Fraud Management Part III

Course ID: FR00103

Objective

Committee of Sponsoring Organizations of the Treadway Commission (COSO) along with the Association of Certified Fraud Examiners (ACFE) published the Fraud Risk Management Guide (guide), intended to serve as best practices guidance for organizations to follow in addressing the fraud risk assessment principles. Risk is any threat to business and represents uncertainty and inability of the corporation to achieve its goals. The organization needs to create an organizational culture and structure conducive to fraud risk management. The tone at the top should reflect the perception of fraud detection and prevention.

The course is designed to ensure employees understand the fraud risk assessment framework, how to execute fraud risk assessment, implement anti-fraud strategy, and features of the whistleblower program. The course is Part III in the ten-part series of fraud management courses.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
Price: $31.98 $74.99
Add to Cart For Corporate Request Demo →
  • Category: Fraud & Audit
  • Duration: 60 Mins
  • CPE: 1 HR
  • Course Type: e-Learning

What you will learn:

    • Learn How to Develop the Fraud Risk Management Program
    • Learn How to Plan for Fraud Risk Assessments
    • Learn How to Execute Fraud Risk Assessments
    • Section I - Fraud Risk Assessment Framework
    • Step 1 - Identify Potential Inherent Fraud Risks
    • Step 2 - Assess the Likelihood and Impact
    • Step 3 - Evaluate Department Likely to Commit Fraud
    • Section II - Analysis
    • Section III - Reporting the Results
    • Understand Fraud Risk Assessment with Practical Examples
    • Learn about Prevention, Detection, and Respond Programs for Fraud
    • Understand Antifraud Strategy Key Elements
    • Learn about Sound Internal Control System Requirements
    • Understand Typical Features of the Practical and User-Friendly Hotline and Whistleblower Program
    • Learn about Investigations Basics, Enforcement, and Corrective Actions

Advanced Persistent Threat or Intrusion

  • Course ID: ADVANCp6H2
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:


The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

What is Advanced Persistent Threat
Phases of an Advanced Persistent Threat
Reconnaissance and Initial Access
Expand Access
Data Capture/Exfiltration or Manipulation
Track-Covering and Exit
The suggested e-Learning courses that would reduce the insurance cost

Anti Money Laundering (AML) Awareness

  • Course ID: CO00103
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What it is and how does it work?
  • Why people and organizations launder money?
  • How money laundering works: basic process
  • Legal consequences for money laundering, including state and federal (U.S.) penalties
  • Applicable laws and regulation
  • Insider trading

Architectural Solutions

  • Course ID: ARCHITvD8Q
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:


The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

Securing ICS Infrastructure - Defense in Depth
Next-Gen Tools and Techniques
Zero Trust

Asset Management

  • Course ID: FCOO102
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Asset Management?
    Asset Management and Cybersecurity
    Recommendations for Asset Management
    Case Study - Application/Program Vulnerabilities 

Backup and Recovery

  • Course ID: FCOO104
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is a disaster?
    What is Disaster Recovery?
    Backup and Recovery
    Protecting Backup Data

Breach Management

  • Course ID: FCOO105
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

What you will learn:

 

The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:

  • What is the importance of abreach notification?
  • What is a data breach?
  • In what circumstances wouldnotification of a data breach be required and to whom?
  • Suggested e-Learning courses toenhance the knowledge.

(Note - The suggested e-Learningprogram is a two-part series.)

Breach Notification Part I - Awareness

  • Course ID: CS00301
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

  • Course ID: CS00302
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Bring Your Own Device

  • Course ID: FCOO106
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Bring Your Own Device (BYOD)?
    What are the BYOD challenges?
    How can you secure your BYOD environment?
    Examples of BYOD device hack
    Suggested e-Learning courses to enhance the knowledge
    (Note - The suggested e-Learning program is a two-part series.)

Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

  • Course ID: DR00101
  • CPE: 1 HR
  • Course Type: e-Learning
Book the course Course Objective

What you will learn:

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan
Need us to design a course for you? Contact Now
Copyrights © 2020 All Rights Reserved by SecuRetain.