وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Fraud Prevention, Dispute Resolution and PCI-DSS Masterclass

سرفصل های دوره

The fundamentals of fraud prevention and monitoring + dispute resolution + PCI-DSS requirements - now in one course.


1 - Masterclass Intro
  • 1 - Masterclass Intro
  • 2 - Useful Information.html

  • 2 - Fraud Introduction
  • 3 - 01-Course-Introduction.pdf
  • 3 - All-Slides-Intro-to-Fraud-Prevention.pdf
  • 3 - Introduction

  • 3 - Fraud Fundamentals
  • 4 - 02-Fundamentals-of-Fraud.pdf
  • 4 - Fraud Fundamentals

  • 4 - Fraud Approaches
  • 5 - 03-Fraud-Approaches-01-Introduction.pdf
  • 5 - Module Intro
  • 6 - 03-Fraud-Approaches-03-General-Strategies-01-Introduction.pdf
  • 6 - General Strategies Intro
  • 7 - 03-Fraud-Approaches-03-General-Strategies-02-Convenience.pdf
  • 7 - General Strategies Convenience
  • 8 - 03-Fraud-Approaches-03-General-Strategies-03-Social-Engineering.pdf
  • 8 - General Strategies Social Engineering
  • 9 - 03-Fraud-Approaches-03-General-Strategies-04-Internal-Fraud.pdf
  • 9 - General Strategies Internal Fraud
  • 10 - 03-Fraud-Approaches-03-General-Strategies-05-Identity-Theft.pdf
  • 10 - General Strategies Identity Theft
  • 11 - 03-Fraud-Approaches-04-Specific-Executions-01-Introduction.pdf
  • 11 - Specific Executions Intro
  • 12 - 03-Fraud-Approaches-04-Specific-Executions-02-Consumer-Fraud.pdf
  • 12 - Specific Executions Consumer Fraud
  • 13 - 03-Fraud-Approaches-04-Specific-Executions-03-Card-Block-Fraud.pdf
  • 13 - Specific Executions Card Block Fraud
  • 14 - 03-Fraud-Approaches-04-Specific-Executions-04-Single-Use-Fraud.pdf
  • 14 - Specific Executions SingleUse Fraud
  • 15 - 03-Fraud-Approaches-04-Specific-Executions-05-Cash-Return-Fraud.pdf
  • 15 - Specific Executions Cash Return Fraud
  • 16 - 03-Fraud-Approaches-04-Specific-Executions-06-Collusive-Affiliate-Fraud.pdf
  • 16 - Specific Executions CollusiveAffiliate Fraud
  • 17 - 03-Fraud-Approaches-04-Specific-Executions-07-Dynamic-Tested-Fraud.pdf
  • 17 - Specific Executions DynamicTested Fraud
  • 18 - 03-Fraud-Approaches-05-Perpetrators-01-Introduction.pdf
  • 18 - Perpetrators Intro
  • 19 - 03-Fraud-Approaches-05-Perpetrators-02-Consumers.pdf
  • 19 - Perpetrators Consumers
  • 20 - 03-Fraud-Approaches-05-Perpetrators-03-Hackers-and-Crackers.pdf
  • 20 - Perpetrators Hackers and Crackers
  • 21 - 03-Fraud-Approaches-05-Perpetrators-03-White-Collar-Actors.pdf
  • 21 - Perpetrators WhiteCollar Criminals
  • 22 - 03-Fraud-Approaches-05-Perpetrators-04-Organized-Crime.pdf
  • 22 - Perpetrators Organized Crime Rings
  • 23 - 03-Fraud-Approaches-06-Module-Outro.pdf
  • 23 - Module Conclusion

  • 5 - Fraud Prevention Techniques
  • 24 - 04-Fraud-Prevention-Techniques-01-Module-Intro.pdf
  • 24 - Module Intro
  • 25 - 04-Fraud-Prevention-Techniques-02-Data-Verification-01-Introduction.pdf
  • 25 - Data Verification Intro
  • 26 - 04-Fraud-Prevention-Techniques-02-Data-Verification-02-Velocity-Checks.pdf
  • 26 - Data Verification Velocity Checks
  • 27 - 04-Fraud-Prevention-Techniques-02-Data-Verification-03-Card-Verification.pdf
  • 27 - Data Verification Card Verification
  • 28 - 04-Fraud-Prevention-Techniques-02-Data-Verification-04-Charge-Deposit-Verifications.pdf
  • 28 - Data Verification ChargeDeposit Verifications
  • 29 - 04-Fraud-Prevention-Techniques-03-Identity-Verification-01-Introduction.pdf
  • 29 - Identity Verification Intro
  • 30 - 04-Fraud-Prevention-Techniques-03-Identity-Verification-02-Lists.pdf
  • 30 - Identity Verification Lists
  • 31 - 04-Fraud-Prevention-Techniques-03-Identity-Verification-03-Simple-Field-Verifications.pdf
  • 31 - Identity Verification Simple Field Verification
  • 32 - 04-Fraud-Prevention-Techniques-03-Identity-Verification-04-Address-Verifications.pdf
  • 32 - Identity Verification Address Verifications
  • 33 - 04-Fraud-Prevention-Techniques-03-Identity-Verification-05-Manual-Authentication.pdf
  • 33 - Identity Verification Manual Authentication
  • 34 - 04-Fraud-Prevention-Techniques-03-Identity-Verification-06-Automated-Lookups.pdf
  • 34 - Identity Verification Automated Lookups
  • 35 - 04-Fraud-Prevention-Techniques-04-Technological-Verification-01-Introduction.pdf
  • 35 - Technological Verification Intro
  • 36 - 04-Fraud-Prevention-Techniques-04-Technological-Verification-02-Device-Token-Identification.pdf
  • 36 - Technological Verification DeviceToken Authentication
  • 37 - 04-Fraud-Prevention-Techniques-04-Technological-Verification-03-Digital-Signatures.pdf
  • 37 - Technological Verification Digital Signatures
  • 38 - 04-Fraud-Prevention-Techniques-04-Technological-Verification-04-Consumer-Location.pdf
  • 38 - Technological Verification Consumer Location
  • 39 - 04-Fraud-Prevention-Techniques-05-Scores-and-Rules.pdf
  • 39 - Scores and Rules
  • 40 - 04-Fraud-Prevention-Techniques-06-Processes-01-Introduction.pdf
  • 40 - Processes Intro
  • 41 - 04-Fraud-Prevention-Techniques-06-Processes-02-Insurance-and-Guarantees.pdf
  • 41 - Processes Insurance and Guarantees
  • 42 - 04-Fraud-Prevention-Techniques-06-Processes-03-Reviews-and-Representment.pdf
  • 42 - Processes ReviewsRepresentment
  • 43 - 04-Fraud-Prevention-Techniques-07-Module-Outro.pdf
  • 43 - Module Outro

  • 6 - Fraud Prevention Strategy
  • 44 - 05-Fraud-Prevention-Strategies-01-Module-Intro.pdf
  • 44 - Module Intro
  • 45 - 05-Fraud-Prevention-Strategies-02-Strategy-Stages.pdf
  • 45 - Strategy Stages
  • 46 - 05-Fraud-Prevention-Strategies-03-Technique-Considerations.pdf
  • 46 - Technique Considerations
  • 47 - 05-Fraud-Prevention-Strategies-04-Data-Usage-Considerations.pdf
  • 47 - Data Usage Considerations
  • 48 - 05-Fraud-Prevention-Strategies-05-Data-Processing-Considerations.pdf
  • 48 - Data Processing Considerations
  • 49 - 05-Fraud-Prevention-Strategies-06-Module-Outro.pdf
  • 49 - Module Outro

  • 7 - Fraud Conclusion
  • 50 - 06-Course-Conclusion.pdf
  • 50 - All-Slides-Intro-to-Fraud-Prevention.pdf
  • 50 - Conclusion

  • 8 - Dispute Resolution Introduction
  • 51 - 01-Course-Introduction.pdf
  • 51 - All-Slides-Intro-to-Dispute-Resolution.pdf
  • 51 - Introduction

  • 9 - Dispute Resolution Considerations
  • 52 - 02-Dispute-Considerations.pdf
  • 52 - Dispute Considerations

  • 10 - Dispute Resolution ADR
  • 53 - 03-ADR-Approaches-01-Introduction.pdf
  • 53 - Intro
  • 54 - 03-ADR-Approaches-02-Negotiation.pdf
  • 54 - Negotiation
  • 55 - 03-ADR-Approaches-03-Mediation.pdf
  • 55 - Mediation
  • 56 - 03-ADR-Approaches-04-Arbitration.pdf
  • 56 - Arbitration
  • 57 - 03-ADR-Approaches-05-Module-Outro.pdf
  • 57 - Outro

  • 11 - Dispute Resolution ODR
  • 58 - 04-ODR-01-Introduction.pdf
  • 58 - Intro
  • 59 - 04-ODR-02-Context-and-Principles.pdf
  • 59 - Context and Principles
  • 60 - 04-ODR-03-Steps-and-Categories.pdf
  • 60 - Steps and Categories
  • 61 - 04-ODR-04-Implementations-and-Case-Studies.pdf
  • 61 - Implementation and Case Studies
  • 62 - 04-ODR-05-Outro.pdf
  • 62 - Outro

  • 12 - Dispute Resolution In Merchant Banking
  • 63 - 05.In-Merchant-Banking-01.Introduction.pdf
  • 63 - Intro
  • 64 - 05.In-Merchant-Banking-02.General-Guidelines.pdf
  • 64 - General Guidelines
  • 65 - 05.In-Merchant-Banking-03.Disputes-By-Payment-System.pdf
  • 65 - Disputes by Payment System
  • 66 - 05.In-Merchant-Banking-04.Dispute-Lifecycle.pdf
  • 66 - Dispute Lifecycle
  • 67 - 05.In-Merchant-Banking-05.Scheme-Involvement.pdf
  • 67 - Scheme Involvement
  • 68 - 05.In-Merchant-Banking-06.Outro.pdf
  • 68 - Outro

  • 13 - Dispute Resolution Reason Codes
  • 69 - 07.Chargeback-Reason-Codes-01-Introduction-Intro-to-Dispute-Res.pdf
  • 69 - Intro
  • 70 - 07.Chargeback-Reason-Codes-02-Fraud-01.Introduction.pdf
  • 70 - Fraud Introduction
  • 71 - 07.Chargeback-Reason-Codes-02-Fraud-02-Not-Authorized-Recognised.pdf
  • 71 - Fraud Not AuthorizedRecognised
  • 72 - 07.Chargeback-Reason-Codes-02-Fraud-04-Fraudulent-Processing.pdf
  • 72 - Fraud Fraudulent Processing
  • 73 - 07.Chargeback-Reason-Codes-02-Fraud-03-Monitored-Merchant-or-Card.pdf
  • 73 - Fraud Monitored Merchant or Card
  • 74 - 07.Chargeback-Reason-Codes-02-Fraud-05-EMV-Liability-Shift.pdf
  • 74 - Fraud EMV Liability Shift
  • 75 - 07.Chargeback-Reason-Codes-03-Authorization-01.Introduction.pdf
  • 75 - Authorization Introduction
  • 76 - 07.Chargeback-Reason-Codes-03-Authorization-02.Missing-Declined-Authorization.pdf
  • 76 - Authorization MissingDeclined Authorization
  • 77 - 07.Chargeback-Reason-Codes-03-Authorization-03.Card-in-Recovery-Lost-Stolen.pdf
  • 77 - Authorization Card in RecoveryLostStolen
  • 78 - 07.Chargeback-Reason-Codes-03-Authorization-04.Invalid-Information.pdf
  • 78 - Authorization Invalid Information
  • 79 - 07.Chargeback-Reason-Codes-04-Processing-Errors-01.Introduction.pdf
  • 79 - Processing Errors Introduction
  • 80 - 07.Chargeback-Reason-Codes-04-Processing-Errors-02.Invalid-Code-or-Data.pdf
  • 80 - Processing Errors Invalid Code or Data
  • 81 - 07.Chargeback-Reason-Codes-04-Processing-Errors-03.Invalid-Amount-Account.pdf
  • 81 - Processing Errors Invalid AmountAccount
  • 82 - 07.Chargeback-Reason-Codes-04-Processing-Errors-04.Duplicate-Other-Payment.pdf
  • 82 - Processing Errors DuplicateOther Payment
  • 83 - 07.Chargeback-Reason-Codes-04-Processing-Errors-05.Currency-Mismatches.pdf
  • 83 - Processing Errors Currency Mismatches
  • 84 - 07.Chargeback-Reason-Codes-04-Processing-Errors-06.Late-Presentment.pdf
  • 84 - Processing Errors Late Presentment
  • 85 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-01.Introduction.pdf
  • 85 - Consumer Disputes Introduction
  • 86 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-02.Mismatch-of-Goods.pdf
  • 86 - Consumer Disputes Mismatch of Goods
  • 87 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-03.Canceled-Not-Completed-Transaction.pdf
  • 87 - Consumer Disputes CancelledNot Completed
  • 88 - 07.Chargeback-Reason-Codes-05.Consumer-Disputes-04.Credit-Not-Processed.pdf
  • 88 - Consumer Disputes Credit Not Processed
  • 89 - 07.Chargeback-Reason-Codes-06-Outro.pdf
  • 89 - Outro

  • 14 - Dispute Resolution Outro
  • 90 - 08.Course-Outro.pdf
  • 90 - All-Slides-Intro-to-Dispute-Resolution.pdf
  • 90 - Course Outro

  • 15 - PCIDSS Introduction
  • 91 - 01-Course-Intro.pdf
  • 91 - All-Slides-Fundamentals-of-PCI-DSS.pdf
  • 91 - Course Intro

  • 16 - PCIDSS Essentials
  • 92 - 02-PCI-DSS-Essentials-01-Intro.pdf
  • 92 - Module Intro
  • 93 - 02-PCI-DSS-Essentials-02-Terminology-Clarifications.pdf
  • 93 - Terminology Clarifications
  • 94 - 02-PCI-DSS-Essentials-03-PCI-DSS-History.pdf
  • 94 - PCIDSS History
  • 95 - 02-PCI-DSS-Essentials-04-Merchant-Assessment.pdf
  • 95 - Merchant Assessment
  • 96 - 02-PCI-DSS-Essentials-05-Anatomy-of-a-Payment-Flow.pdf
  • 96 - Anatomy of a Payment Flow
  • 97 - 02-PCI-DSS-Essentials-06-Outro.pdf
  • 97 - Module Outro

  • 17 - PCIDSS The 12 Requirements v321
  • 98 - 03-The-12-Requirements-01-Intro.pdf
  • 98 - Module Intro
  • 99 - 03-The-12-Requirements-02-Overview.pdf
  • 99 - Overview
  • 100 - 03-The-12-Requirements-03-Requirement-1-Keep-a-Firewall.pdf
  • 100 - Requirement 1 Keep a Firewall
  • 101 - 03-The-12-Requirements-04-Requirement-2-No-Defaults.pdf
  • 101 - Requirement 2 No Defaults
  • 102 - 03-The-12-Requirements-05-Requirement-3-Protect-Stored-Data.pdf
  • 102 - Requirement 3 Protect Stored Data
  • 103 - 03-The-12-Requirements-06-Requirement-4-Protect-Transmitted-Data.pdf
  • 103 - Requirement 4 Protect Transmitted Data
  • 104 - 03-The-12-Requirements-07-Requirement-5-Prevent-Malware.pdf
  • 104 - Requirement 5 Prevent Malware
  • 105 - 03-The-12-Requirements-08-Requirement-6-Develop-Securely.pdf
  • 105 - Requirement 6 Develop Securely
  • 106 - 03-The-12-Requirements-09-Requirement-7-Need-to-Know-Access.pdf
  • 106 - Requirement 7 NeedtoKnow Access
  • 107 - 03-The-12-Requirements-10-Requirement-8-Identify-Access.pdf
  • 107 - Requirement 8 Identify Access
  • 108 - 03-The-12-Requirements-11-Requirement-9-Restrict-Physical-Access.pdf
  • 108 - Requirement 9 Restrict Physical Access
  • 109 - 03-The-12-Requirements-12-Requirement-10-Monitor-Networks.pdf
  • 109 - Requirement 10 Monitor Networks
  • 110 - 03-The-12-Requirements-13-Requirement-11-Test-Regularly.pdf
  • 110 - Requirement 11 Test Regularly
  • 111 - 03-The-12-Requirements-14-Requirement-12-InfoSec-Policy.pdf
  • 111 - Requirement 12 InfoSec Policy
  • 112 - 03-The-12-Requirements-15-General-Patterns-and-Recap.pdf
  • 112 - General Patterns and Recap
  • 113 - 03-The-12-Requirements-16-Outro.pdf
  • 113 - Module Outro

  • 18 - PCIDSS Outro
  • 114 - 04-Course-Outro.pdf
  • 114 - All-Slides-Fundamentals-of-PCI-DSS.pdf
  • 114 - Course Outro

  • 19 - Additional Module Security Controls
  • 115 - Intro
  • 116 - Acquisition Strategy
  • 116 - Security-Controls-Acquisition-Strategy.pdf
  • 117 - Code Analysis
  • 117 - Security-Controls-Code-Analysis.pdf
  • 118 - Code Signing
  • 118 - Security-Controls-Code-Signing.pdf
  • 119 - Controls by Data Classification
  • 119 - Security-Controls-Controls-By-Data-Classification.pdf
  • 120 - Criticality Analysis
  • 120 - Security-Controls-Criticality-Analysis.pdf
  • 121 - Cryptographic Protection
  • 121 - Security-Controls-Cryptographic-Protection.pdf
  • 122 - Cyber Threat Hunting
  • 122 - Security-Controls-Cyber-Threat-Hunting.pdf
  • 123 - Data DeIdentification and Anonymisation
  • 123 - Security-Controls-Data-De-Identification-Anonymisation.pdf
  • 124 - Data Governance Structures
  • 124 - Security-Controls-Data-Governance-Structures.pdf
  • 125 - Data Purpose and Authority
  • 125 - Security-Controls-Data-Usage-Purpose-Authority.pdf
  • 126 - Data Retention and Disposal
  • 126 - Security-Controls-Data-Retention-Disposal.pdf
  • 127 - DefenseInDepth
  • 127 - Security-Controls-Defense-In-Depth-DID.pdf
  • 128 - Information Tainting
  • 128 - Security-Controls-Information-Tainting.pdf
  • 129 - Locked RoomsDevicesPorts
  • 129 - Security-Controls-Locked-Rooms-Devices-Ports.pdf
  • 130 - Media DowngradingRedacting
  • 130 - Security-Controls-Media-Downgrading-Redacting.pdf
  • 131 - Physical Media Protection
  • 131 - Security-Controls-Physical-Media-Protection.pdf
  • 132 - Provider Assessment and Monitoring
  • 132 - Security-Controls-Provider-Assessment-Monitoring.pdf
  • 133 - SecurityPrivacy Architectures
  • 133 - Security-Controls-Security-Privacy-Architectures.pdf
  • 134 - Security-Controls-System-Safe-Modes.pdf
  • 134 - System Safe Modes
  • 135 - Security-Controls-Thin-Diskless-Devices.pdf
  • 135 - ThinDiskless Devices
  • 136 - Security-Controls-Usage-Agreements.pdf
  • 136 - Usage Agreements
  • 137 - Security-Controls-Visitor-Controls.pdf
  • 137 - Visitor Controls
  • 138 - Outro

  • 20 - Additional Module Pitching Technical Projects
  • 139 - 01-Module-Intro.pdf
  • 139 - Introduction
  • 140 - 02-Assembling-01-Intro.pdf
  • 140 - Assembling Introduction
  • 141 - 02-Assembling-02-Actions-and-Implementation.pdf
  • 141 - Assembling Actions and Implementation
  • 142 - 02-Assembling-03-Roles-and-Responsibilities.pdf
  • 142 - Assembling Roles and Responsibilities
  • 143 - 02-Assembling-04-Scope-Framework-Roadmap.pdf
  • 143 - Assembling Scope Framework Roadmap
  • 144 - 02-Assembling-05-Governance-Structures.pdf
  • 144 - Assembling Governance Structures
  • 145 - 02-Assembling-06-Trackable-Metrics.pdf
  • 145 - Assembling Trackable Metrics
  • 146 - 03-Presenting-01-Intro.pdf
  • 146 - Presenting Intro
  • 147 - 03-Presenting-02-Recency-and-Primacy.pdf
  • 147 - Presenting Recency and Primacy
  • 148 - 03-Presenting-03-Leveraging-Specifics.pdf
  • 148 - Presenting Leveraging Specifics
  • 149 - 03-Presenting-04-Displayed-Authority.pdf
  • 149 - Presenting Displayed Authority
  • 150 - 03-Presenting-05-The-Heros-Journey.pdf
  • 150 - Presenting The Heros Journey
  • 151 - 03-Presenting-06-Tiredness-and-Distraction.pdf
  • 151 - Presenting Tiredness and Distraction
  • 152 - 04-Dealing-with-Objections-01-Intro.pdf
  • 152 - Dealing with Objections Introduction
  • 153 - 04-Dealing-with-Objections-02-Flipping-and-Diagnosing.pdf
  • 153 - Dealing with Objections Flipping and Diagnosing
  • 154 - 04-Dealing-with-Objections-03-UP-Answers.pdf
  • 154 - Dealing with Objections UP Answers
  • 155 - 04-Dealing-with-Objections-04-Progress-and-Loss.pdf
  • 155 - Dealing with Objections Progress and Loss
  • 156 - 04-Dealing-with-Objections-05-Political-Capital.pdf
  • 156 - Dealing with Objections Political Capital
  • 157 - 05-Securing-Buy-In-01-Intro.pdf
  • 157 - Securing BuyIn Introduction
  • 158 - 05-Securing-Buy-In-02-Implementation-and-Opinions.pdf
  • 158 - Securing BuyIn Implementation and Opinions
  • 159 - 05-Securing-Buy-In-03-Tailored-Benefits.pdf
  • 159 - Securing BuyIn Tailored Benefits
  • 160 - 05-Securing-Buy-In-04-Effort-Shaping.pdf
  • 160 - Securing BuyIn Effort Shaping
  • 161 - 05-Securing-Buy-In-05-Future-Lock-In.pdf
  • 161 - Securing BuyIn Future LockIn
  • 162 - 06-Full-Run-Throughs-01-Intro.pdf
  • 162 - Full Runthroughs Introduction
  • 163 - 06-Full-Run-Throughs-02-Pitching-PCI-DSS.pdf
  • 163 - Full Runthroughs Pitching PCIDSS
  • 164 - 06-Full-Run-Throughs-03-Pitching-Vendor-Assessments.pdf
  • 164 - Full Runthroughs Pitching Vendor Assessments
  • 165 - 06-Full-Run-Throughs-05-Pitching-Data-Governance.pdf
  • 165 - Full Runthroughs Pitching Data Governance
  • 166 - 06-Full-Run-Throughs-04-Pitching-Data-Management.pdf
  • 166 - Full Runthroughs Pitching Data Management
  • 167 - 07-Module-Outro.pdf
  • 167 - Module Outro

  • 21 - Bonus Lecture
  • 168 - Bonus Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 4997
    حجم: 2757 مگابایت
    مدت زمان: 1058 دقیقه
    تاریخ انتشار: 12 بهمن 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید