Course curriculum

  • 1

    Course Introduction

    • Course Functionality

    • Knowing Your Enemy

    • Types of Cyber Attacks

  • 2

    Training and Education

    • What are Criminals After?

    • It is Time to Wise Up!

    • Keep The Crown Jewels Safe

    • It's Not Just You

    • Mobile Phone - Best Friend and Worst Enemy

    • Dating Platforms - Dangerous?

    • Imposters In Action

    • Maintaining Security

    • Financial Crime Red Flags

    • Deep Fake Customer Impersonations

  • 3

    Regulatory Requirements

    • Policies, Procedures, and Compliance

  • 4

    Course Completion

    • Quiz

    • Rules, Regulations, and References