Course Summary

Financial crime is multi-faceted and evolves quickly, making it hard to identify and combat. One of the best ways to stop threats facing your business is to diversify your expertise across multiple risk areas.

You’ll learn how:
• Certain products and customers could be used for financial crime
• Terrorism and weapons of mass destruction are financed
• Criminal organizations and human, animal, and drug trafficking rings conduct their operations
• Cyber criminals exploit businesses and individuals using malware, ransomware, and dark markets

Participants should have a basic level of financial crime prevention expertise.

Taking this course will help you identify and tackle a wide range of financial crimes.

1. How high-risk products and customers can be used for financial crime
Introduction
• Introductory case
• What would you do?
• Feedback
• Learning objectives

How some high-risk products are misused
• Risk-based approach to business
• Correspondent banking risk and red flags: Intermediate
• Cryptoasset risk and red flags
• Trusts risk and red flags: Intermediate
• Wealth management risk and red flags: Intermediate
• Private banking risk and red flags: Intermediate
• Private banking: Intermediate (Case example)
Some high-risk customers and types of misuse
• Cash-intensive business risk and red flags: Intermediate
• Gatekeeper risk and red flags: Intermediate
• Gatekeeper risk and red flags: Intermediate (Case example)
• Designated non-financial businesses and professions risk and red flags: Intermediate
• Beneficial ownership: Complex aggregate risk and red flags Bribery and corruption
• Bribery and corruption
• Odebrecht Group Brazil (Case example)
• Shell company risk and red flags: Intermediate
• Tax avoidance vs tax evasion: Intermediate
• Tax avoidance vs tax evasion: Intermediate (Case example)

2. How financing works for terrorism and weapons of mass destruction (WMD) proliferation
How terrorism is financed
• Terrorist financing
• Terrorist financing: Intermediate
• Crowdfunding risk and red flags: Intermediate
• Crowdfunding risk and red flags: Intermediate (Case example) terrorism funding
• Charity and NGO risk and red flags: Intermediate
• Charity and NGO risk and red flags: Intermediate (Case example) terrorism funding
• Alternative remittance systems
• FinTech payments channels
• Card schemes and red flags
• Card schemes and red flags (Case example)

How WMDs are financed
• Weapons of mass destruction
• Weapons of mass destruction financing
• Weapons of mass destruction financing: Intermediate
• Dual-use goods risk and red flags
• Dual-use goods risk and red flags (Case example)

3. How criminal organizations and drug-trafficking organizations conduct operations
Criminal and drug-trafficking organization operations
• Organized crime
• Organized crime financing
• Organized crime financing (Case example)
• Drug trafficking
• Drug trafficking financing
• Drug trafficking financing (Case example)
• Transnational crime
• Social and economic impact of not combating organized crime

Human trafficking operations
• Human trafficking and human smuggling
• Human trafficking financing
• Human trafficking financing (Case example)
• Social and economic impact of not combating human trafficking

Environmental criminal operations
• Environmental crime
• Environmental crime financing
• Environmental crime financing (Case example)
• Wildlife trafficking
• Social and economic impact of not combating environmental crime

4. How cyber-enabled financial crimes exploit businesses and individuals
How cyber criminals obtain information
• Cyber-enabled crime
• Cyber-enabled crime requires money laundering
• Social engineering
• Phishing and spoofing
• Phishing and spoofing (Case example: Wells Fargo)
• Third-party payment processor risk and red flags
• Third-party payment processor risk and red flags (Case example) How unlawful attacks can disrupt and threaten business
• Hacking and unauthorized access
• Malware and ransomware
• Business email compromise
• WannaCry ransomware attack (Case example)

Cryptoasset and blockchain
• Cryptoasset risk and red flags (Reminder)
• Dark markets risk and red flags
• Dark markets risk and red flags (Case example)
• Mixers and tumblers risk and red flags
• Mixers and tumblers risk and red flags (Case example)

There are no prerequisites to this course. A basic level of financial crime prevention expertise is however an advantage.

Pass a 20-question final assessment to receive your certificate.

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?