Course curriculum

    1. Authorization Process Structure: The First Line of Defense in Financial Security

    2. Part 2

    3. Part 3

    4. Part 4

    5. Approval Chain Vulnerabilities: Segregation-of-Duties Violations and Risk-Prone Procedures

    6. Part 2

    7. Part 3

    8. Part 4

    9. CEO Fraud (BEC) Attacks: Authority Impersonation–Based Financial Scams

    10. Part 2

    11. Part 3

    12. Part 4

    13. Part 5

    14. Part 6

    15. Invoice and Payment Instruction Fraud: Breaking Trust in the Digital Environment

    16. Part 2

    17. Part 3

    18. Part 4

    19. Part 5

    20. Unauthorized Access and Fake Approvals via ERP and Accounting Systems

    21. Part 2

    22. Part 3

    23. Part 4

    24. Part 5

    25. Part 6

    26. Effective Use of Multi-Signature and Approval Mechanisms

    27. Part 2

    28. Part 3

    29. Part 4

    30. Part 5

    31. Part 6

    32. Real-World Case Study: Anatomy of a $13 Million Loss Through Approval Chain Bypass at a Global Corporation

    33. Part 2

    34. Part 3

    35. Part 4

    36. Defense Layers: Role-Based Access, Digital Signatures, and Anomaly Detection Systems

    37. Part 2

    38. Part 3

    39. Part 4

    40. Part 5

    41. Finance Department–Specific Policies and Protocols: Practical Controls

    42. Part 2

    43. Part 3

    44. Part 4

    1. The Role of ERP Systems in Financial Security and Points of Vulnerability

    2. Part 2

    3. Part 3

    4. Authorization Hierarchy and Role Conflicts: Areas of Exploitation Within ERP Systems

    5. Part 2

    6. Part 3

    7. Part 4

    8. Part 5

    9. Financial Record Manipulation: Tactics for Tampering with Accounting and Reporting Modules

    10. Part 2

    11. Part 3

    12. Part 4

    13. Circumventing or Manipulating ERP Logs and Audit Trail Records

    14. Part 2

    15. Part 3

    16. Part 4

    17. Part 5

    18. Fake Vendor Creation, Invoice Cloning, and Insider Payment Redirection Scenarios

    19. Part 2

    20. Part 3

    21. Part 4

    22. Part 5

    23. Hidden Risk: Manipulation of ERP Systems via API, Integrations, and Automation

    24. Part 2

    25. Part 3

    26. Part 4

    27. Part 5

    28. Case Study: ERP Privilege Abuse Leading to Covert Fund Transfers – Uncovered by Internal Audit

    29. Part 2

    30. Part 3

    31. Part 4

    32. Defense Strategies: Role-Based Access, Transaction Restrictions, and Independent Audit Layers

    33. Part 2

    34. Part 3

    35. Part 4

    36. Part 5

    37. ERP Security Awareness for Finance Departments: Training, Protocols, and Continuous Monitoring

    38. Part 2

    39. Part 3

    40. Part 4

    1. Evolution of Reporting Systems and the Cyber Threat Landscape

    2. Part 2

    3. Part 3

    4. Intentional Filtering and Misleading Presentation of Financial Indicators

    5. Part 2

    6. Part 3

    7. Part 4

    8. Part 5

    9. Insider Reporting Manipulation Scenarios (VBA, BI Tools, Custom SQL)

    10. Part 2

    11. Part 3

    12. Part 4

    13. Intervention Vectors in the Reporting API and Automation Layer

    14. Part 2

    15. Part 3

    16. Part 4

    17. Pre-Audit Report Cleansing: Deleted Data and Revised Figures

    18. Part 2

    19. Part 3

    20. Part 4

    21. Real Case: Attempt to Mislead a CFO Through Chart Manipulation in Visual Reports

    22. Part 2

    23. Part 3

    24. Part 4

    25. Defense Strategies: Report Monitoring, Version Control, and Visualization Security

    26. Part 2

    27. Part 3

    28. Part 4

    29. Part 5

    1. Scenario Analysis and Simulation Tools in Financial Decision-Making

    2. Part 2

    3. Part 3

    4. Part 4

    5. Manipulated Assumptions: Steering Decisions Through Input Values in ‘What-If’ Scenarios

    6. Part 2

    7. Part 3

    8. Part 4

    9. Code-, Macro-, and Formula-Based Security Vulnerabilities in Modeling Infrastructure

    10. Part 2

    11. Part 3

    12. Part 4

    13. Part 5

    14. Exploiting Computational Power: Deliberate Sabotage and System Shutdown Attempts Using High-Powered Analysis Tools

    15. Part 2

    16. Part 3

    17. Part 4

    18. Real-World Case: Misleading Scenario Use to Influence a CFO in a Project Financing Decision

    19. Part 2

    20. Part 3

    21. Part 4

    22. Defense Strategies: Model Auditing, Input Constraints, and Computational Power Controls

    23. Part 2

    24. Part 3

    1. Digital Security of Tax Planning Documents: Key Vulnerabilities and Common Risks

    2. Part 2

    3. Part 3

    4. Part 4

    5. Sensitive Information Sharing in International Tax Strategies and Cross-Border Risks

    6. Part 2

    7. Part 3

    8. Part 4

    9. Part 5

    10. Mis-Sharing of Tax Files and Data Leaks via Email

    11. Part 2

    12. Part 3

    13. Part 4

    14. Exploitation of Cloud-Based Tax Simulation Tools and Computational Abuse

    15. Part 2

    16. Part 3

    17. Insider Threats in Tax Departments: Unauthorized Access, Data Leaks, and Manipulation

    18. Part 2

    19. Part 3

    20. Part 4

    21. Case Study: Regulatory Crisis Triggered by a Transfer Pricing Document Leak

    22. Part 2

    23. Part 3

    24. Defense Strategies: Access Management, Encryption, Logging, and Training Protocols

    25. Part 2

    26. Part 3

    27. Part 4

    1. Corporate Banking Portals and Payment Networks: Why They Are Critical from a Cybersecurity Perspective

    2. Part 2

    3. Part 3

    4. Part 4

    5. Cyber Incidents in the SWIFT Network: Real-World Cases and Lessons Learned

    6. Part 2

    7. Part 3

    8. Part 4

    9. Part 5

    10. Phishing and Social Engineering to Compromise Banking Portal Accounts

    11. Part 2

    12. Part 3

    13. Part 4

    14. Unauthorized Payment Transactions and Fund Transfer Fraud: Methods and Impacts

    15. Part 2

    16. Part 3

    17. Part 4

    18. Part 5

    19. Insider Threats: Privilege Abuse, Fraudulent Transactions, and Cyber Fraud

    20. Part 2

    21. Part 3

    22. Part 4

    23. Real Case: Bangladesh Bank Incident (SWIFT Cyberattack) — In-Depth Analysis

    24. Part 2

    25. Part 3

    26. Part 4

    27. The Heart of Security: Multi-Layer Approval Mechanisms and Risk-Based Transaction Review

    28. Part 2

    29. Part 3

    30. Part 4

    31. Part 5

    32. Banking Portal Access Logs, MFA, and Suspicious Behavior Detection Systems

    33. Part 2

    34. Part 3

    35. Part 4

    36. Part 5

    37. Time-Based and Context-Aware Security Policies in Approval Processes

    38. Part 2

    39. Part 3

    40. Part 4

    41. Part 5

    42. Network Segmentation, Whitelisting Controls, and Secure Integration Practices

    43. Part 2

    44. Part 3

    45. Part 4

    46. Part 5

    47. Part 6

About this course

  • Free
  • 238 lessons
  • 0 hours of video content

Discover your potential, starting today