Phone: +254 700 524589 | +254 782 524589 Email: [email protected]
CFF12 Fraud and Corruption scheme
By Traction SGB
Categories: Certified Forensic Fraud Examiner
About Course
UNIT DESCRIPTION
This paper is intended to equip the candidate with knowledge, skills and attitudes that will enable him/her to identify schemes and categories of fraud, the red flags and the preventive and detective measures and procedures related to the various fraud schemes.
LEARNING OUTCOMES
A candidate who passes this paper should be able to:
- Identify fraud schemes in fraudulent and corrupt activities
- Identify the red flags related to the specific fraud schemes
- Design and implement preventive and detective controls
- Identify the universal and specific risks related to the schemes
- Identify organizational and occupational fraud/corruption
Course Content
Course outline
-
Introduction
1. Fraud/Corruption Schemes
Definition of fraud
Definition of corruption
Occupational fraud
Organisation fraud/crime
The fraud tree
The red flags/indicators of fraud
Current trends of fraud schemes
Emerging fraud /corruption schemes
-
1.1 Definition of fraud
-
1.2 Definition of corruption
-
1.3 Occupational fraud
-
1.4.Organisation fraud/crime
00:00 -
1.5 The fraud tree
04:28 -
1.6. The red flags/indicators of fraud
00:00 -
1.7.Current trends of fraud schemes.
00:00 -
1.8. Emerging fraud /corruption schemes.
00:00 -
class recording 24th may23
02:00:00
2. Financial Statement Fraud
Definition of Financial Statement Fraud
Why Financial Statement fraud is committed
The cost of financial statement fraud
Types of financial statement fraud schemes
Trends in Financial Statement fraud
Red flags associated with financial statement fraud
Techniques of Detecting financial statement fraud
Financial statement analysis
Controls related to financial statement fraud
-
2.1.Definition of financial statement fraud.
00:00 -
2.2.Why financial statement fraud is committed
00:00 -
2.3.The cost of financial statement fraud
00:00 -
2.4.Types of financial statement fraud schemes.
00:00 -
2.6.Red flags associated with financial statement fraud.
00:00 -
2.7.Techniques of detecting financial statement fraud.
00:00 -
2.8.Financial statement analysis.
00:00 -
2.9.Controls related to financial statement fraud.
00:00 -
CLASS RECORDING 17 MAY 23
02:00:00
3. Asset Misappropriation
Definition of asset misappropriation
Types of asset misappropriation frauds
Cash receipts: Skimming, cash larceny and theft of cash on hand
Fraudulent disbursements: Register disbursement schemes, check tampering schemes, electronic payment tampering schemes, billing schemes, payroll and expense reimbursement schemes
Inventory and other assets: Misuse of inventory and theft
Misappropriation of intangible assets
Prevention of asset misappropriation schemes
-
3.1 Definition of asset misappropriation.
00:00 -
3.2 Type of asset misappropriation.
00:00 -
3.3 Cash receipts: skimming, cash larceny and theft of cash on hand.
00:00 -
3.4 Fraudulent disbursements:register disbursement schemes,check tampering schemes,electronic payment tampering schemes,billing schemes,payroll and expense reimbursement schemes.
00:00 -
3.5 Inventory and other assets: Misuse of inventory and theft.
00:00 -
3.6 Misappropriation of intangible assets.
00:00 -
Class recording 7 June 23
02:00:00 -
Class record 31 may 23
00:00 -
Class recording 14 June 23
02:00:00
4. Bribery and Corruption
Definition of bribery and corruption
Corruption schemes
Techniques of detecting bribery /corruption schemes
Methods of making corrupt payments
Prevention and detection of corruption
-
4.1 Definition of bribery and corruption
00:00 -
4.2 Corruption schemes
00:00 -
4.3 Techniques of detecting bribery/corruption schemes
00:00 -
4.4 Methods of making corrupt payments.
00:00 -
4.5 Prevention and detection of corruption
00:00
5. Theft of Data and Intellectual Property
Definition of theft of data and intellectual property
Types of data and intellectual property
Ways information is lost or stolen
Electronic counter-surveillance
Insider threats to propriety information
Methods of investigating corporate espionage
Programs for safeguarding proprietary information
Measures and procedures of minimizing theft of data and intellectual property
-
5.1 Definition of theft of data and intellectual property.
00:00 -
5.2 Types of data and intellectual property
00:00 -
5.3 Ways information is lost or stolen
00:00 -
5.4 Electronic counter surveillance
00:00 -
5.5 Insider threats to property information.
00:00 -
5.6 Methods of investigating corporate espionage
00:00 -
5.7 Programs for safeguarding proprietary information.
00:00 -
5.8 Measures and procedures of minimizing theft of data and intellectual property .
00:00 -
CLASS RECORDING 22 JUNE 23
02:00:00
6. Identity Theft
Definition of identity theft
Perpetrators of identity theft
Characteristics of victims of theft
Methods of committing identity theft
Types of identity theft schemes
Ways of stealing information
Responding to identity theft
Methods of preventing identity theft
-
6.1 Definition of identity theft.
00:00 -
6.2 Perpetrators of identity theft
00:00 -
6.3 Characteristics of victims of theft
00:00 -
6.4 Types of identity theft schemes
00:00 -
6.5 Ways of stealing information
00:00 -
6.6 Responding to identity theft
00:00 -
6.7 Methods of preventing identity theft
00:00 -
class recording 5 July 23
02:00:00
7. Contract and Procurement Fraud
Definition of contract and procurement fraud
Methods of procurement
Stages/phases in procurement process
Categories of procurement fraud schemes
Preventing and detection of contract and procurement fraud
-
7.1 Definition of contract and procurement fraud
00:00 -
7.1 Definition of contract and procurement fraud- PART 2
00:00 -
7.2 Methods of procurement
00:00 -
7.3 stages/phases in procurement process
00:00 -
7.4 Categories of procurement fraud scheme.
00:00 -
7.5 Preventing and detection of contract and procurement fraud.
00:00 -
LESSON 26 JULY 23
02:00:00
8. Computer and Internet Fraud/Cyber Crime
Definition of computer and internet fraud
Definition of Cyber Crime
Types of computer and internet/Cyber fraud:
Electronic Commerce and information Security
Prevention, detection of computer and internet/Cyber Crime
Computer/Cyber Security
-
8.1 Definition computer and internet fraud/cyber crime.
00:00 -
8.2 Definition of cyber crime.
00:00 -
8.3 Types of computer and internet/cyber fraud.
00:00 -
8.4 Electronic commerce and information security.
00:00 -
8.5 Prevention ,detection of computer and internet/cybercrime.
00:00 -
8.6 Computer/cyber security
00:00
9. Financial Institution Fraud
Definition of financial Institution fraud
Types of financial institution frauds
Prevention and detection of financial institution frauds:
Financial Action Task Force and money laundering and Terrorist
Basel committee on banking supervision recommendation
-
9.1 Definition of financial institution fraud
00:00 -
9.2 Types of financial institution fraud
00:00 -
9.3 Prevention and detection of financial institution frauds
00:00 -
9.4 Financial Action Task Force and money laundering and terrorist
00:00 -
9.5 Basel committee on banking supervision recommendations
00:00
10. Payment System Fraud Schemes
Definition of payment system fraud
Types of payment system and the fraud schemes
Prevention and detection of payment system fraud schemes
-
10.1 Definition of payment system fraud
00:00 -
10.2 Types of payment system and the fraud schemes
00:00 -
10.3 Prevention and detection of payment system fraud schemes
00:00 -
31 may recordings on payment fraud
02:00:00
11. Insurance and Health Fraud
Definition of insurance fraud
Insurance fraud schemes
Prevention and detection of insurance fraud
Definition of Health care fraud
Health care fraud schemes
Prevention and detection of health care fraud
-
11.1 Definition of insurance fraud
00:00 -
11.2 Insurance fraud schemes
00:00 -
11.3 Prevention and detection of insurance fraud
00:00 -
11.4 Definition of health care fraud
00:00 -
11.5 Prevention and detection of healthcare fraud
00:00 -
CLASS RECORDING 12 JULY 23
02:00:00
12. Consumer Fraud
Investment fraud schemes
Telemarketing fraud schemes
Confidence games fraud schemes
-
12.1 Investment fraud schemes
00:00 -
12.2 Telemarketing fraud schemes
00:00 -
12.3 Confidence games fraud schemes
00:00 -
class recording 19 july 23
02:00:00
13. Case Study – Occupational and Organisational Crimes
Identify the asset misappropriation and corruption schemes
Identify the health care fraud schemes
Identify the red flags
Identify the preventive and detective control gaps that were present when the fraud occurred
-
CASE STUDY
00:00
Student Ratings & Reviews
No Review Yet