• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

97 Internal Controls courses delivered Online

Certified Information Systems Auditor (CISA) - Complete Video Course

4.3(43)

By John Academy

Description: This Certified Information Systems Auditor (CISA) - Complete Video Course will provide you with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate your skill set. This course will immerse you into the subject, with in-depth coverage of the information covering the five domains that make up the 'Body of Knowledge' for the CISA exam and will provide you the tools to build your technical skills to develop, manage, and perform IT security audits. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. So, enhance your career by earning CISA - world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business system Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Auditor (CISA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Auditor (CISA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Mock Exam Mock Exam- Certified Information Systems Auditor (CISA) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Systems Auditor (CISA) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Auditor (CISA) - Complete Video Course
Delivered Online On Demand17 hours 32 minutes
£24

Fraud Detection & Prevention: Essential Tactics

4.3(43)

By John Academy

Master the essential tactics of Fraud Detection & Prevention with our comprehensive course. Explore diverse topics such as Banking Frauds, Cyber Fraud, and Bribery Prevention. Acquire skills in risk management, internal controls, and legal compliance. Safeguard your organization with expert knowledge in fraud investigation and response. Join now to become a proactive defender against financial crime.

Fraud Detection & Prevention: Essential Tactics
Delivered Online On Demand
£23.99

Certified Information Systems Professional - Complete Video Training

4.3(43)

By John Academy

Description: A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field. Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc. In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Information Systems Security Officer Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Information Systems Security Professional Security and Risk Management FREE 00:24:00 Asset Security 00:12:00 Security Engineering 00:15:00 Communication and Network Security 00:10:00 Identity and Access Management 00:10:00 Security Assessment and Testing 00:12:00 Security Operations 00:36:00 Software Development Security 00:13:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Professional - Complete Video Training
Delivered Online On Demand48 hours
£22

Auditing and Internal Control

5.0(10)

By GBA Corporate

Overview Internal control, as defined by accounting and auditing, is a process for assuring an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing.  This course will feed you with all the skills required to have a good Internal Management process it is important to analyse Risk Management to see if the process is working efficiently and measures the effectiveness of controls put in place to alleviate risks. 

Auditing and Internal Control
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Risk Management, Corporate Governance and Compliance

5.0(10)

By GBA Corporate

Overview This training course is structured around the ISO 31000:2009 framework, principles and processes. It will also demonstrate how to develop internal control mechanisms and explain how to measure risk in terms of probability and potential impact, at the same time as ensuring that the organisation complies with increasingly strict international standards of corporate governance.

Risk Management, Corporate Governance and Compliance
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Management of Risk (M_o_R) Foundation: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Foundation: In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Management of Risk (M_o_R) Practitioner: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Practitioner: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Management of Risk (M_o_R) Foundation: Virtual In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Foundation: Virtual In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Management of Risk (M_o_R) Practitioner: Virtual In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Practitioner: Virtual In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Practitioner: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Certificate in KYC and Customer Due Diligence

5.0(4)

By LGCA | London Governance and Compliance Academy

Boost your customer service, administrative, and back-office skills by getting certified in KYC and CDD by AGRC! This certificate will provide you with the tools and knowledge required to become an invaluable member of any institution’s client onboarding and customer retention process. A key concern and significant risk for financial institutions remain the possibility of unknowingly becoming complicit in money laundering actions, where illegitimate money is moved into legitimate institutions. In order to mitigate such risk, FIs have strengthened their internal control systems by increasingly making use of Know Your Customer (KYC) and Customer Due Diligence (CDD) requirements, as part of their anti-money laundering (AML) strategies. Study method Distance learning, self-paced Duration 25 hours Access to content 360 days Certification Certificate in Know Your Customer & Customer Due Diligence Additional info Exam(s) / assessment(s) is included in price Description About the Certificate KYC/CDD is a critical element for effectively managing the risks posed by potential clients (thus protecting the organization against criminals, terrorists, and Politically Exposed Persons (PEPs) who might present a higher risk) and possible dubious actions by existing customers that need to be regularly reassessed. This certificate course provides essential knowledge for KYC and CDD procedures which are key tools in assessing customer risk and a legal requirement to comply with Anti-Money Laundering (AML) and Counter-Terrorist Financing (CFT) laws. Effective KYC/CDD involves knowing a customer’s identity and their financial activities, ongoing monitoring of business activities, and identifying and mitigating the AML/CFT risk a business relationship may pose on the regulated entity. Expected Learning Outcomes • Understand the importance of adopting effective KYC/CDD policies and procedures in a regulated entity • Review international guidance on the essential elements of KYC standards and the applicable regulatory framework • Have the ability to establish and maintain a solid KYC/CDD programme • Successfully assess the different levels of KYC/CDD that can be applied by an entity • Efficiently deal with higher risk situations and cases in an effective manner • Have a practical perspective on the adverse effects that can result from lack of efficient KYC/CDD procedures Topics covered • An introduction to KYC/Customer Due Diligence (CDD) • The value of Customer Due Diligence (CDD) • CDD: Establishing and maintaining a strong CDD programme • CDD in higher risk situations and record keeping requirements • AML Case Studies Format • Register at any time for this online, open Certificate • Study in your own time and at your own pace (you have up to 3 months to complete) • Assessed by online multiple-choice exam What is included • 25 hours of self-paced online interactive learning including analysis of 7 practical case studies • 1-year free AGRC membership • Online Exam and AGRC Certificate Who is this course for? This course is addressed to all individuals who practice KYC, CDD as well as Anti-Money Laundering such as Compliance/AML Managers in Banks, Investment Firms, Investment Funds, Trust Service Corporate Providers and Lawyers. Requirements No previous knowledge or experience is required though it is assumed that participants have good knowledge of English and sound educational background Career path Head of Back Office, Head of Customer Support, Compliance Assistant, Compliance Officer, AML Officer, MLRO.

Certificate in KYC and Customer Due Diligence
Delivered Online On Demand
£650