Combating Computer Fraud

Description

Any fraud committed with the aid of, or directly involving a computer or network is considered computer fraud. It’s no wonder then that in today’s highly automated business environment, foiling computer-based fraud has become a top priority as skilled computer experts, international criminal organizations, and even seemingly honest employees steal identities, re-route data for personal gain, and alter data for fraudulent purposes…all with far reaching and costly consequences.

Why attend this course?

  • Examine the key risks surrounding computer-based fraud
  • Explore the “who, what, and how”
  • Investigate specific IT controls that must be in place to reduce the risk of computer fraud, including logical access controls, reduced privileged access, application change management, network controls, encryption, and application system controls
  • Benefit from real-life examples of controls’ effectiveness
  • Review a range of fraud studies with control recommendations from sources including the Association of Certified Fraud Examiners

 

Further information

MIS Training Institute
Provider:
MIS Training Institute
Duration:
3 Days
Price:
POA
Availability:
Scheduled dates
Course type:
Classroom
Locations:
Amsterdam, Atlanta, GA, Bandar Seri Begawan, Boston, MA, Burlington, MA, Cape Town, Charlotte, NC, Chicago, IL, Dallas, TX, Denver, CO, Dubai, Dublin, Dublin, OH, Hong Kong, Houston, TX, Las Vegas, NV, London, Manila, New York, NY, Oman, Orlando, FL, Philadelphia, PA, San Diego, CA, San Francisco, CA, Seattle, WA, Singapore, Virtual Training Room Only, Washington, DC

Contact Information

MIS Training Institute

153 Cordaville Road
Suite 200
Southborough
01772 USA

Credentials

Locations