Tags
Language
Tags
February 2025
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 1
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Forensic Accounting, Fraud Investigation And Fraud Analytics

Posted By: ELK1nG
Forensic Accounting, Fraud Investigation And Fraud Analytics

Forensic Accounting, Fraud Investigation And Fraud Analytics
Last updated 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.90 GB | Duration: 15h 3m

The course helps to understand fraud examination, forensic audit,financial crime, data analytics

What you'll learn

Financial Crimes,Forensic accounting

Bank Frauds,Digital Banking Frauds

Forensic audit,Digital Forensics

Fraud Prevention,Fraud analytics,Data Analytics

Requirements

Basic Interest to Learn a new topic

Description

This course contains 100+practice Questions and case studiesThis comprehensive course is very helpful to budding professionals and students who have developed a deep passion towards forensic accounting and audit This course is explained with the help of illustrations and case studies.Forensic accounting is the investigation of fraud or financial manipulation by performing extremely detailed research and analysis of financial information. Forensic accountants are often hired to prepare for litigation related to insurance claims, insolvency, divorces, embezzlement, fraud, skimming, and any type of financial theft.A forensic audit is an analysis and review of the financial records of a company or person to extract facts, which can be used in a court of law. Forensic auditing is a speciality in the accounting industry, and most major accounting firms have a department forensic auditing. Forensic audits include the experience in accounting and auditing practices as well as expert knowledge of forensic audit's legal framework.Forensic audits cover a large spectrum of investigative activities. There may be a forensic audit to prosecute a party for fraud, embezzlement or other financial crimes. The auditor may be called in during the process of a forensic audit to serve as an expert witness during trial proceedings. Forensic audits could also include situations that do not involve financial fraud, such as bankruptcy filing disputes, closures of businesses, and divorces.The following are the contents of the course :1. fraud theories2. red flag, yellow flag and green flag3. types of frauds4. types of interviews5. types of questions6. digital forensics7. forensic techniques8. stastical techniques9. applicable laws around the world10. case studies11. Bank Frauds12.Government Frauds13. Financial Statement FraudsPlease read the contents of the course before purchasing

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Forensic Accounting

Lecture 3 Fraud

Lecture 4 Fraud triangle theory

Lecture 5 Pressure and attitude

Lecture 6 Opportunities

Lecture 7 Fraud diamond theory

Lecture 8 Fraud pentagon theory

Lecture 9 Fraud scale

Lecture 10 Hollinger and clark theory

Lecture 11 Summary

Lecture 12 Fraud Triangle Case Study

Section 2: Types of fraud

Lecture 13 types of fraud

Lecture 14 Bank fraud

Lecture 15 corporate fraud

Lecture 16 fraud tree

Lecture 17 Classification of occupational fraud

Lecture 18 Payroll fraud

Lecture 19 Procurement Fraud

Lecture 20 Platform fraud

Lecture 21 Payment Frauds

Lecture 22 Asset Stripping,Phoenixing

Lecture 23 Money Laundering and corporate espionage

Lecture 24 Asset Misappropriation

Lecture 25 Corruption

Lecture 26 Startup Frauds

Lecture 27 other frauds

Lecture 28 Whistleblowing

Section 3: Scope of forensic accounting

Lecture 29 Basics

Lecture 30 Services rendered

Section 4: Red flag,yellow flag and green flag

Lecture 31 Red flag-Intro

Lecture 32 types of red flag

Lecture 33 Yellow flag and green flag

Lecture 34 Summary

Section 5: Interview Skills

Lecture 35 1.Intro

Lecture 36 Interview process

Lecture 37 Interview process-2

Section 6: Types of Questions

Lecture 38 types of questions

Lecture 39 Summary

Section 7: Forensic audit techniques

Lecture 40 Forensic audit techniques

Lecture 41 Investigative tools

Lecture 42 trend & ratio analysis

Lecture 43 Juxtaposition test

Lecture 44 Test of absurdity

Lecture 45 Test of impossibility

Lecture 46 Case Study

Section 8: Other Techniques

Lecture 47 RSF-relative size factor

Lecture 48 Benford law

Lecture 49 Benford Law-2

Lecture 50 Benford law with example

Lecture 51 Beneish Model

Lecture 52 Benford Law vs Beneish Model

Lecture 53 Luhn Algorithm

Lecture 54 Fuzzy Matching

Lecture 55 data mining techniques

Lecture 56 MCQ

Section 9: Digital Techniques

Lecture 57 Digital forensic techniques

Lecture 58 Digital forensic tools- Encase and MD5

Lecture 59 Digital forensic tools-UFED, Oxygen and NUIX

Lecture 60 Steganography

Lecture 61 CAAT

Lecture 62 GAS

Lecture 63 CST

Lecture 64 others

Lecture 65 ACL-Audit Command Language

Section 10: Digital forensics

Lecture 66 Digital forensics

Lecture 67 Network forensics

Lecture 68 Email Forensics and USB forensics

Lecture 69 Cloud forensics & Hard disk Forensics

Lecture 70 Disk Imaging

Lecture 71 Hashing

Section 11: Cyber crime

Lecture 72 Introduction to Cyber crime

Lecture 73 Types of Cyber crime

Lecture 74 Data Diddling

Lecture 75 Data Extraction tools-1

Lecture 76 Data extraction tools-2

Lecture 77 Data Extraction tools-MCQ

Section 12: Accounting Scam

Lecture 78 Accounting Scam-1

Lecture 79 Accounting Scam-2

Lecture 80 Accounting Scam-3

Lecture 81 Accounting scam-4

Lecture 82 Accounting Scam-5

Section 13: Financial Statement Frauds

Lecture 83 1.Introduction

Lecture 84 2.Basics

Lecture 85 3.Common Techniques

Lecture 86 4.Revenue Timing

Lecture 87 5.Fictitious recognition of revenue

Lecture 88 6.Accounting Policies and customer contract

Lecture 89 7.Improper deferment of earned revenue

Lecture 90 8.Timing Difference

Lecture 91 9.Overstatement of Asset and understatement of Liabilities

Lecture 92 10.Improper Disclosures

Lecture 93 11.Inflating Inventory Value

Lecture 94 12.Misappropriation,false sales of inventory

Lecture 95 13.Investment Schemes

Lecture 96 14.Accounts receivables

Lecture 97 15.Start up Costs

Section 14: Bonus lectures-bank frauds

Lecture 98 Introduction

Lecture 99 Change in shareholding

Lecture 100 Change in current asset

Lecture 101 Letter of credit introduction

Lecture 102 LC-2

Lecture 103 LC-3

Lecture 104 Sister concern

Lecture 105 Cost and time overrun

Lecture 106 Fixed Asset

Lecture 107 Collateral Security

Lecture 108 Additional Facility

Lecture 109 Bank Frauds by insiders

Section 15: Other Bank Frauds

Lecture 110 1.Concealment of Vital Documents

Lecture 111 2.Over valuation or under valuation of inventory

Lecture 112 3.Delay in payment of outstanding dues

Lecture 113 4.Contingent Liability

Lecture 114 5.Poor Disclosure

Lecture 115 6.High Value Payment

Lecture 116 7.Bouncing of High value cheques

Lecture 117 8.Frequent request for General purpose loans

Lecture 118 9.Heavy cash withdrawal in loan account

Lecture 119 10.Increase In unbilled revenue

Lecture 120 11.Frequent changes in management

Lecture 121 12.Related Party transactions

Lecture 122 13.Large transaction with interconnected companies

Lecture 123 14.Increase In borrowing despite huge cash

Lecture 124 15.request to postpone the inspection

Section 16: Bank Frauds-Case studies

Lecture 125 Bank Frauds case study_1

Lecture 126 Bank Frauds Case study_2

Lecture 127 Bank Frauds Case study _3

Lecture 128 Bank Frauds_Case study_4

Lecture 129 Bank Frauds_Case study_5

Section 17: Bonus Lectures -Digital Banking Frauds

Lecture 130 Phishing,Vishing

Lecture 131 Juice Jacking, Sim cloning , Skimming

Lecture 132 Lottery Fraud , Online Job Fraud, Fake Advertisement

Lecture 133 MLM Schemes, Fraudulent Loans

Lecture 134 Case Study_Phishing

Section 18: Applicable laws and regulations around the world

Lecture 135 Applicable laws

Lecture 136 useful website

Lecture 137 OECD guidelines

Lecture 138 UNCAC

Lecture 139 Integrity Pact

Section 19: Case studies

Lecture 140 Case study-1

Lecture 141 Case study-2

Lecture 142 Case study-3

Lecture 143 Case study-3

Lecture 144 case study-4

Lecture 145 case study-5

Lecture 146 Case study-6

Section 20: Sector Specific case studies

Lecture 147 1.Agro Sector fraud

Lecture 148 2.Export Sector fraud-1

Lecture 149 Export Sector Fraud-2

Lecture 150 3.Media Fraud

Lecture 151 4.IT Sector Fraud

Lecture 152 5.Gems & Jewellery Fraud-1

Lecture 153 Gems & Jewellery Fraud-2

Lecture 154 Gems & Jewellery Fraud-3

Lecture 155 6.Stock market scam-1

Lecture 156 Stock market scam-2

Lecture 157 Stock market scam-3

Lecture 158 Manufacturing scam

Section 21: Government Fraud case studies

Lecture 159 1.Government Frauds_1

Lecture 160 2.Government Frauds-2

Lecture 161 3.Government Frauds-3

Lecture 162 4.Government Frauds-4

Lecture 163 5.Government Frauds-5

Lecture 164 6.Government Frauds-6

Section 22: Practical Question and Answers

Lecture 165 Practical Q & A_1

Lecture 166 Practical Q & A-2

Lecture 167 Practical Q & A-3

Lecture 168 Practical Q & A-4

Lecture 169 Practical Q & A-5

Lecture 170 Practical Q & A-6

Lecture 171 Practical Q & A-7

Lecture 172 Practical Q & A-8

Lecture 173 Practical Q & A-9

Lecture 174 Practical Q& A-10

Lecture 175 Practical Q & A-11

Lecture 176 Practical Q & A-12

Lecture 177 Practical Q & A-13

Lecture 178 Practical Q & A-14

Lecture 179 Practical Q & A-15

Lecture 180 Practical Q & A-16

Lecture 181 Practical Q & A-17

Lecture 182 Practical Q & A-18

Lecture 183 Practical Q & A-19

Lecture 184 Practical Q &A-20

Lecture 185 Practical Q & A-21

Lecture 186 Practical Q & A-22

Lecture 187 Practical Q & A-23

Section 23: Bonus Lectures-Due Diligence

Lecture 188 Introduction

Lecture 189 Objective

Lecture 190 Scope

Lecture 191 Type

Lecture 192 Stages

All students and professionals