Course curriculum

  • 1

    Module 1: Introduction

    • Segment - 01 - Course Introduction
    • Reading - 1.1 - Course Introduction
  • 2

    Module 2: Fundamentals

    • Segment - 02 - Fundamentals
    • Reading - 2.1 - Fundamentals of Fraud
  • 3

    Module 3: Approaches

    • Segment - 03 - Introduction
    • Reading - 3.1 - Introduction
    • Segment - 04 - General Strategies: Introduction
    • Segment - 05 - General Strategies: Convenience
    • Reading - 3.2 - General Strategies: Convenience
    • Segment - 06 - General Strategies: Social Engineering
    • Reading - 3.3 - General Strategies: Social Engineering
    • Segment - 07 - General Strategies: Internal Fraud
    • Reading - 3.4 - General Strategies: Internal Fraud
    • Segment - 08 - General Strategies: Identity Theft
    • Reading - 3.5 - General Strategies: Identity Theft
    • Segment - 09 - Specific Executions: Introduction
    • Reading - 3.6 - Specific Executions : Introduction
    • Segment - 10 - Specific Executions: Consumer Fraud
    • Reading - 3.7 - Specific Executions : Consumer Fraud
    • Segment - 11 - Specific Executions: Card Block Fraud
    • Reading - 3.8 - Specific Executions: Card Block Fraud
    • Segment - 12 - Specific Executions: Single Use Fraud
    • Reading - 3.9 - Specific Executions: Single Use Fraud
    • Segment - 13 - Specific Executions: Cash Return Fraud
    • Reading - 3.10 - Specific Executions: Cash Return Fraud
    • Segment - 14 - Specific Executions: Collusive Affiliate Fraud
    • Reading - 3.11 - Specific Executions: Collusive Affiliate Fraud
    • Segment - 15 - Specific Executions: Dynamic Tested Fraud
    • Reading - 3.12 - Specific Executions: Dynamic Tested Fraud
    • Segment - 16 - Perpetrators: Introduction
    • Reading - 3.13 - Perpetrators: Introduction
    • Segment - 17 - Perpetrators: Consumers
    • Reading - 3.14 - Perpetrators: Consumers
    • Segment - 18 - Perpetrators: Hackers and Crackers
    • Reading - 3.15 - Perpetrators: Hackers and Crackers
    • Segment - 19 - Perpetrators: White-Collar Criminals
    • Reading - 3.16 - Perpetrators: White-Collar Actors
    • Segment - 20 - Perpetrators: Organized Crime Rings
    • Reading - 3.17 - Perpetrators: Organized Crime
    • Segment - 21 - Conclusion
    • Reading - 3.18 - Conclusion
  • 4

    Module 4: Techniques

    • Segment - 22 - Introduction
    • Reading - 4.1 - Module Introduction
    • Segment - 23 - Data Verification: Introduction
    • Reading - 4.2 - Data Verification: Introduction
    • Segment - 24 - Data Verification: Velocity Checks
    • Reading - 4.3 - Data Verification: Velocity Checks
    • Segment - 25 - Data Verification: Card Verification
    • Reading - 4.4 - Data Verification: Card Verification
    • Segment - 26 - Data Verification: Charge Deposit Verification
    • Reading - 4.5 - Data Verification: Charge Deposit Verifications
    • Segment - 27 - Identity Verification: Introduction
    • Reading - 4.6 - Identity Verification: Introduction
    • Segment - 28 - Identity Verification: Lists
    • Reading - 4.7 - Identity Verification: Lists
    • Segment - 29 - Identity Verification: Simple Field Verification
    • Reading - 4.8 - Identity Verification: Simple Field Verifications
    • Segment - 30 - Identity Verification: Address Verification
    • Reading - 4.9 - Identity Verification : Address Verifications
    • Segment - 31 - Identity Verification: Manual Authentication
    • Reading - 4.10 - Identity Verification: Manual Authentication
    • Segment - 32 - Identity Verification: Automated Lookups
    • Reading - 4.11 - Identity Verification: Automated Lookups
    • Segment - 33 - Technological Verification: Introduction
    • Reading - 4.12 - Technological Verification: Introduction
    • Segment - 34 - Technological Verification: Device Token Authentication
    • Reading - 4.13 - Technological Verification: Device Token Identification
    • Segment - 35 - Technological Verification: Digital Signatures
    • Reading - 4.14 - Technological Verification: Digital Signatures
    • Segment - 36 - Technological Verification: Consumer Location
    • Reading - 4.15 - Technological Verification: Consumer Location
    • Segment - 37 - Scores and Rules
    • Reading - 4.16 - Scores and Rules
    • Segment - 38 - Processes: Introduction
    • Reading - 4.17 - Processes: Introduction
    • Segment - 39 - Processes: Insurance and Guarantees
    • Reading - 4.18 - Processes: Insurance and Guarantees
    • Segment - 40 - Processes: Reviews Representment
    • Reading - 4.19 - Processes: Reviews and Representment
    • Segment - 41 - Outro
    • Reading - 4.20 - Outro
  • 5

    Module 5: Strategies

    • Segment - 42 - Introduction
    • Reading - 5.1 - Module Introduction
    • Segment - 43 - Strategy Stages
    • Reading - 5.2 - Strategy Stages
    • Segment - 44 - Technique Considerations
    • Reading - 5.3 - Technique Considerations
    • Segment - 45 - Data Usage Considerations
    • Reading - 5.4 - Data Usage Considerations
    • Segment - 46 - Data Processing Considerations
    • Reading - 5.5 - Data Processing Considerations
    • Segment - 47 - Outro
    • Reading - 5.6 - Outro
  • 6

    Module 6: Conclusion

    • Segment - 48 - Conclusion
    • Reading - 6.1 - Conclusion