Course Description for Payment Systems and Risks (STREAM Technology Lab)

Size: px
Start display at page:

Download "Course Description for Payment Systems and Risks (STREAM Technology Lab)"

Transcription

1 Federal Reserve Board of Governors Course Description for Payment Systems and Risks (STREAM Technology Lab) Last Revised: November 2013 Version: 1.1

2 S&R STREAM Technology Lab The Board of Governors of the Federal Reserve System is proud to offer technology-related courses developed and hosted by the S.T.R.E.A.M./Technology Lab at the Federal Reserve Bank of Chicago, Chicago, Illinois. For over fourteen years, the S.T.R.E.A.M./Technology Lab has provided unique value in examiner training by combining lectures with hands-on exercises. The exercises reinforce concepts by allowing participants to interact with various application software and/or operating systems. Each participant has a dedicated PC in the state-of-the-art classroom, while the lab is outfitted with many vendor applications, operating systems, and security appliances widely used in the financial industry. Type of Participant Targeted The course will be of interest to safety-and-soundness examiners or IT examiners to conduct payment systems exams in a bank or payment service provider. Prerequisites None. Course Overview The goal of this five-day Payment Systems and Risks course is to introduce key components and key players in the payment domain, explain various channels, networks and systems in the electronic payment systems, discuss how to conduct risk-focus exam on these payment systems based on exam guidelines, and share insights on the future payment evolution. It also gives participants hands-on training on the technology of Remote Deposit Capture (RDC) and demonstrates back office operation of money transfer in a simulated bank environment. The class offers a combination of lectures, case studies, instructor demonstrations, and handson labs. This course offers Continuing Professional Education (CPE) credits. 2 P a g e

3 Course Objectives Upon completion of this course, the participant, at a minimum, will be able to demonstrate the following skills: Define key components and key players in the payment industry; Describe, at a high level, the various payment channels, networks and systems; Describe the risks, mediations and controls related to various payment types, payment channels and systems; Identify key principles based on exam guidelines; Conduct risk-focused payment system exam. Post-Course Intervention To reinforce learning after the class, participants should be assigned to complete at least one payment exam for a bank or a payment service provider. Overview of Class Curriculum Class Introduction, Class hours How does Money Flow, Class hours Payment Videos, Class hours RDC Overview and RDC Work Program, Class hours RDC Hands-on Labs, Class hours Financial Market Utility and Wholesale Payment Networks,Classhours- 2.5 Retail Payment Networks, Class hours Wire Transfer and ACH Examination, Class hours Payment Service Provider Supervision, Class hours Payment Supervision among Regulators, Class hours Mobile Banking and Mobile Payment, Class hours Cyber Security and Threats, Class hours PASS - Payment Exam Data Analysis and ExamScope,Classhours- 2.0 Virtual Currency and Risk Watch, Class hours Class Review and Panel Discussion, Class hours Total Lecture & Exercise Hours - 28 * Course offers CPE credits through NASBA. Learning Objectives 3 P a g e

4 Participants develop a solid understanding of p a y m e n t systems, conduct p a y m e n t system risk a s s e s s m e n t a n d e x a m b a s e d on FFIEC's related guidance a n d w o r k program through the following modules. B y m o d u l e, the following learning objectives will be a c c o m p l i s h e d : H o w d o e s M o n e y F l o w Module Discuss purposes a n d functions of p a y m e n t s y s t e m s Identify key players, key c o m p o n e n t s a n d key processes in the m o n e y transfer Discuss, at a high level, the laws a n d regulations on various p a y m e n t systems. R D C O v e r v i e w a n d R D C W o r k P r o g r a m Module N a m e the technology c o m p o n e n t s n e e d e d to facilitate R D C. Discuss areas of potential security w e a k n e s s in a network architecture that includes R D C. List technological controls that should be in place in a typical R D C implementation. R D C H a n d s - o n L a b s Module Discuss major c o m p o n e n t s that should be a part of the R D C risk m a n a g e m e n t process. Explain the segregation of duties that should be in place at both the m e r c h a n t a n d the b a n k which offers R D C services. Discuss the reporting a n d monitoring practices which b a n k m a n a g e m e n t should maintain over R D C services Learning Retail objectives P a yfrom m eparticipants n t N eperspective: t w o r k s Module Explain the card network c o m p o n e n t s Explain card products, such as credit card, debit card, prepaid card, gift card, etc. Discuss operational risks, such as credit risk a n d possible market risk in the products Elaborate PCI D S S risk m a n a g e m e n t guidance on card network a n d m e r c h a n t W i r e T r a n s f e r a n d A C H E x a m i n a t i o n Module Perceive the w o r k program a n d e x a m guideline on W i r e Transfer e x a m a n d A C H e x a m C o n d u c t e x a m on fed wire a n d A C H F i n a n c i a l M a r k e t Utility a n d W h o l e s a l e P a y m e n t N e t w o r k s Module Describe functions of financial market utility ( F M U ) Illustrate potential operational risks associated with F M U, i.e. credit risk, market risk, liquidity risk, etc. Evaluate the risk m a n a g e m e n t practices to mitigate the risks during the e x a m Understand the functions of w h o l e sale p a y m e n t networks Describe m a i n players in the wholesale p a y m e n t 4 P a g e

5 Evaluate a n d e x a m p a y m e n t network P a y m e n t E x a m D a t a A n a l y s i s a n d E x a m S c o p i n g ( P A S S T o o l ) Module P a y m e n t S e r v i c e P r o v i d e r S u p e r v i s i o n Module Learn to use P A S S to gather p a y m e n t e x a m data S c o p e the e x a m b a s e d on data analysis Understand functions of p a y m e n t service provider Describe impacts of p a y m e n t service providers Explain e x a m focus on the p a y m e n t service provider P a y m e n t S u p e r v i s i o n a m o n g R e g u l a t o r s Module Describe c o m m o n F F I E C guidelines on p a y m e n t e x a m C o m p a r e a n d contrast various e x a m guidelines, Advisory Letters from different regulators on p a y m e n t e x a m M o b i l e B a n k i n g a n d M o b i l e Discover various mobile p a y m e n t channels a n d P a y m e n t Module their impact on e n d users Identify potential risk exposure a n d challenges Evaluate risk controls to support mobile banking a n d mobile p a y m e n t C y b e r S e c u r i t y a n d T h r e a t s Module O b s e r v e cyber security trends Identify cyber-attack impacts on FI p a y m e n t s y s t e m s R e c o g n i z e cyber threat impacts on individual c o n s u m e r V i r t u a l C u r r e n c y a n d R i s k W a t c h Module Discover the world of virtual currency Elucidate h o w the virtual currency interact with real m o n e y or real transaction Evaluate potential risks C l a s s S i z e T h e optimal class size for the class is approximately 2 0 participants. T o provide sufficient variety of interaction a m o n g class participants, the m i n i m u m class size should be 5 participants. I n s t r u c t o r s T h e P a y m e n t S y s t e m s a n d Risks course is conducted a n d supported by a group of professionals, including s e a s o n e d examiners, technology architects, a n d p a y m e n t e x a m analysts. Content for the class w a s developed a n d updated by the instructor t e a m b a s e d on their latest e x a m experience a n d p a y m e n t research. 5 P a g e

Course Description for Bank Operations Simulation (S&R Technology Lab)

Course Description for Bank Operations Simulation (S&R Technology Lab) Federal Reserve Board of Governors Course Description for Bank Operations Simulation (S&R Technology Lab) Last Revised: June 2009 [Page Break] STREAM Supervision Technology Risks Educate, Analyze and Manage

More information

Course Description for Operating Systems Hands-On (S&R Technology Lab)

Course Description for Operating Systems Hands-On (S&R Technology Lab) Federal Reserve Board of Governors Course Description for Operating Systems Hands-On (S&R Technology Lab) Last Revised: November 2009 Supervision Technology Risks Educate, Analyze and Manage Federal Reserve

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs 1 Contact us for more information +1 (800) 214 6371- USA +31 (10)

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool

ICBA Summary of FFIEC Cybersecurity Assessment Tool ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

T r i t o n C o l l e g e Assessment Planning and Reporting Tool ACADEMIC PROGRAMS

T r i t o n C o l l e g e Assessment Planning and Reporting Tool ACADEMIC PROGRAMS Assessment Plan # 1 Academic Year: 2012-2013 Completion Status: Completed / updated on: Ensure accurate curriculum for Emergency Program Curriculum of EMP 121 and 1. Course objectives, class time, description

More information

Training Course ECSA/LPT

Training Course ECSA/LPT Brochure More information from http://www.researchandmarkets.com/reports/2226534/ Training Course ECSA/LPT Description: The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration

More information

IT courses For Senior Managers

IT courses For Senior Managers Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Background. Scope. Organizational Training Needs

Background. Scope. Organizational Training Needs 1 Training Plan Template As described in Section 4.2.1 of the Training Effectiveness Toolkit, a Training Plan will help define the specific activities that will be conducted to carry out the training strategy.

More information

Creating Online Faculty Training Modules to Support Continuous Quality Improvement

Creating Online Faculty Training Modules to Support Continuous Quality Improvement Creating Online Faculty Training Modules to Support Continuous Quality Improvement Dr. Anthony Trippe, RIT faculty [email protected] Karen Vignare, Sr. Research Analyst [email protected]

More information

ITIL 2011 Service Design Certification Program - 3 Days

ITIL 2011 Service Design Certification Program - 3 Days ITIL 2011 Service Design Certification Program - 3 Days Program Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for Information Technology Services Management

More information

MASTER OF. Computer Information Systems MCIS

MASTER OF. Computer Information Systems MCIS MASTER OF Computer Information Systems MCIS Leaders in CIS Education for More Than 50 Years Established in 1962, the CIS program at Colorado State University s College of Business is one of the oldest

More information

behavioural intervention & autism support programming UNIVERSITY OF NEW BRUNSWICK LESSEN THE IMPACT WITH EVIDENCE-BASED PRACTICES

behavioural intervention & autism support programming UNIVERSITY OF NEW BRUNSWICK LESSEN THE IMPACT WITH EVIDENCE-BASED PRACTICES UNIVERSITY OF NEW BRUNSWICK behavioural intervention & autism support programming LESSEN THE IMPACT WITH EVIDENCE-BASED PRACTICES www.unb.ca/cel/intervention together we can MAKE A DIFFERENCE There is

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Designing a Windows Server 2008 Active Directory Infrastructure and Services Designing a Windows Server 2008 Active Directory Infrastructure and Services Course No. 6436 5 Days Instructor-led, Hands-on Introduction At the end of this five-day course, students will learn how to

More information

www.siemens.com/learningcloud Training Catalog

www.siemens.com/learningcloud Training Catalog www.siemens.com/learningcloud Training Catalog Siemens Power Academy Energy Management Software 1 Table of Contents Product Training Focus EnergyIP Platform Smart Grid Applications Data Analytics Adapters

More information

Going All In on Board Reporting

Going All In on Board Reporting Going All In on Board Reporting February 13, 2014 10:15 A.M to 11:15 A.M. Tony DaSilva, AAP, CISA Senior Examiner, Federal Reserve Bank of Atlanta Rajiv Donde President, Laru Technologies Peter Davey,

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

NetAcad Supplemental Courses

NetAcad Supplemental Courses NetAcad Supplemental Courses Marc Khayat, CCIE #41288 [email protected] 6.3.2016 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Community Partners Instructor-led and self-paced

More information

A Cautionary Tale Plus Cross-Channel Risk

A Cautionary Tale Plus Cross-Channel Risk Dan Tobin A Cautionary Tale Plus Cross-Channel Risk IT Examiner Supervision, Regulation & Credit [email protected] Agenda A Cautionary Tale Shames-Yeakel v. Citizens Financial Bank Cross-Channel Risk

More information

ITIL V3 Service Operation Certification Program

ITIL V3 Service Operation Certification Program ITIL V3 Service Operation Certification Program 3 Days Program Overview The ITIL Intermediate Qualification: Service Operation (SO) Certificate, although a stand alone qualification, yet is also part of

More information

Product Training Schedule. January - June 2009. (C) Classroom Training Courses (W) Instructor-Led Group Training Webinars (O) Online Training Courses

Product Training Schedule. January - June 2009. (C) Classroom Training Courses (W) Instructor-Led Group Training Webinars (O) Online Training Courses Product Training Schedule January - June 2009 Three Ways to Take Advantage of IPS-Sendero Training: Classroom Training Courses (C) These courses offer traditional classroom-style instruction led by IPS-Sendero

More information

Training Course 70-432 SQL Server 2008 Implementation and Maintenance

Training Course 70-432 SQL Server 2008 Implementation and Maintenance Brochure More information from http://www.researchandmarkets.com/reports/2226526/ Training Course 70-432 SQL Server 2008 Implementation and Maintenance Description: This course provides you with the knowledge

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

Solution Training. Financial Risk Management and Financial Performance Management

Solution Training. Financial Risk Management and Financial Performance Management Solution Training Financial Risk Management and Financial Performance Management July December 2013 Three Ways to Take Advantage of Training from Fiserv: Classroom Training Courses (C) These courses offer

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

AURORA Vulnerability Background

AURORA Vulnerability Background AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History

More information

ITIL V3 Service Design Certification Program 3 Days

ITIL V3 Service Design Certification Program 3 Days ITIL V3 Service Design Certification Program 3 Days Program Overview The ITIL Intermediate Qualification: Service Design Certificate is a free-standing qualification, but is also part of the ITIL Intermediate

More information

Computer Science Course Descriptions Page 1

Computer Science Course Descriptions Page 1 CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,

More information

Cisco Discovery 1: Networking for Home and Small Business (ITCC 1310)

Cisco Discovery 1: Networking for Home and Small Business (ITCC 1310) Cisco Discovery 1: Networking for Home and Small Business (ITCC 1310) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description This introductory

More information

Instructional Design and Technology Professional Core Courses Instructional Design and Technology Core Courses & Descriptions

Instructional Design and Technology Professional Core Courses Instructional Design and Technology Core Courses & Descriptions Search Home Instructional Design and Technology Professional Core Courses Instructional Design and Technology Core Courses & Descriptions Note: The degree is usually completed entirely online, unless other

More information

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC Enterprise Risk Management Process Improvement 2 Contact Information Contact Information Chad Knutson Senior Information Security Consultant CISSP, CISA, CRISC Phone: 605-480-3366 [email protected]

More information

INTERMEDIATE QUALIFICATION

INTERMEDIATE QUALIFICATION PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE LIFECYCLE SERVICE DESIGN CERTIFICATE SYLLABUS Page 2 of 18 Contents SERVICE DESIGN CERTIFICATE 4 Target Candidate 4 Prerequisite Entry

More information

New Course Proposal OSC 4810, Supply Chain and Logistics Management

New Course Proposal OSC 4810, Supply Chain and Logistics Management Agenda Item #15-49 Effective Fall 2015 Eastern Illinois University Initial Term of Offering: Spring 2016 New Course Proposal OSC 4810, Supply Chain and Logistics Management Banner/Catalog Information (Coversheet)

More information

Presentation on COBIT Education

Presentation on COBIT Education http://www.itpreneurs.com Presentation on COBIT Education Mastering COBIT with effective learning solutions Arjan Woertman ITpreneurs This COBIT product suite includes COBIT 4.0, which is used by permission

More information

National Check Payments Certification. Fraud, Risk, and Risk Mitigation Part II. Copyright 2015 by the Electronic Check Clearing House Organization

National Check Payments Certification. Fraud, Risk, and Risk Mitigation Part II. Copyright 2015 by the Electronic Check Clearing House Organization NCP 2016 Exam Cycle Core Training Series Session 11 National Check Payments Certification Fraud, Risk, and Risk Mitigation Part II Copyright 2015 by the Electronic Check Clearing House Organization NOTICES

More information

Financial Training 2016 COURSE CATALOG. in the Energy Sector. Use code Energy2016 and save $200 on any live, in-person training course

Financial Training 2016 COURSE CATALOG. in the Energy Sector. Use code Energy2016 and save $200 on any live, in-person training course Financial Training in the Energy Sector center.snl.com/energy Use code Energy2016 and save $200 on any live, in-person training course 2016 COURSE CATALOG ESSENTIAL KNOWLEDGE FOR A UNIQUE INDUSTRY The

More information

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School Management School MSc/PG Dip/PG Cert International Accounting & Finance University of Stirling Management School Globalisation, growth of multinational enterprises, convergence of international accounting

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Seneca Valley Senior High School Cyber Teacher Center (across from the SHS Library on the 2 nd floor)

Seneca Valley Senior High School Cyber Teacher Center (across from the SHS Library on the 2 nd floor) Course Game Design Modding and Prototyping Faculty Name Mr. Ken Macek Term 2015-2016 Meetings IHS Library Gaming Room (semester course two 42 minute periods combined with online instruction) Faculty s

More information

www.allegrodev.com/allegro-u Training & Certification Allegro University

www.allegrodev.com/allegro-u Training & Certification Allegro University www.allegrodev.com/allegro-u Training & Certification Allegro University Two Types of Training Available Allegro training is available in a variety of training formats to provide students with flexible

More information

Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015

Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015 Maryland Preparedness Planning Certificate Program Pilot 2014 2015 Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015 A Center for Preparedness Excellence A Center for

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Technical Courses. Course Catalog

Technical Courses. Course Catalog COMPUTER INSTITUTE Technical Courses Course Catalog Copyright 1983, Computer Institute Volume September 23, 2009 1335 Rockville Pike Rockville, MD 20852 WWW.TRAINUS.COM (301) 424-0044 TABLE OF CONTENTS

More information

What to Expect in Accelerated BSN Nursing School

What to Expect in Accelerated BSN Nursing School What to Expect in Accelerated BSN Nursing School RN Licensure Prep Skills Lab Practice Online Theory Classes Clinical Placements Get answers to the following questions: What is the Accelerated BSN Nursing

More information

Big Data and Social Analytics certificate course

Big Data and Social Analytics certificate course MASSACHUSETTS INSTITUTE OF TECHNOLOGY Big Data and Social Analytics certificate course Online and part-time PAGE 1 Massachusetts Institute of Technology School of Architecture + Planning Ninety percent

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT Project management has a direct impact on an organization s strategic success, so it s not surprising that the project management process has

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Salem Community College Course Syllabus. Section I. Course Title: Principles Of Marketing. Course Code: BUS212

Salem Community College Course Syllabus. Section I. Course Title: Principles Of Marketing. Course Code: BUS212 Salem Community College Course Syllabus Section I Course Title: Principles Of Marketing Course Code: BUS212 Lecture Hours: 3 Lab Hours: 0 Credits: 3 Course Description: This course examines the business

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

Government Crime Prevention Regulations. Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta

Government Crime Prevention Regulations. Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta Government Crime Prevention Regulations Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta The Big Disclaimers The views expressed in this presentation are those

More information

CWNA Instructor Led Course Outline

CWNA Instructor Led Course Outline CWNA Instructor Led Course Outline Enterprise Wi-Fi Administration, Outline v7.0 Introduction The Enterprise Wireless LAN Administration 7.1 course (which prepares students for the CWNA-106 exam), whether

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

CCNA Networking for Home and Small Business (Discovery 1)

CCNA Networking for Home and Small Business (Discovery 1) Unit 101: CCNA Networking for Home and Small Business (Discovery 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose M/601/6840 BTEC in IT This unit teaches students the

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

IT and Cyber Security Training Courses

IT and Cyber Security Training Courses AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security

More information

Davis Applied Technology College Curriculum Development Policy and Procedures Training Division

Davis Applied Technology College Curriculum Development Policy and Procedures Training Division Davis Applied Technology College Curriculum Development Policy and Procedures Training Division Board Approval: 24 April 2008 1. Purpose 1.1. Curriculum development at the Davis Applied Technology College

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

LoneStar College Tomball Cisco Networking Academy

LoneStar College Tomball Cisco Networking Academy LoneStar College Tomball Cisco Networking Academy (To Navigate from Outline to contents hold ctrl key down and then select outline item by clicking with mouse. To return to outline press Ctrl Home) What

More information

Training Course CompTIA A+

Training Course CompTIA A+ Brochure More information from http://www.researchandmarkets.com/reports/2226574/ Training Course CompTIA A+ Description: CompTIA A+ Essentials & Practical Application teaches students the competence in

More information

White paper. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal

White paper. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal White paper Focus on value added services by network companies a paradigm shift Rahul Kaushal, Ramakant Mittal Introduction Network association is the most critical player in the payment card industry.

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

ITIL v3 Qualification Scheme

ITIL v3 Qualification Scheme ITIL v3 Qualification Scheme ITIL Version 3 Qualification Scheme diagram Key for the Intermediate modules: Lifecycle modules SS Service Strategy SD Service Delivery ST Service Transition SO Service Operation

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

Course Descriptions. CS 101 Intro to Computer Science

Course Descriptions. CS 101 Intro to Computer Science Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. EMC ACADEMIC ALLIANCE EMC collaborates with colleges and universities worldwide

More information

Your Global Partner Providing Leading Technology to Manage and Streamline Your Payments System

Your Global Partner Providing Leading Technology to Manage and Streamline Your Payments System Your Global Partner Providing Leading Technology to Manage and Streamline Your Payments System A GLOBAL PROVIDER THAT SUPPORTS ALL OF YOUR PAYMENT PROCESSING NEEDS Euronet Worldwide, Inc. is a global provider

More information

DATA, THE GATE TO A SMART ENERGY SYSTEM - views from the electricity industry

DATA, THE GATE TO A SMART ENERGY SYSTEM - views from the electricity industry DATA, THE GATE TO A SMART ENERGY SYSTEM - views from the electricity industry Hans Ten Berge, Secretary General, EURELECTRIC Big Data Europe workshop, 16 June 2015 EURELECTRIC represents the EU electricity

More information

EastNets SafeWatch Training Program A Breakthrough in the EastNets approach to comprehensive compliance

EastNets SafeWatch Training Program A Breakthrough in the EastNets approach to comprehensive compliance EastNets SafeWatch Training Program A Breakthrough in the EastNets approach to comprehensive compliance In today s ever evolving regulatory landscape, financial institutions must focus scarce resources

More information

Oracle Big Data Essentials

Oracle Big Data Essentials Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Big Data Essentials Duration: 3 Days What you will learn This Oracle Big Data Essentials training deep dives into using the

More information