Online Courses
RIMS Online Courses conveniently bridge the distance gap in era of widespread digital communication. Courses incorporate various mediums, case studies, demos, practical exercises and articles. They make education accessible and allow you to manage your learning experience with your schedule.
The online courses incorporate various elements such as audio, animations, and simulations, as well as PDFs, exercises and assessments.
The material is presented in manageable segments called modules. Unlike the traditional classroom, online learning allows for self-directed learning; in other words, you can choose to go through the course from the beginning to the end (linear) or you can take the course by completing only those modules that are of the most interests to you (non-linear). The online courses range between 10-30 hours in duration. All courses are available for six months after purchase.
Courses Offered by RIMS
Courses Offered in Partnership with IIA


Assessing Cybersecurity Risks: The Three Lines Model
With the frequency and severity of cyberattacks on the rise, there is a significant need for improved cybersecurity risk management. Cybersecurity concerns have a tremendous impact on overall organizational strategy and must be considered holistically and systemically.
Learn More
Assessing Fraud Risk
As fraud risks and fraudulent activities continue to play a role in an organization’s overall financial and reputational stability, the recognition of current trends in fraudulent acts will grant internal auditors the advantage of fostering detective and preventive measures to safeguard the integrity of a business, its shareholders, products, services, and workforce.

Auditing IT Change Management

Auditing Market Risk

Auditing Model Risk Management

Auditing the Cybersecurity Program Certificate

Auditing Third-Party Risks
Using third parties invariably presents a variety of risks for organizations, including strategic, reputational, regulatory, operational, financial, transactional, security, compliance, and other risks. However, when utilized effectively, third parties can also provide tremendous value.
Auditing Third-Party Risk - IT
As organizations further their reliance on third party service providers, regulatory bodies around the world have increased their level of scrutiny regarding third party provider’s abilities to properly protect sensitive and internally used data and information assets. Today’s organizations are expected to demonstrate strong, third-party governance and risk management.
ChatGPT & Internal Audit: Governance of the Utilization of Generative AI

Ethics Essentials Bundle
The IIA’s Code of Ethics includes two essential components: The Principles and the Rules of Conduct. The principles — which internal auditors are expected to apply and uphold — are relevant to the profession and practice of internal auditing. The rules of conduct describe behavior expected of internal auditors.Learn More

Exploring Corrective Controls
In a perfect world, processes, systems, and infrastructure never fail; however, a host of natural and human actions cause disruption to critical business processes. Maintaining a solid operational resiliency program aides organizations in combating disruptions.Learn More

Governance of Enterprise IT
The governance of enterprise IT plays a critical role in the effectiveness of IT operations. Without strong governance, IT management may not have the necessary direction to achieve their stated objective. It is important for organizations to take a strategic approach to implementing IT governance.Learn More

Introduction to Critical Thinking
Critical thinking can be thought of as an art that is woven throughout the key elements of the audit process, including risk assessments, interviewing, testing and analysis, process documentation, and reporting. Effective critical thinking involves collecting and analyzing information, drawing compelling conclusions, and providing recommendations.Learn More

Managing Geopolitical Risk and Uncertainty
The definition of what we view as Geopolitical Risks has increased significantly in the past 50-100 years. Information technology interconnected global economy, our understanding of climate change, global pandemic, internal and global political shifts – all lead to an increasing set of risks impacting a business.Learn More

Liquidity Risk Management
Liquidity is a measure of the ability and ease with which assets can be converted to cash. To remain viable, a financial institution must have enough liquid assets to meet its near-term obligations. Internal audit plays a vital role in ensuring compliance with the Basel III regulatory framework, which was adopted by the Federal Reserve to ensure adequate capital in the banking system.Learn More

Logical Security: Application, Database, and Operating System Layers
A well-developed and implemented logical security management program is essential for most business processes and ensures logical data and information assets are properly protected from inappropriate access and unapproved data exfiltration. Internal auditors need a basic understanding of logical security. Learn More

IT Essentials - Introduction to IT
Technology is an integral part of every organization and underpins almost every piece of data, and every transaction, calculation, and process or business activity. Internal audit activities must be prepared to assess the increased complexities within processes that heavily rely on technology. But where does the operational internal auditor begin? Learn More

Managing People Risk with Behavioral Science
When we think of the enterprise risks, we often think of external and internal factors, competitors and vendors, policies, and processes. When we develop our risk mitigation strategies, policies, processes, and procedures, we often assume that people will support, adopt, and execute these policies – they will read, get training, and follow them. We all know better… Learn More

Physical and Environmental Controls
Physical and environmental controls provide the foundation for an effective suite of controls to protect data and information, hardware, and human resource assets. Physical security controls protect assets from inappropriate physical access, theft, or vandalism, while environmental security controls protect assets from accidental, intentional, and natural events, including fire and water damage or power disruption. Learn More

Risk, Fraud, and Illegal Acts
Learn More

Root Cause Analysis Tools and Techniques
Learn More

The Role of Internal Audit in Insurance Organizations
Learn More