Course curriculum

    1. Detecting Fake Invoices: Common Scenarios, Templates, and Digital Fraud Techniques

    2. Part 2

    3. Part 3

    4. Part 4

    5. Malicious Code and Macros in PDFs, Excel, and Other Documents

    6. Part 2

    7. Part 3

    8. Part 4

    9. Invoice Attachments via Email and Phishing-Based Traps

    10. Part 2

    11. Part 3

    12. Part 4

    13. Timing Manipulations in Revenue Recognition (Cut-Off Fraud)

    14. Part 2

    15. Part 3

    16. Part 4

    17. Risks of Data Manipulation via Scripts, Bots, and Macros in Invoice Automation Systems

    18. Part 2

    19. Part 3

    20. Part 4

    21. Part 5

    22. Part 6

    23. Cyberfraud Impacting Financial Statements Through Misposting

    24. Part 2

    25. Part 3

    26. Part 4

    27. Real Case: Revenue Inflation via Fake Invoices and SEC Investigation

    28. Part 2

    29. Part 3

    30. Part 4

    31. How to Ensure Secure Controls in Monitoring, Approval, and Segmentation Layers

    32. Part 2

    33. Part 3

    34. Part 4

    35. Part 5

    1. Module Quiz 1

    1. Prevalence and Risks of Script and Macro Usage in Financial Operations

    2. Part 2

    3. Part 3

    4. Unauthorized Intervention and Data Manipulation in Automated Workflows

    5. Part 2

    6. Part 3

    7. Macro- and Script-Based Fraudulent Transactions: Hard-to-Detect Threats

    8. Part 2

    9. Part 3

    10. Misuse of Internal Automations: Examples of Segregation of Duties Violations

    11. Part 2

    12. Part 3

    13. Monitoring Automation Logs in Routine Transactions and Detecting Anomalies

    14. Part 2

    15. Part 3

    16. Part 4

    17. Real Case: Fraud Through Invoice Splitting Below Approval Thresholds Using Scripts

    18. Part 2

    19. Part 3

    20. Part 4

    21. Security Policy in Financial Automations: Who Writes the Code, Who Reviews It?

    22. Part 2

    23. Part 3

    24. Part 4

    25. Prevention and Control Measures: Best Practices Against Script/Macro-Based Insider Threats

    26. Part 2

    27. Part 3

    28. Part 4

    1. Module Quiz 2

    1. Breakdowns in the Authorization Chain: Overlooked Roles and Cyber Risks

    2. Part 2

    3. Part 3

    4. Identity Verification Weaknesses in E-Signature and Digital Approval Systems

    5. Part 2

    6. Part 3

    7. Manipulation of Transfer Instructions: Fake Emails, Forms, and Interfaces

    8. Part 2

    9. Part 3

    10. Time Pressure in Payment Approvals and the Use of Social Engineering

    11. Part 2

    12. Part 3

    13. Bypassing Approval Chains Through API-Based Integration Systems

    14. Part 2

    15. Part 3

    16. Part 4

    17. Real Case: Fraudulent Transfer of $1.4 Million with a CFO-Spoofed Instruction

    18. Part 2

    19. Part 3

    20. Designing Secure Approval Processes: Segregation of Duties, MFA, and Monitoring Systems

    21. Part 2

    22. Part 3

    23. Practical Preventive Protocols for Finance Professionals

    24. Part 2

    25. Part 3

    1. Module Quiz 3

About this course

  • Free
  • 177 lessons
  • 0 hours of video content

Discover your potential, starting today