Course curriculum

  • 1

    Welcome to Turnkey Training

    • Course Functionality

  • 2

    Cyber Security Training

    • Knowing Your Enemy

    • Types of Cyber Attacks

    • What are Criminals After?

    • Imposters In Action

    • It is Time to Wise Up!

    • Mobile Phone - Best Friend and Worst Enemy

    • Dating Platforms - Dangerous?

    • Keep The Crown Jewels Safe

    • Maintaining Security

    • Financial Crime Red Flags

  • 3

    Regulatory Requirements

    • Policies, Procedures, and Compliance

    • Rules, Regulations, and References

  • 4

    Quiz

    • Final Quiz

    • Course Completion