Course curriculum

    1. The Role of Compliance Systems and Digital Monitoring of Regulatory Adherence

    2. Part 2

    3. Part 3

    4. Techniques for Producing False Compliance Reports: Manual and Automated Manipulations

    5. Part 2

    6. Part 3

    7. Insider Manipulation: Altering Compliance Data Through Authorized Users

    8. Part 2

    9. Part 3

    10. Part 4

    11. API and Integration Vulnerabilities in Automated Regulatory Reporting

    12. Part 2

    13. Part 3

    14. Part 4

    15. Critical Security Considerations in SEC, FINRA, Basel III, and GLBA Compliance Reporting

    16. Part 2

    17. Part 3

    18. Part 4

    19. Case Study: Pre-Audit False Reporting Attempt and Detection Process Real-World Case (Adapted)

    20. Part 2

    21. Part 3

    22. Part 4

    23. Secure Storage and Immutability Measures in the Digital Archiving of Compliance Reports

    24. Part 2

    25. Part 3

    26. Using Independent Monitoring and Audit Logs to Prevent Manipulation

    27. Part 2

    28. Part 3

    29. Part 4

    1. Module Quiz 1

    1. The Role and Sensitivity of Documents Used in Financial Audits

    2. Part 2

    3. Part 3

    4. Part 4

    5. Part 5

    6. Deliberate Content Alterations in Audit Documents and Associated Risks

    7. Part 2

    8. Part 3

    9. Part 4

    10. Hidden Layers and Metadata Manipulation in Excel, Word, and PDF Files

    11. Part 2

    12. Part 3

    13. Part 4

    14. Unauthorized Access and Circulation Risks in Document Sharing Processes

    15. Part 2

    16. Part 3

    17. Lack of Version Control and Inconsistent Documents in Audit Environments

    18. Part 2

    19. Part 3

    20. Part 4

    21. Case Study: Submission of Misleading Documents to the Audit Committee and Its Corporate Consequences

    22. Part 2

    23. Part 3

    24. Part 4

    25. Encryption, Access Restriction, and Timestamping Techniques for Document Security

    26. Part 2

    27. Part 3

    28. Part 4

    29. Part 5

    30. Security Responsibility and Ethical Reflex in Audit Documents for Finance Teams

    31. Part 2

    32. Part 3

    1. Module Quiz 2

    1. What is Data Poisoning? Impact on Financial Risk Models

    2. Part 2

    3. Part 3

    4. Part 4

    5. Manipulative Data Input Scenarios in Risk-Scoring Algorithms

    6. Part 2

    7. Part 3

    8. Part 4

    9. Direct and Indirect Impacts of Poisoned Data on Credit and Market Risk Models

    10. Part 2

    11. Part 3

    12. Part 4

    13. Part 5

    14. Insider Data Manipulation: Deliberate Misentries and System Vulnerabilities

    15. Part 2

    16. Part 3

    17. Part 4

    18. External Data Poisoning: API, Data Provider, and Web-Based Threats

    19. Part 2

    20. Part 3

    21. Part 4

    22. Part 5

    23. Real Case: Credit Rating Model Distorted by Injected False Transaction Data

    24. Part 2

    25. Part 3

    26. Part 4

    27. Anomaly Detection, Boundary Testing, and Input Validation Techniques for Model Security

    28. Part 2

    29. Part 3

    30. Part 4

    31. Part 5

    1. Module Quiz 3

About this course

  • Free
  • 227 lessons
  • 0 hours of video content

Discover your potential, starting today