Course curriculum

    1. How Fake Invoice Attacks Occur

    2. Part 2

    3. Part 3

    4. Part 4

    5. Invoice Fraud Tactics Combined with BEC

    6. Part 2

    7. Part 3

    8. Part 4

    9. Vendor Impersonation and Fake Payment Requests

    10. Part 2

    11. Part 3

    12. Part 4

    13. Bank Account Change Scams in Finance Operations

    14. Part 2

    15. Part 3

    16. Part 4

    17. Urgency-Based Invoice Fraud Manipulations in Finance

    18. Part 2

    19. Part 3

    20. Part 4

    21. Targeted Roles in Financial Departments for Invoice Fraud and Social Engineering Attacks

    22. Part 2

    23. Part 3

    24. Part 4

    25. Real Case: Ubiquiti Networks — Executive Trust Exploited in a BEC/Wire-Fraud Scheme

    26. Part 2

    27. Part 3

    28. Multi-Layered Defense Tactics Against Invoice Fraud in Finance Operations

    29. Part 2

    30. Part 3

    31. Part 4

    32. Part 5

    33. Technical Safeguards for Invoice Integrity and Communication Authenticity in Finance

    34. Part 2

    35. Part 3

    36. Part 4

    37. Part 5

    38. Security Awareness for Financial Staff: Detecting Anomalies and Acting with Discipline

    39. Part 2

    40. Part 3

    41. Part 4

    1. Module Quiz 1

    1. Role and Access Definitions in Financial Software: Why They Are Critical

    2. Part 2

    3. Part 3

    4. Typical Scenarios and Risks of Session Sharing

    5. Part 2

    6. Part 3

    7. Part 4

    8. The Impact of Privilege Abuse on Accounting Processes: Real Case Analyses

    9. Part 2

    10. Part 3

    11. Part 4

    12. Part 5

    13. Part 6

    14. Weak Session Management Policies and Exploitable Vulnerabilities

    15. Part 2

    16. Part 3

    17. Part 4

    18. The Importance of Monitoring and Record-Keeping: Audit Trails and Log Analysis

    19. Part 2

    20. Part 3

    21. Part 4

    22. Part 5

    23. Awareness Strategies for Secure Session Use in Finance Teams

    24. Part 2

    25. Part 3

    26. Part 4

    27. Technical and Operational Controls: MFA, IP Restrictions, and Session Time Limits

    28. Part 2

    29. Part 3

    30. Part 4

    31. Part 5

    32. Part 6

    33. Role-Based Security Policies from a Management and Audit Perspective

    34. Part 2

    35. Part 3

    36. Part 4

    37. Part 5

    1. Module Quiz 2

    1. How Macro and Code-Based Attacks Occur in Financial Documents

    2. Part 2

    3. Part 3

    4. Part 4

    5. Excel Macros, Embedded Code, and Automated Command Threats

    6. Part 2

    7. Part 3

    8. Part 4

    9. Hidden JavaScript, Exploits, and Form Traps in PDF Files

    10. Part 2

    11. Part 3

    12. Part 4

    13. Part 5

    14. Beneath the Surface: Link, Button, and Object-Based Risks in Documents

    15. Part 2

    16. Part 3

    17. Part 4

    18. Real Case: Loss of Internal Access Triggered by a Bookkeeper’s Excel Macro

    19. Part 2

    20. Part 3

    21. Part 4

    22. Security Screening of Incoming Documents: What to Do Before Opening

    23. Part 2

    24. Part 3

    25. Part 4

    26. Auto-Open, Preview, and Cache Threats in Email Attachments

    27. Part 2

    28. Part 3

    29. Part 4

    30. User Training, Filtering, and Secure Viewing Tools for Document Security

    31. Part 2

    32. Part 3

    33. Part 4

    34. Part 5

    1. Module Quiz 3

About this course

  • Free
  • 206 lessons
  • 0 hours of video content

Discover your potential, starting today