Course Description for Payment Systems and Risks (STREAM Technology Lab)



Similar documents
Course Description for Bank Operations Simulation (S&R Technology Lab)

Course Description for Operating Systems Hands-On (S&R Technology Lab)

FFIEC Cybersecurity Assessment Tool

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

ICBA Summary of FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

T r i t o n C o l l e g e Assessment Planning and Reporting Tool ACADEMIC PROGRAMS

Training Course ECSA/LPT

IT courses For Senior Managers

CYBER SECURITY TRAINING SAFE AND SECURE

Background. Scope. Organizational Training Needs

Creating Online Faculty Training Modules to Support Continuous Quality Improvement

ITIL 2011 Service Design Certification Program - 3 Days

MASTER OF. Computer Information Systems MCIS

behavioural intervention & autism support programming UNIVERSITY OF NEW BRUNSWICK LESSEN THE IMPACT WITH EVIDENCE-BASED PRACTICES

Hackers are here. Where are you?

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Training Catalog

Going All In on Board Reporting

The fast track to top skills and top jobs in cyber. Guaranteed.

CyberNEXS Global Services

NetAcad Supplemental Courses

A Cautionary Tale Plus Cross-Channel Risk

ITIL V3 Service Operation Certification Program

Product Training Schedule. January - June (C) Classroom Training Courses (W) Instructor-Led Group Training Webinars (O) Online Training Courses

Training Course SQL Server 2008 Implementation and Maintenance

EC-Council Certified Security Analyst (ECSA)

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Solution Training. Financial Risk Management and Financial Performance Management

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

AURORA Vulnerability Background

ITIL V3 Service Design Certification Program 3 Days

Computer Science Course Descriptions Page 1

Cisco Discovery 1: Networking for Home and Small Business (ITCC 1310)

Instructional Design and Technology Professional Core Courses Instructional Design and Technology Core Courses & Descriptions

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

INTERMEDIATE QUALIFICATION

New Course Proposal OSC 4810, Supply Chain and Logistics Management

Presentation on COBIT Education

National Check Payments Certification. Fraud, Risk, and Risk Mitigation Part II. Copyright 2015 by the Electronic Check Clearing House Organization

Financial Training 2016 COURSE CATALOG. in the Energy Sector. Use code Energy2016 and save $200 on any live, in-person training course

Management School. MSc/PG Dip/PG Cert. International Accounting & Finance. University of Stirling Management School

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Seneca Valley Senior High School Cyber Teacher Center (across from the SHS Library on the 2 nd floor)

Training & Certification Allegro University

Maryland Preparedness Planning Certificate Program Pilot Packet July 2014 June 2015

Hackers are here. Where are you?

Technical Courses. Course Catalog

What to Expect in Accelerated BSN Nursing School

Big Data and Social Analytics certificate course

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Principles of Information Assurance Syllabus

Salem Community College Course Syllabus. Section I. Course Title: Principles Of Marketing. Course Code: BUS212

Click to edit Master title style

Government Crime Prevention Regulations. Richard Fraher VP & Counsel to the Retail Payments Office Federal Reserve Bank of Atlanta

CWNA Instructor Led Course Outline

Department of Homeland Security Federal Government Offerings, Products, and Services

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

CCNA Networking for Home and Small Business (Discovery 1)

Associate in Science Degree in Computer Network Systems Engineering

IT and Cyber Security Training Courses

Davis Applied Technology College Curriculum Development Policy and Procedures Training Division

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

LoneStar College Tomball Cisco Networking Academy

Training Course CompTIA A+

White paper. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal

Vendor Risk Management Financial Organizations

DoD Directive (DoDD) 8570 & GIAC Certification

ITIL v3 Qualification Scheme

Introduction to Cybersecurity Overview. October 2014

Course Descriptions. CS 101 Intro to Computer Science

EMC ACADEMIC ALLIANCE

Your Global Partner Providing Leading Technology to Manage and Streamline Your Payments System

DATA, THE GATE TO A SMART ENERGY SYSTEM - views from the electricity industry

EastNets SafeWatch Training Program A Breakthrough in the EastNets approach to comprehensive compliance

Oracle Big Data Essentials

Transcription:

Federal Reserve Board of Governors Course Description for Payment Systems and Risks (STREAM Technology Lab) Last Revised: November 2013 Version: 1.1

S&R STREAM Technology Lab The Board of Governors of the Federal Reserve System is proud to offer technology-related courses developed and hosted by the S.T.R.E.A.M./Technology Lab at the Federal Reserve Bank of Chicago, Chicago, Illinois. For over fourteen years, the S.T.R.E.A.M./Technology Lab has provided unique value in examiner training by combining lectures with hands-on exercises. The exercises reinforce concepts by allowing participants to interact with various application software and/or operating systems. Each participant has a dedicated PC in the state-of-the-art classroom, while the lab is outfitted with many vendor applications, operating systems, and security appliances widely used in the financial industry. Type of Participant Targeted The course will be of interest to safety-and-soundness examiners or IT examiners to conduct payment systems exams in a bank or payment service provider. Prerequisites None. Course Overview The goal of this five-day Payment Systems and Risks course is to introduce key components and key players in the payment domain, explain various channels, networks and systems in the electronic payment systems, discuss how to conduct risk-focus exam on these payment systems based on exam guidelines, and share insights on the future payment evolution. It also gives participants hands-on training on the technology of Remote Deposit Capture (RDC) and demonstrates back office operation of money transfer in a simulated bank environment. The class offers a combination of lectures, case studies, instructor demonstrations, and handson labs. This course offers Continuing Professional Education (CPE) credits. 2 P a g e

Course Objectives Upon completion of this course, the participant, at a minimum, will be able to demonstrate the following skills: Define key components and key players in the payment industry; Describe, at a high level, the various payment channels, networks and systems; Describe the risks, mediations and controls related to various payment types, payment channels and systems; Identify key principles based on exam guidelines; Conduct risk-focused payment system exam. Post-Course Intervention To reinforce learning after the class, participants should be assigned to complete at least one payment exam for a bank or a payment service provider. Overview of Class Curriculum Class Introduction, Class hours - 1.0 How does Money Flow, Class hours - 2.5 Payment Videos, Class hours - 1.0 RDC Overview and RDC Work Program, Class hours - 2.5 RDC Hands-on Labs, Class hours - 1.0 Financial Market Utility and Wholesale Payment Networks,Classhours- 2.5 Retail Payment Networks, Class hours - 2.5 Wire Transfer and ACH Examination, Class hours - 2.5 Payment Service Provider Supervision, Class hours - 2.5 Payment Supervision among Regulators, Class hours - 1.0 Mobile Banking and Mobile Payment, Class hours - 2.0 Cyber Security and Threats, Class hours - 2.0 PASS - Payment Exam Data Analysis and ExamScope,Classhours- 2.0 Virtual Currency and Risk Watch, Class hours - 2.0 Class Review and Panel Discussion, Class hours - 1.0 Total Lecture & Exercise Hours - 28 * Course offers CPE credits through NASBA. Learning Objectives 3 P a g e

Participants develop a solid understanding of p a y m e n t systems, conduct p a y m e n t system risk a s s e s s m e n t a n d e x a m b a s e d on FFIEC's related guidance a n d w o r k program through the following modules. B y m o d u l e, the following learning objectives will be a c c o m p l i s h e d : H o w d o e s M o n e y F l o w Module Discuss purposes a n d functions of p a y m e n t s y s t e m s Identify key players, key c o m p o n e n t s a n d key processes in the m o n e y transfer Discuss, at a high level, the laws a n d regulations on various p a y m e n t systems. R D C O v e r v i e w a n d R D C W o r k P r o g r a m Module N a m e the technology c o m p o n e n t s n e e d e d to facilitate R D C. Discuss areas of potential security w e a k n e s s in a network architecture that includes R D C. List technological controls that should be in place in a typical R D C implementation. R D C H a n d s - o n L a b s Module Discuss major c o m p o n e n t s that should be a part of the R D C risk m a n a g e m e n t process. Explain the segregation of duties that should be in place at both the m e r c h a n t a n d the b a n k which offers R D C services. Discuss the reporting a n d monitoring practices which b a n k m a n a g e m e n t should maintain over R D C services Learning Retail objectives P a yfrom m eparticipants n t N eperspective: t w o r k s Module Explain the card network c o m p o n e n t s Explain card products, such as credit card, debit card, prepaid card, gift card, etc. Discuss operational risks, such as credit risk a n d possible market risk in the products Elaborate PCI D S S risk m a n a g e m e n t guidance on card network a n d m e r c h a n t W i r e T r a n s f e r a n d A C H E x a m i n a t i o n Module Perceive the w o r k program a n d e x a m guideline on W i r e Transfer e x a m a n d A C H e x a m C o n d u c t e x a m on fed wire a n d A C H F i n a n c i a l M a r k e t Utility a n d W h o l e s a l e P a y m e n t N e t w o r k s Module Describe functions of financial market utility ( F M U ) Illustrate potential operational risks associated with F M U, i.e. credit risk, market risk, liquidity risk, etc. Evaluate the risk m a n a g e m e n t practices to mitigate the risks during the e x a m Understand the functions of w h o l e sale p a y m e n t networks Describe m a i n players in the wholesale p a y m e n t 4 P a g e

Evaluate a n d e x a m p a y m e n t network P a y m e n t E x a m D a t a A n a l y s i s a n d E x a m S c o p i n g ( P A S S T o o l ) Module P a y m e n t S e r v i c e P r o v i d e r S u p e r v i s i o n Module Learn to use P A S S to gather p a y m e n t e x a m data S c o p e the e x a m b a s e d on data analysis Understand functions of p a y m e n t service provider Describe impacts of p a y m e n t service providers Explain e x a m focus on the p a y m e n t service provider P a y m e n t S u p e r v i s i o n a m o n g R e g u l a t o r s Module Describe c o m m o n F F I E C guidelines on p a y m e n t e x a m C o m p a r e a n d contrast various e x a m guidelines, Advisory Letters from different regulators on p a y m e n t e x a m M o b i l e B a n k i n g a n d M o b i l e Discover various mobile p a y m e n t channels a n d P a y m e n t Module their impact on e n d users Identify potential risk exposure a n d challenges Evaluate risk controls to support mobile banking a n d mobile p a y m e n t C y b e r S e c u r i t y a n d T h r e a t s Module O b s e r v e cyber security trends Identify cyber-attack impacts on FI p a y m e n t s y s t e m s R e c o g n i z e cyber threat impacts on individual c o n s u m e r V i r t u a l C u r r e n c y a n d R i s k W a t c h Module Discover the world of virtual currency Elucidate h o w the virtual currency interact with real m o n e y or real transaction Evaluate potential risks C l a s s S i z e T h e optimal class size for the class is approximately 2 0 participants. T o provide sufficient variety of interaction a m o n g class participants, the m i n i m u m class size should be 5 participants. I n s t r u c t o r s T h e P a y m e n t S y s t e m s a n d Risks course is conducted a n d supported by a group of professionals, including s e a s o n e d examiners, technology architects, a n d p a y m e n t e x a m analysts. Content for the class w a s developed a n d updated by the instructor t e a m b a s e d on their latest e x a m experience a n d p a y m e n t research. 5 P a g e