Course Title : Fraud Detection and Prevention using Data-Driven Approach
Course Duration : 2 Day Online Intructor Led Workshop
Online workshop is delivered in two days, two units each day between 10:30 am to 1 pm and 3 pm to 5:30 pm
Course Fee : Available upon request (Write to us at info@tlcpak.com)
Course Location  : TLC Office, Customer Onsite, and Online 
Online workshop are delivered in two days, two units each day between 10:30 am to 1 pm and 3 pm to 5:30 pm
Course Code : TN219
Deliverables : Comprehensive Student Guide and Workshop Certificate

This couse can also be conducted for customers at their premieses in Karachi, Lahore, and Islamabad
PURPOSE:
As a matter of fact, today attackers and fraudsters continually expanding their knowledge and sharpen their capabilities.  As a result, with these skills, online businesses are losing millions of dollars every year to fraud, paying heavy penalties and fines with these losses growing each year. Above all, it is clear that rule-based approaches to fraud detection and prevention have not been relevant or helpful anymore and organizations are challenged to look beyond their present approach. The new approach leaves security and fraud teams looking to AI and machine learning models as the next generation in fraud detection and protection.

In this course, we will discuss the merits of a data-driven approach to fraud detection and prevention, along with how having the right data and the best data are critically important.

In a nut shell, organizations must understand the total value of investing into their resources rather paying heavy penalties against the new data protection laws.

A LITTLE BACKDROP:
Fraud impacts everyone—from individual consumers to large corporations. Traditional rules-based systems may have been effective in the past in identifying fraud, but they become ineffective and stale as fraudsters learn how to bypass those rules. It becomes even more challenging due to the large volumes of data that need to be processed and examined to detect fraud, in addition to the constantly changing tactics for committing fraud – those activities are usually hidden in large volumes of data. Recently developed machine learning techniques are increasingly effective in detecting fraud with the advances in data systems (e.g. big data, streaming data) and computational systems (e.g. high-performance computing, GPU). As a result, it is possible to identify fraudulent patterns of behavior in data that is constantly being captured from day-to-day activities. In addition, it is feasible to address the challenges associated with fraudsters changing their tactics.

THE IMPORTANCE OF THIS WORKSHOP:
Fraud can occur in a multitude of ways. Our comprehensive fraud detection and prevention training course will enhance your fraud awareness so you know exactly what to look for in every area of your organization. Learn how to apply the various evidence-gathering techniques used to detect fraud. Learn the basics of forensic accounting and how it can be used to investigate fraud and embezzlement and in the analysis of financial information. Discover how to determine your organization’s fraud risk liability. Successful completion of our fraud detection and prevention training course may also help you identify opportunities where you can further optimize your present set of solution based on fraud detection and prevention technologies.

TARGETED AUDIENCE:
CXO Suite, Business leaders, Director IT and IT Managers, Head of Departments, Legal, and internal Audit and Regulators teams, Risk and Compliance, information security and cybersecurity teams, Enterprise Architectures with a familiarity of basic IT/IS security concepts.

PREREQUISITES:
Participants attending this workshop should be familiar with basic Information Technology (IT) and Security concepts, basic business challenges and the role of general IT infrastructure technologies and their applications. 

ABOUT THE INSTRUCTOR
This workshop shall be delivered by TOGAF 9 Certified/IBM Certfied Infrastructure System Architect and an experienced trainer with 25+ years of career experience imparting education and training services both locally and internationally and have worked for international enterprise technology vendors including IBM, Fujitsu, and ICL. Our instructor holds various industry professional certifications in the space of enterprise servers and storage technologies, Information Security, Enterprise Architecture, ITIL, Cloud, Virtualization, Green IT, and a co-author of 10 IBM Redbooks.

COURSE OUTLINE 
Unit 1 – Financial Crime and Fraud in the age of Cybersecurity 
  • A world without cybersecurity.
  • Global Threat Intelligence Index reports in a view.
  • Top Security Concerns for the Executive Management.
  • Assess and mitigate vulnerabilities in mobile systems.
  • Differences between Information Security and Cybersecurity.
  • Changing Attacker Profiles – Increasing Resources and Sophistication.
  • Attack Vector, Attack Surface and Malicious Actors.
  • Understanding Security Elements – Knowing security threats and their channels.
  • Differences between Information Security and Cybersecurity.
  • Multiple layers of protection offered by Cybersecurity.
  • Understand Personally Identifiable Information and Data anonymization. 
  • Understand Financial crime or fraud.
  • How can a compliance strategy improve customer trust?
  • Compliance and Financial crime/Fraud? And Types of frauds.
  • The Difference between automated and human-driven fraud.
  • Fraud and financial crime – A small Industry backdrop.
  • Challenges to combat Financial Crime in Financial Domain.
  • Cyber profile of Fraud and Financial Crime – An illustrated Example.
  • Crime pathways are converging, blurring traditional distinctions among cyber breaches, 

  • fraud, and financial crimes.
  • Adoption of Cybersecurity best practices.
  • 10 key steps to Cybersecurity.
  • Top 11 ways poor Cybersecurity can harm you.
  • Unit 1 Assessment.
Unit 2 - The Industrializatoin of Fraud and Organized Attack Lifecyscle
  • The Industrialization of Fraud – What is it? And their components. 
  • Layered Solutions are becoming an Essential for maximum security.
  • Understand how to combat WAF attacks, Bot detection, Click-farm Detection, Defense against API attacks.
  • Click Hijacking, Device ID Reset Fraud, and How Click Injection Works.
  • Understand the role of Machine learning and behavioral analytics.
  • Understanding the Organized Attack Lifecycle.
  • Describe Siloed Attack Defense – Advanced Telemetry.
  • Secure the entire journey – From perimeter to user.
  • Attack Progression Model used by Cybercriminals.
  • The Siloed Attack Defense Vs. Unified Defense View.
  • Three main categories of Signals.
  • Fraud and Friction Use Cases and Case Study.
  • Customer Case Study – Adaptive Authentication.
  • Convergence of Fraud and Information Security Functions
  • Functional Convergence in Financial Industry & Convergence Mechanism.
  • Unit 2 Assessment.

  •  

     
     
     

Unit 3 - Exploring Fraud Detection and Prevention Approaches
  • Challenges associated to Fraud Detection and Prevention Approaches. 
  • Exploring Fraud Detection and their Techniques and fraud detection using data-driven techniques.
  • Monitoring Metrics for Behavior-based Fraud Detection Solution.
  • Fraud Controls Reference Approach and Framework.
  • The Predictive Fraud values and thresholds model – An example.
  • Data-driven approach and Traditional Rule based method approach.
  • Take advantage of a Layered Fraud Prevention Approach.
  • A solution that enable organizations to safe guard against application exploits.
  • Identifying the right Security Solution for your Enterprise Applications.
  • Protect your Credentials – Guard against the most common tactic used by hackers.
  • Mitigate Application Vulnerabilities and Security Due Diligence.
  • Defend against software and code-level vulnerabilities.
  • Mitigate Bots & Abuse by removing unwanted automation that can lead to account takeover & fraud.
  • Manage and Secure APIS and to solve your modern API challenges.
  • Securing your API, API Management and API Gateway.
  • Integrate Security into Continuous Integration/Continuous Development Pipelines.
  • Why Account Takeover (ATO) Prevention Matters.
  • Fight Back Fraud – A brief summary.
  • Bringing together financial crime, fraud, and cyber operations.
  • Exploring the CARTA Approach to Fraud & Risk Management.
  • Unfolding the CARTA Approach and CARTA Adaptive Access Protection Architecture.
  • Fraud Detection benefits using CARTA.
  • Taking the CARTA Approach to your Fraud Prevention Strategy.
  • Stepwise approach to combat Fraud – Functional components to support Counter Fraud.
  • Unit 3 Assessment. 
Unit 4 - Compliance and Regulatory Aspects of Security 
  • Understanding Data Analytics and its importance from Application Security PoV.
  • Rule-based Vs ML-based Fraud Detection Systems – Recap Summary.
  • Threats and security challenges faced today by Banking and FSS industry. 
  • Managing compliance risk and their types.
  • Privacy Compliance – A Dominant Business Concern.
  • Data Anonymization, Data De-Anonymization and their types.
  • Roadmap to improved Data Privacy.
  • Managing compliance risk and their types.
  • The need for having a Compliance Department.
  • Areas of responsibility falls under the Compliance Department.
  • The Role of Compliance Officers and Regulators and Regulatory Bodies Key Takeaways.
  • Special considerations and requirements for compliance department.
  • Generalized Compliance Department Organization Organogram.
  • Understanding the importance of Compliance Regulations.
  • Common Archetypes for Compliance Models for Banks.
  • Elements and Components of a Compliance Framework.
  • Regulatory Compliance in Cybersecurity.
  • Assessing which Compliance Regulations relate to an Organization.
  • How do you implement regulatory compliance in IT?
  • Types of Cybersecurity frameworks and regulations.
  • NIST – A Cybersecurity Risk Management Framework – General Information.
  • Differences Between Compliance and Security.
  • Threat Protection – The bigger picture.
  • Unit 4 Assessment.

  •  

     
     
     
     
     

 

 
 

 


 
List of IBM AIX Operating System 
Standard Courses

AIX 7 Basics

Power Systems for AIX II - AIX Systems Administration

Power Systems for AIX III - Advanced Administration and Problem Determination

Introduction to AIX Korn Shell Scripting - AIX 7,1, AIX 6.1, AIX 5.3 and Linux

AIX 7 Jumpstart for UNIX Professionals

Security for Power Systems AIX

IBM POWER Virtualization Technologies

AIX Disk Storage Management and Recovery Procedures

AIX Performance Monitoring and Management

Introduction to IT Infrastructure Technologies

Understanding the Role of Storage Technologies and Big Data

Linux Basics for Users

 

List of IBM AIX Operating System 
Short-Term Courses

AIX System Configuration Devices & AIX System Storage Overview

AIX Disk Storage Management & Recovery Procedures

AIX Performance Monitoring & Management

Understanding & Managing AIX ODM (Object Data Manager)

Security for Power Systems AIX

AIX Software Installation Maintenance & Backup & Restotore

Working with Logical Volume Manager & File System Administration

AIX Error Monitoring & System Dump Facility & AIX Scheduling

AIX Security & User Administration