Course curriculum
-
-
How Fake Invoice Attacks Occur
-
Part 2
-
Part 3
-
Part 4
-
Invoice Fraud Tactics Combined with BEC
-
Part 2
-
Part 3
-
Part 4
-
Vendor Impersonation and Fake Payment Requests
-
Part 2
-
Part 3
-
Part 4
-
Bank Account Change Scams in Finance Operations
-
Part 2
-
Part 3
-
Part 4
-
Urgency-Based Invoice Fraud Manipulations in Finance
-
Part 2
-
Part 3
-
Part 4
-
Targeted Roles in Financial Departments for Invoice Fraud and Social Engineering Attacks
-
Part 2
-
Part 3
-
Part 4
-
Real Case: Ubiquiti Networks — Executive Trust Exploited in a BEC/Wire-Fraud Scheme
-
Part 2
-
Part 3
-
Multi-Layered Defense Tactics Against Invoice Fraud in Finance Operations
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
Technical Safeguards for Invoice Integrity and Communication Authenticity in Finance
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
Security Awareness for Financial Staff: Detecting Anomalies and Acting with Discipline
-
Part 2
-
Part 3
-
Part 4
-
-
-
Module Quiz 1
-
-
-
Role and Access Definitions in Financial Software: Why They Are Critical
-
Part 2
-
Part 3
-
Typical Scenarios and Risks of Session Sharing
-
Part 2
-
Part 3
-
Part 4
-
The Impact of Privilege Abuse on Accounting Processes: Real Case Analyses
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
Part 6
-
Weak Session Management Policies and Exploitable Vulnerabilities
-
Part 2
-
Part 3
-
Part 4
-
The Importance of Monitoring and Record-Keeping: Audit Trails and Log Analysis
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
Awareness Strategies for Secure Session Use in Finance Teams
-
Part 2
-
Part 3
-
Part 4
-
Technical and Operational Controls: MFA, IP Restrictions, and Session Time Limits
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
Part 6
-
Role-Based Security Policies from a Management and Audit Perspective
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
-
-
Module Quiz 2
-
-
-
How Macro and Code-Based Attacks Occur in Financial Documents
-
Part 2
-
Part 3
-
Part 4
-
Excel Macros, Embedded Code, and Automated Command Threats
-
Part 2
-
Part 3
-
Part 4
-
Hidden JavaScript, Exploits, and Form Traps in PDF Files
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
Beneath the Surface: Link, Button, and Object-Based Risks in Documents
-
Part 2
-
Part 3
-
Part 4
-
Real Case: Loss of Internal Access Triggered by a Bookkeeper’s Excel Macro
-
Part 2
-
Part 3
-
Part 4
-
Security Screening of Incoming Documents: What to Do Before Opening
-
Part 2
-
Part 3
-
Part 4
-
Auto-Open, Preview, and Cache Threats in Email Attachments
-
Part 2
-
Part 3
-
Part 4
-
User Training, Filtering, and Secure Viewing Tools for Document Security
-
Part 2
-
Part 3
-
Part 4
-
Part 5
-
-
-
Module Quiz 3
-
About this course
- Free
- 206 lessons
- 0 hours of video content