Combating Computer Fraud


Any fraud committed with the aid of, or directly involving a computer or network is considered computer fraud. It’s no wonder then that in today’s highly automated business environment, foiling computer-based fraud has become a top priority as skilled computer experts, international criminal organizations, and even seemingly honest employees steal identities, re-route data for personal gain, and alter data for fraudulent purposes…all with far reaching and costly consequences.

Why attend this course?

  • Examine the key risks surrounding computer-based fraud
  • Explore the “who, what, and how”
  • Investigate specific IT controls that must be in place to reduce the risk of computer fraud, including logical access controls, reduced privileged access, application change management, network controls, encryption, and application system controls
  • Benefit from real-life examples of controls’ effectiveness
  • Review a range of fraud studies with control recommendations from sources including the Association of Certified Fraud Examiners


Further information

ACI Learning
ACI Learning
3 Days
Scheduled dates
Course type:
Amsterdam, Atlanta, GA, Bandar Seri Begawan, Boston, MA, Burlington, MA, Cape Town, Charlotte, NC, Chicago, IL, Dallas, TX, Denver, CO, Dubai, Dublin, Dublin, OH, Hong Kong, Houston, TX, Las Vegas, NV, London, Manila, New York, NY, Oman, Orlando, FL, Philadelphia, PA, San Antonio, San Diego, CA, San Francisco, CA, Seattle, WA, Singapore, Virtual Training Room Only, Washington, DC

Contact Information

ACI Learning

6855 S. Havana St.
Suite 230
80112 USA