Forensic Accounting, Fraud Investigation And Fraud Analytics
Last updated 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.90 GB | Duration: 15h 3m
Last updated 2/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.90 GB | Duration: 15h 3m
The course helps to understand fraud examination, forensic audit,financial crime, data analytics
What you'll learn
Financial Crimes,Forensic accounting
Bank Frauds,Digital Banking Frauds
Forensic audit,Digital Forensics
Fraud Prevention,Fraud analytics,Data Analytics
Requirements
Basic Interest to Learn a new topic
Description
This course contains 100+practice Questions and case studiesThis comprehensive course is very helpful to budding professionals and students who have developed a deep passion towards forensic accounting and audit This course is explained with the help of illustrations and case studies.Forensic accounting is the investigation of fraud or financial manipulation by performing extremely detailed research and analysis of financial information. Forensic accountants are often hired to prepare for litigation related to insurance claims, insolvency, divorces, embezzlement, fraud, skimming, and any type of financial theft.A forensic audit is an analysis and review of the financial records of a company or person to extract facts, which can be used in a court of law. Forensic auditing is a speciality in the accounting industry, and most major accounting firms have a department forensic auditing. Forensic audits include the experience in accounting and auditing practices as well as expert knowledge of forensic audit's legal framework.Forensic audits cover a large spectrum of investigative activities. There may be a forensic audit to prosecute a party for fraud, embezzlement or other financial crimes. The auditor may be called in during the process of a forensic audit to serve as an expert witness during trial proceedings. Forensic audits could also include situations that do not involve financial fraud, such as bankruptcy filing disputes, closures of businesses, and divorces.The following are the contents of the course :1. fraud theories2. red flag, yellow flag and green flag3. types of frauds4. types of interviews5. types of questions6. digital forensics7. forensic techniques8. stastical techniques9. applicable laws around the world10. case studies11. Bank Frauds12.Government Frauds13. Financial Statement FraudsPlease read the contents of the course before purchasing
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Forensic Accounting
Lecture 3 Fraud
Lecture 4 Fraud triangle theory
Lecture 5 Pressure and attitude
Lecture 6 Opportunities
Lecture 7 Fraud diamond theory
Lecture 8 Fraud pentagon theory
Lecture 9 Fraud scale
Lecture 10 Hollinger and clark theory
Lecture 11 Summary
Lecture 12 Fraud Triangle Case Study
Section 2: Types of fraud
Lecture 13 types of fraud
Lecture 14 Bank fraud
Lecture 15 corporate fraud
Lecture 16 fraud tree
Lecture 17 Classification of occupational fraud
Lecture 18 Payroll fraud
Lecture 19 Procurement Fraud
Lecture 20 Platform fraud
Lecture 21 Payment Frauds
Lecture 22 Asset Stripping,Phoenixing
Lecture 23 Money Laundering and corporate espionage
Lecture 24 Asset Misappropriation
Lecture 25 Corruption
Lecture 26 Startup Frauds
Lecture 27 other frauds
Lecture 28 Whistleblowing
Section 3: Scope of forensic accounting
Lecture 29 Basics
Lecture 30 Services rendered
Section 4: Red flag,yellow flag and green flag
Lecture 31 Red flag-Intro
Lecture 32 types of red flag
Lecture 33 Yellow flag and green flag
Lecture 34 Summary
Section 5: Interview Skills
Lecture 35 1.Intro
Lecture 36 Interview process
Lecture 37 Interview process-2
Section 6: Types of Questions
Lecture 38 types of questions
Lecture 39 Summary
Section 7: Forensic audit techniques
Lecture 40 Forensic audit techniques
Lecture 41 Investigative tools
Lecture 42 trend & ratio analysis
Lecture 43 Juxtaposition test
Lecture 44 Test of absurdity
Lecture 45 Test of impossibility
Lecture 46 Case Study
Section 8: Other Techniques
Lecture 47 RSF-relative size factor
Lecture 48 Benford law
Lecture 49 Benford Law-2
Lecture 50 Benford law with example
Lecture 51 Beneish Model
Lecture 52 Benford Law vs Beneish Model
Lecture 53 Luhn Algorithm
Lecture 54 Fuzzy Matching
Lecture 55 data mining techniques
Lecture 56 MCQ
Section 9: Digital Techniques
Lecture 57 Digital forensic techniques
Lecture 58 Digital forensic tools- Encase and MD5
Lecture 59 Digital forensic tools-UFED, Oxygen and NUIX
Lecture 60 Steganography
Lecture 61 CAAT
Lecture 62 GAS
Lecture 63 CST
Lecture 64 others
Lecture 65 ACL-Audit Command Language
Section 10: Digital forensics
Lecture 66 Digital forensics
Lecture 67 Network forensics
Lecture 68 Email Forensics and USB forensics
Lecture 69 Cloud forensics & Hard disk Forensics
Lecture 70 Disk Imaging
Lecture 71 Hashing
Section 11: Cyber crime
Lecture 72 Introduction to Cyber crime
Lecture 73 Types of Cyber crime
Lecture 74 Data Diddling
Lecture 75 Data Extraction tools-1
Lecture 76 Data extraction tools-2
Lecture 77 Data Extraction tools-MCQ
Section 12: Accounting Scam
Lecture 78 Accounting Scam-1
Lecture 79 Accounting Scam-2
Lecture 80 Accounting Scam-3
Lecture 81 Accounting scam-4
Lecture 82 Accounting Scam-5
Section 13: Financial Statement Frauds
Lecture 83 1.Introduction
Lecture 84 2.Basics
Lecture 85 3.Common Techniques
Lecture 86 4.Revenue Timing
Lecture 87 5.Fictitious recognition of revenue
Lecture 88 6.Accounting Policies and customer contract
Lecture 89 7.Improper deferment of earned revenue
Lecture 90 8.Timing Difference
Lecture 91 9.Overstatement of Asset and understatement of Liabilities
Lecture 92 10.Improper Disclosures
Lecture 93 11.Inflating Inventory Value
Lecture 94 12.Misappropriation,false sales of inventory
Lecture 95 13.Investment Schemes
Lecture 96 14.Accounts receivables
Lecture 97 15.Start up Costs
Section 14: Bonus lectures-bank frauds
Lecture 98 Introduction
Lecture 99 Change in shareholding
Lecture 100 Change in current asset
Lecture 101 Letter of credit introduction
Lecture 102 LC-2
Lecture 103 LC-3
Lecture 104 Sister concern
Lecture 105 Cost and time overrun
Lecture 106 Fixed Asset
Lecture 107 Collateral Security
Lecture 108 Additional Facility
Lecture 109 Bank Frauds by insiders
Section 15: Other Bank Frauds
Lecture 110 1.Concealment of Vital Documents
Lecture 111 2.Over valuation or under valuation of inventory
Lecture 112 3.Delay in payment of outstanding dues
Lecture 113 4.Contingent Liability
Lecture 114 5.Poor Disclosure
Lecture 115 6.High Value Payment
Lecture 116 7.Bouncing of High value cheques
Lecture 117 8.Frequent request for General purpose loans
Lecture 118 9.Heavy cash withdrawal in loan account
Lecture 119 10.Increase In unbilled revenue
Lecture 120 11.Frequent changes in management
Lecture 121 12.Related Party transactions
Lecture 122 13.Large transaction with interconnected companies
Lecture 123 14.Increase In borrowing despite huge cash
Lecture 124 15.request to postpone the inspection
Section 16: Bank Frauds-Case studies
Lecture 125 Bank Frauds case study_1
Lecture 126 Bank Frauds Case study_2
Lecture 127 Bank Frauds Case study _3
Lecture 128 Bank Frauds_Case study_4
Lecture 129 Bank Frauds_Case study_5
Section 17: Bonus Lectures -Digital Banking Frauds
Lecture 130 Phishing,Vishing
Lecture 131 Juice Jacking, Sim cloning , Skimming
Lecture 132 Lottery Fraud , Online Job Fraud, Fake Advertisement
Lecture 133 MLM Schemes, Fraudulent Loans
Lecture 134 Case Study_Phishing
Section 18: Applicable laws and regulations around the world
Lecture 135 Applicable laws
Lecture 136 useful website
Lecture 137 OECD guidelines
Lecture 138 UNCAC
Lecture 139 Integrity Pact
Section 19: Case studies
Lecture 140 Case study-1
Lecture 141 Case study-2
Lecture 142 Case study-3
Lecture 143 Case study-3
Lecture 144 case study-4
Lecture 145 case study-5
Lecture 146 Case study-6
Section 20: Sector Specific case studies
Lecture 147 1.Agro Sector fraud
Lecture 148 2.Export Sector fraud-1
Lecture 149 Export Sector Fraud-2
Lecture 150 3.Media Fraud
Lecture 151 4.IT Sector Fraud
Lecture 152 5.Gems & Jewellery Fraud-1
Lecture 153 Gems & Jewellery Fraud-2
Lecture 154 Gems & Jewellery Fraud-3
Lecture 155 6.Stock market scam-1
Lecture 156 Stock market scam-2
Lecture 157 Stock market scam-3
Lecture 158 Manufacturing scam
Section 21: Government Fraud case studies
Lecture 159 1.Government Frauds_1
Lecture 160 2.Government Frauds-2
Lecture 161 3.Government Frauds-3
Lecture 162 4.Government Frauds-4
Lecture 163 5.Government Frauds-5
Lecture 164 6.Government Frauds-6
Section 22: Practical Question and Answers
Lecture 165 Practical Q & A_1
Lecture 166 Practical Q & A-2
Lecture 167 Practical Q & A-3
Lecture 168 Practical Q & A-4
Lecture 169 Practical Q & A-5
Lecture 170 Practical Q & A-6
Lecture 171 Practical Q & A-7
Lecture 172 Practical Q & A-8
Lecture 173 Practical Q & A-9
Lecture 174 Practical Q& A-10
Lecture 175 Practical Q & A-11
Lecture 176 Practical Q & A-12
Lecture 177 Practical Q & A-13
Lecture 178 Practical Q & A-14
Lecture 179 Practical Q & A-15
Lecture 180 Practical Q & A-16
Lecture 181 Practical Q & A-17
Lecture 182 Practical Q & A-18
Lecture 183 Practical Q & A-19
Lecture 184 Practical Q &A-20
Lecture 185 Practical Q & A-21
Lecture 186 Practical Q & A-22
Lecture 187 Practical Q & A-23
Section 23: Bonus Lectures-Due Diligence
Lecture 188 Introduction
Lecture 189 Objective
Lecture 190 Scope
Lecture 191 Type
Lecture 192 Stages
All students and professionals