florence.186q.ete |
Views: 271
Downloads: 1553
|
Size: 239.08 KB
|
Iia.Passguide.Iia-cia-part3.v2020-02-02.by.kyrylo.128qs.ete |
Views: 1311
Downloads: 2052
|
Size: 166.33 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register