How to Detect and Mitigate Phishing Threats

Chargeback Representment
This course discusses how information used for phishing may be ascertained and the high risk activity fraudsters or bots may display, including the application of techniques, technologies and third party services related to phishing, spear phishing and associated risks.

This is an intermediate level course that requires existing knowledge of eComerce Fraud Fundamentals.

This is a new course released in January, 2019. It is offered in HTML5 and is compatible with all mobile devices.

  • Course synopsis. Organizations have to worry about phishing on two fronts: Both Spear Phishing, or targeted attacks intended to gain access to their data or systems, and Phishing targeted against their users or customers. This course defines and discusses phishing and related activities while applying examples and providing discussion around the detection, prevention, containment and remediation of phishing, spear phishing, email harvesting and bot activity.
  • This course applies The Fraud Practice's Four Pillars of Risk Management with specific examples for phishing and spear phishing.
  • what can you expect to get out of this course? After completing this course students should be able to answer questions such as: (1) What are the 4 Pillars of Risk Management and how do they apply to phishing and spear phishing? (2) What are some of the techniques and technologies used in the Customer Not Present (CNP) channel to thwart phishing and related activity? (3) What are Pharming and Email Harvesting? (4) What steps should an organization take to contain and remediate a spear phishing campaign targeting them?
  • Training Objectives: (1) Be familiar with types phishing attacks and related activity to include spear phishing, email harvesting and bots. (2) Know the four pillars of risk management and how they relate to phishing. (3) Be able to discuss applications and examples of detecting and preventing phishing and related activities. (4) Be able to discuss applications and examples of containing and remediating phishing and related activities.
  • Expected time to complete the course: 90-120 minutes (includes session tests and final exam).
  • Pricing & Online enrolment. Take this course online for only $300 by enrolling now.Register Button
  • we want 100% customer satisfaction. There is nothing worse than signing up for training only to find out that it wasn't on the topic you expected, or it wasn't advanced enough to provide value. If you have any doubt about the fit of a course to your particular needs, please give us a call. We will be happy to discuss the course, and to provide a more detailed overview on the content to ensure you make the most of your training dollars and time.
  • fraudblog newsletter. Do you want to be the first to know about new training courses becoming available? If so you should subscribe to our free Fraudblog Newsletter.
Subscribe to our newsletter

did you
know

why should you consider becoming a certified ecommerce executive?

Fraud is a part of doing business, but if you are doing business online, or via the telephone, the risk for fraud is exponentially higher; and stopping it is exponentially more difficult. Regardless if you are a small business owner with a staff that consists of yourself; or a senior executive for a large corporation with a dedicated staff to manage fraud; you need to understand how online payments work and the fraud exposure and risk your company will have to manage to maintain strong profits.

Doing business online today means you need to be prepared to navigate the eCommerce fraud landscape. The eCommerce fraud landscape can be difficult if you don’t have a good understanding of the underlying terminology, lingo and technology that is available. The eCommerce channel is still relatively young, and everyone from your peers to solution providers, from associations to the media will be trying to tell you they know how to prevent fraud in your business better than you do. The reality is, what you hear will typically only represent partial pictures. For example, most merchants just starting to do business online believe they will be protected from fraud by the tools offered from the card associations. The reality is, while these tools provide some protection they will not be enough to prevent fraud from occurring.

read more

The Fraud Practice

 

program overview

      • SCORM compliant
      • Available 24x7
      • Practice quizzes, progress tracking
      • Final Exams
      • Certificates of completion
      • Fast reliable online presentation
      • Easy to use and understand
        • Courses are broken down into 10 to 20 minute lessons to make it easier to find the time to complete the lessons with a busy schedule

 

trainingcourses

  • Account Takeover ATO RiskRead MoreUnderstanding & Mitigating Account Takeover Risk.

    Provides the information to help organizations understand account takeover risk and their ATO risk exposure including by the discussing the policies, procedures and third party tools that can be used to recognize account takeover fraud.

  • Build Manage Risk TeamsRead MoreBuild and Manage Highly Effective Fraud Teams.

    Provides a detailed approach to managing fraud and security teams with examples and applications of two different ways of defining and describing how risk management leadership is actually applied.

  • Read Moreecommerce buyer fraud signals.

    Outlines many different signals that high risk buyers may show looking at factors such as their account activity, profile data, behaviour and other signals that can be seen when using different anti-fraud tools.

  • Read Moreecommerce fraud: moving from tools to solutions.

    This session covers what constitutes a fraud solution and categorizes the many types of third party fraud tools. The course outlines the common terminology of fraud solutions and describes the capabilities needed to implement a fraud solution.

  • Read Moreintroduction to eidentity authentication and verification.

    Establishes a baseline understanding of the components that make up a consumer identity when transacting or making application from an online or telephone channel.

  • Read Morefundamentals for understanding geolocation & device identification.

    Covers the use cases and methods for integrating and making use of geolocation data and device identification in a fraud strategy.

  • Read Moreoverview of ecommerce fraud prevention techniques.

    A core curriculum course providing an introduction to 30 plus fraud prevention techniques; what they are, high level discussion on how to employ them and big picture considerations for using them.