Home > Training, Events and Conferences > Training Overview > Curated IIA OnDemand Courses

Curated IIA OnDemand Courses

OnDemand

 

 

 

IIA Academy is continually refreshing our suite of courses to cater to your evolving learning needs. Even if you are unable to attend in-person training, you have the option of learning in the comfort of your home, with the below online courses, which are structured to be shorter in duration for optimal takeaway.

 

How to Register for OnDemand Courses:

1. Click on the respective course link to access the OnDemand platform

2. Sign in if you are IIA member to start (*Member pricing is only available upon successful login)

  • Non-member is also able to purchase the online course at original pricing.

 

List of OnDemand Courses

S/N

Category

Title

Duration

Objectives

1

Fraud

Assessing Fraud Risks

1.0

  • List steps and purpose of assurance engagement
  • Describe how to incorporate fraud risk assessment steps during an assurance engagement
  • Restate role of IA when assessing fraud risks and implementing controls
  • Categorise fraud risk controls as detective or preventive
  • Differentiate characteristics, significance, and sources of common fraud risks
  • Recognise requirements of IA to be in conformance with Standards related to fraud
  • Determine optimal communication method for reporting results of an engagement

2

Fundamentals

Code of Ethics Conformance

1.2

  • Identify purpose of Code of Ethics
  • Identify four principles of Code of Ethics
  • Identify rules that aid in interpreting each of the four principles
  • Identify how to apply principles and rules outlined in the Code of Ethics, through provided scenarios

3

Soft Skills

Ethical Scenarios for the Public Sector

1.5

  • Summarise purpose of Code of Ethics
  • Make situational decisions based on four principles of Code of Ethics
  • Describe rules of conduct that aid in interpreting each of the four principles
  • Differentiate principles and rules of conduct as outlined in Code of Ethics

4

GRC

Auditing Culture

3.0

  • Recognise essence and implications of culture
  • Perceive emerging mandate to audit culture
  • Differentiate effective strategies for auditing culture
  • Recognise practical considerations for IA

5

Soft Skills

Organisational Political Pressure

1.0

  • Define political pressure
  • Describe nature of political pressure as it relates to IA
  • Illustrate differences between a warranted discussion and political pressure based on political pressure continuum
  • Describe typical forms of political pressure
  • Assess extent of political pressure based on IIA Research
  • Explain key factors in minimising and avoiding political pressure
  • Describe leading practices implemented to deal with political pressure

6

Fundamentals

Understanding the IPPF

1.0

  • State Mission of IA
  • Recognise Core Principles
  • Demonstrate an understanding of Definition of Internal Auditing
  • State the differences between assurance and consulting services
  • Recall Code of Ethics, including its Principles and Rules of Conduct
  • State purpose and elements of Standards
  • Differentiate between Attribute, Performance and Implementation Standards
  • Define Implementation Guidance and Supplemental Guidance

7

Audit Management

Breaking Down the Standards for the CAE

1.5

  • Recognise contribution the Standards and Code of Ethics make
  • Assimilate purpose and elements of Standards
  • Describe Standards that specifically apply to CAEs
  • Discern Code of Ethics, including the Principles and Rules of Conduct
  • List criteria for assessing conformance with Standards and Code of Ethics
  • Evaluate importance of a QAIP
  • Quantify challenges to conforming with the Standards, and strategies for enhancing conformance

8

Technology

Understanding and Auditing Big Data

1.5

  • Recognise characteristics of big data
  • Describe business benefits of big data
  • Discuss elements of a big data programme
  • Define tools and technologies of a big data programme
  • Summarise IA's role in big data
  • Recognise engagement planning steps to perform an audit of big data
  • Explain key risks related to big data
  • State controls that should be tested when performing a big data audit engagement

9

Technology

Audit Recovery Process

1.0

  • Identify key business recovery concepts including BCM and disaster recovery
  • Identify phases in developing a BCP
  • Identify four solutions that lead to business recovery
  • Identify backup processing concepts
  • Identify consulting and assessment activities as they relate to IT audit

10

Fundamentals

The Consulting Engagement

2.0

  • Identify the differences between assurance and consulting engagements.
  • Identify the process used during engagements to blend both assurance and consulting components.
  • Identify the various types of consulting services provided by internal auditors.
  • Identify the process that internal audit functions use when selecting which requested consulting engagements to perform.
  • Identify the process for conducting an advisory consulting engagement.
  • Identify the benefits to an organization when the internal audit function provides consulting services.
  • Identify the ways that the internal audit function can provide insight to stakeholders through the performance of consulting engagements.
  • Identify the reasons for determining customer expectations for consulting activities.
  • Identify the Standards as they pertain to consulting engagements.
  • Identify the reasons that the internal audit function sets boundaries for consulting activities.
11 Technology Auditing Insider Threats 1.2
  • Recognize the characteristics and warning signs related to insider threats.
  • Describe common risks related to insider threat.
  • Describe common controls to protect against insider threats.
  • Identify the necessary components of an insider threat program.
  • Recognize the key activities to include in an insider threat audit.
  • Restate how to provide assurance of an insider threat program to the board.
12 Fundamentals 1.2
  • Identify the purpose of the Code of Ethics.
  • Identify the four principles of the Code of Ethics.
  • Identify the rules that aid in interpreting each of the four principles.
  • Identify how to apply the principles and rules outlined in the Code of Ethics, through provided scenarios.
13 Soft Skills Ethical Scenarios for Technology 1.0
  • Identify the purpose of the Code of Ethics and how it applies from the technology and data perspective.
  • Make situational decisions based on the four principles of the Code of Ethics as they relate to technology and data.
  • Describe the rules of conduct that aid in interpreting each of the Code of Ethics’ four principles as they relate to technology and data.
  • Differentiate how to apply the principles and the rules of conduct as outlined in the Code of Ethics in technology and data-related situations.
14 Soft Skills Ethical Scenarios for Financial Services 1.2
  • Understand the purpose of the Code of Ethics and how it is applied in the financial services environment.
  • Make situational decisions based on the four principles of the Code of Ethics.
  • Describe the rules of conduct that aid in interpreting the four principles of the Code of Ethics.
  • Differentiate how to apply the four principles and the rules of conduct in non-standard situations.
15 Soft Skills Ethical Behaviour 1.6
  • Describe the importance of a code of ethics for internal auditors.
  • Identify the principles of the IIA Code of Ethics.
  • Summarize the rules of conduct of the IIA Code of Ethics.
  • Express how to demonstrate individual conformance with the IIA Code of Ethics.
16 Governance, Risk & Control Auditing IT Governance 1.8
  • Identify the importance of IT governance.
  • Identify the relationship between organizational governance and IT governance.
  • Identify the five areas of a sample IT governance framework.
  • Identify the desired outcomes and challenges of implementing an IT governance framework.
  • Identify internal audit’s role in IT governance.
  • Identify the components of IT governance.
  • Identify the key risks and risk assessment considerations associated with IT governance.
  • Identify the engagement planning steps for IT governance.
  • Identify controls that should be tested when performing an engagement.
17 Technology Physical and Environmental Controls 1.0
  • Describe the basics of physical security.
  • Describe the basics of environmental security.
  • Recall common physical and environmental risks and controls.
  • Identify the general concepts related to auditing physical and environmental security.
18 Technology Logical Security: The Network Layer 1.4
  • Distinguish characteristics of privileged access.
  • Identify common network concepts and terminology. 
    • Describe basic network architecture.
19 Technology Exploring Corrective Controls 1.2
  • Recognize operational resilience and business resiliency as the primary building blocks needed to successfully recover from an event.
  • Distinguish key business recovery concepts, including business impact analysis, business continuity, disaster recovery, and incident response.
  • Describe the phases in developing business continuity plans (BCPs), disaster recovery plans (DRPs), incident response plans (IRPs), and incident response playbooks.
  • Discuss backup processing concepts.
  • Explore consulting and assessment activities as they relate to internal audit.
20 Technology IT Essentials - Assessing Networks and Infrastructure 2.0
  • Recognize key infrastructure and network components.
  • Determine the appropriateness of devices in the demilitarized zone (DMZ).  
  • Describe the required competencies of internal auditors performing infrastructure and networking audits.
  • Identify common infrastructure and network terminology.
  •  Describe the seven layers of the Open Systems Interconnection (OSI) model and the layers of defense in depth.
21 Technology Understanding the SDLC 1.2
  •  Explain the purpose of the system development life cycle.
  • Identify key organizational roles in system development projects.  
  • Describe the phases within a system development life cycle..
  • Recognize reasons why system development projects fail.
  • Review project failures and reasons for successful outcomes of system development life cycle projects.
  • Recognize the general concepts related to assessing a system development life cycle.
22 Fundamentals Mission of Internal Audit and the Internal Audit Charter 1.0
  • State the Mission of Internal Audit.
  • Recognize the Core Principles.
  • Demonstrate an understanding of the Definition of Internal Auditing.
  • State the differences between assurance and consulting services.
  • Recall the Code of Ethics, including its Principles and Rules of Conduct.
  • State the purpose and elements of the Standards.
  • Differentiate between Attribute, Performance, and Implementation Standards.
  • Define Implementation Guidance and Supplemental Guidance.
23 Fundamentals Auditing Market Risk 1.8
  • Express the importance of market risk in a financial services context.
  • Describe the regulatory environment and requirements related to market risk.
  • Recognize the risk governance and risk management process surrounding market risk.
  • Summarize the key components of market risk, including equity price risk, interest rate risk, and foreign exchange risk.
  • Apply the International Professional Practices Framework (IPPF) and risk-based internal audit techniques to assess market risk and audit its underlying processes. 
24 Fundamentals The Role of Internal Audit In Insurance Organizations 1.0
  • Describe the insurance industry.
  • Identify insurance product lines.
  • Recognize unique risks faced by insurance organization.
  • Describe an effective audit plan for key risks and controls in insurance organizations. 
  • Identify subject matter expertise and specialty skills relevant to the insurance industry. 
25 Fundamentals Auditing IT Change Management 1.6
  • Define IT change management.
  • Identify types and sources of change.
  • Summarize roles and responsibilities related to IT change management.
  • Describe the change management process. 
  • Describe the role of patches in the IT change management process.
  • Describe preventative, detective, and corrective controls necessary for effective IT change management.
  • Describe best practices for providing assurance over effective change management.
26 Technology Auditing Project Management Practices 1.0
  • Discuss the fundamentals of portfolio, Program, and Project Management.
  • Review the core principles of project management.
  • Explore the controls and risks associated to project management.
  • Recognize the audit roles in a project.
  • Describe the basics of auditing projects.
27 Technology Computer Operations 1.4
  • Identify the general concepts related to auditing computer operations controls.
  • Describe the main components of services management.
  • Discuss the value of deploying a unified service management platform.
  • Describe the value of asset and configuration management.
  • Summarize the relationship between service management and computer operations management in the auditing process.
28 Fundamentals Introduction to Agile Auditing 1.4
  • Recall the characteristics of agile internal auditing.
  • Compare and contrast agile internal auditing (Agile IA) methodologies to traditional internal auditing methodologies.
  • Describe the compatibility of agile internal auditing with the International Standards for the Professional Practice of Internal Auditing (Standards).
  • Identify Agile software development methodologies.

 

 

For OnDemand Technical Assistance:

Please contact IIA OnDemand if you are having technical issues.

Email: ondemand@theiia.org