Home > Training and Conferences > Training Overview > Curated IIA OnDemand Courses

Curated IIA OnDemand Courses





IIA Academy is continually refreshing our suite of courses to cater to your evolving learning needs. Even if you are unable to attend in-person training, you have the option of learning in the comfort of your home, with the below online courses, which are structured to be shorter in duration for optimal takeaway.


How to Register for OnDemand Courses:

1. Click on the respective course link to access the OnDemand platform

2. Sign in if you are IIA member to start (*Member pricing is only available upon successful login)

  • Non-member is also able to purchase the online course at original pricing.


List of OnDemand Courses








Assessing Fraud Risks


  • List steps and purpose of assurance engagement
  • Describe how to incorporate fraud risk assessment steps during an assurance engagement
  • Restate role of IA when assessing fraud risks and implementing controls
  • Categorise fraud risk controls as detective or preventive
  • Differentiate characteristics, significance, and sources of common fraud risks
  • Recognise requirements of IA to be in conformance with Standards related to fraud
  • Determine optimal communication method for reporting results of an engagement



Ethics for Internal Auditors


  • Describe Code of Ethics
  • Define Principles and Rules of Conduct to apply The IIA Code of Ethics
  • Define Seven Attributes of Ethical Internal Auditors
  • Recognise how blind spots expose internal auditors to ethical lapses
  • Apply Code of Ethics to ethical decisions



Code of Ethics Conformance


  • Identify purpose of Code of Ethics
  • Identify four principles of Code of Ethics
  • Identify rules that aid in interpreting each of the four principles
  • Identify how to apply principles and rules outlined in the Code of Ethics, through provided scenarios


Soft Skills

Ethical Scenarios for the Public Sector


  • Summarise purpose of Code of Ethics
  • Make situational decisions based on four principles of Code of Ethics
  • Describe rules of conduct that aid in interpreting each of the four principles
  • Differentiate principles and rules of conduct as outlined in Code of Ethics



Auditing Culture


  • Recognise essence and implications of culture
  • Perceive emerging mandate to audit culture
  • Differentiate effective strategies for auditing culture
  • Recognise practical considerations for IA


Soft Skills

Organisational Political Pressure


  • Define political pressure
  • Describe nature of political pressure as it relates to IA
  • Illustrate differences between a warranted discussion and political pressure based on political pressure continuum
  • Describe typical forms of political pressure
  • Assess extent of political pressure based on IIA Research
  • Explain key factors in minimising and avoiding political pressure
  • Describe leading practices implemented to deal with political pressure



Understanding the IPPF


  • State Mission of IA
  • Recognise Core Principles
  • Demonstrate an understanding of Definition of Internal Auditing
  • State the differences between assurance and consulting services
  • Recall Code of Ethics, including its Principles and Rules of Conduct
  • State purpose and elements of Standards
  • Differentiate between Attribute, Performance and Implementation Standards
  • Define Implementation Guidance and Supplemental Guidance


Audit Management

Breaking Down the Standards for the CAE


  • Recognise contribution the Standards and Code of Ethics make
  • Assimilate purpose and elements of Standards
  • Describe Standards that specifically apply to CAEs
  • Discern Code of Ethics, including the Principles and Rules of Conduct
  • List criteria for assessing conformance with Standards and Code of Ethics
  • Evaluate importance of a QAIP
  • Quantify challenges to conforming with the Standards, and strategies for enhancing conformance



Auditing Third Party Risk


  • Recognise elements and attributes of third-party risk management
  • Recognise risks and controls associated with contracting third parties
  • Recognise areas where IA can monitor third parties
  • Differentiate types of third-party risk management governance structures
  • Differentiate key elements of Type 1 and Type 2 assurance reports for operation of critical third-party organisations
  • Differentiate evaluation criteria for engagements of third parties
  • Understand third-party due diligence policies and procedures
  • Understand testing phase and need to determine essential criteria element(s) for evaluating organisation's third-party risk management framework and process



Understanding and Auditing Big Data


  • Recognise characteristics of big data
  • Describe business benefits of big data
  • Discuss elements of a big data programme
  • Define tools and technologies of a big data programme
  • Summarise IA's role in big data
  • Recognise engagement planning steps to perform an audit of big data
  • Explain key risks related to big data
  • State controls that should be tested when performing a big data audit engagement



Audit Recovery Process


  • Identify key business recovery concepts including BCM and disaster recovery
  • Identify phases in developing a BCP
  • Identify four solutions that lead to business recovery
  • Identify backup processing concepts
  • Identify consulting and assessment activities as they relate to IT audit



The Consulting Engagement


  • Identify differences between assurance and consulting engagements
  • Identify process used during engagements to blend both assurance and consulting components
  • Identify various types of consulting services provided by internal auditors
  • Identify process that IA functions use when selecting which requested consulting engagements to perform
  • Identify process for conducting an advisory consulting engagement
  • Identify benefits to an organisation when IA function provides consulting services
  • Identify ways that IA function can provide insight to stakeholders through performance of consulting engagements
  • Identify reasons for determining customer expectations for consulting activities
  • Identify Standards as they pertain to consulting engagements
  • Identify reasons that IA function sets boundaries for consulting activities
13 Technology Auditing Insider Threats 1.2
  • Recognize the characteristics and warning signs related to insider threats.
  • Describe common risks related to insider threat.
  • Describe common controls to protect against insider threats.
  • Identify the necessary components of an insider threat program.
  • Recognize the key activities to include in an insider threat audit.
  • Restate how to provide assurance of an insider threat program to the board.
14 Fundamentals 1.2
  • Identify the purpose of the Code of Ethics.
  • Identify the four principles of the Code of Ethics.
  • Identify the rules that aid in interpreting each of the four principles.
  • Identify how to apply the principles and rules outlined in the Code of Ethics, through provided scenarios.


For OnDemand Technical Assistance:

Please contact IIA OnDemand if you are having technical issues.

Email: ondemand@theiia.org