CSBS BAI Course Catalog

Information Technology & Cybersecurity

Artificial Intelligence

AI Information Security 30 minutes This AI Information Security online training course is designed for all employees. Since the field of generative AI is relatively new, it is logical to assume that some of the risks that come with it are unfamiliar as well. By taking this online training course, you will be able to prepare yourself and your organization to face any cybersecurity challenges that arise out of using generative AI. The biggest concerns surrounding the misuse of generative AI are around data privacy, data security, and intellectual property. In this course, you will learn some best practices that will enable you to mitigate these risks. Cybersecurity 25 minutes Intended for financial institution managers, decision-makers, and technology professionals, this course introduces the respective responsibilities of the institution and the hosting company for cloud application deployment, security, management, and auditing. Topics include an overview of deployment and service models for cloud applications, the use case for cloud computing, and mitigating risks associated with implementing cloud applications. 5 minutes This interactive course provides a brief overview of corporate account takeovers, including what they are, how they happen, and what institutions can do to prevent and respond to an attack. 10 minutes This brief, scenario-based course looks at a financial institution's role in serving a client who has been the victim of a virtual currency scam. Aimed at frontline, IT, information security, and compliance staff, the course presents key decision points where learners must decide how to proceed. 15 minutes This brief, scenario-based course takes learners through a distributed denial of service (DDoS) attack on a financial institution, with key decision points where they must decide the best way to proceed. Aimed at IT/IS leadership and staff and the C-suite team, the course provides a focused, hour-by-hour example of the actions institutions must take to identify, mitigate, and resolve a DDoS attack. 15 minutes This brief, scenario-based course takes learners through a DNS tunneling attack on a financial institution, with key decision points where they must decide the best way to proceed. Aimed at IT/IS leadership and staff and the C suite team, the course provides a focused, week-by-week example of the actions institutions must take to mitigate, resolve, and prevent DNS tunneling attacks. 10 minutes This brief, scenario-based course follows a financial institution employee who has become the victim of a ransomware attack at work, with key decision points where learners must decide the best way to proceed. Aimed at all employees, the course covers what to do-and not do-in the event of a ransomware attack. Cloud Application Security for Financial Institutions Corporate Account Takeovers: Prevention and Response Cyber Scenario: A Convertible Virtual Currency Scam Cyber Scenario: A Distributed Denial of Service (DDoS) Attack Cyber Scenario: A DNS Tunneling Attack Cyber Scenario: A Ransomware Attack on a Financial Institution

66

Made with FlippingBook Online newsletter creator