CSBS BAI Online Course Catalog
Cybersecurity: Social Media Security 15 minutes This interactive course, intended for all employees, provides an overview of the unique threats presented by social media sites for both users and financial institutions and identifies best practices for protecting sensitive and personal information. 30 minutes Financial institutions are required to maintain records on a variety of subjects. Upon completion of this course, recommended for employees who handle sensitive information, you will be able to determine why we retain certain types of data, identify the type of records to retain, where to retain them, and the duration they should be retained. You will also be able to describe the types of destructible data and proper destruction methods. 15 minutes Impersonation is a low-tech method that criminals use to infiltrate an institution. Upon completion of this course, recommended for all employees, you'll be able to determine the goal of impersonators and identify the common roles they assume, explain typical ways impersonators carry out social engineering attacks, and recognize how to defend your institution from social engineering impersonation. 30 minutes Phishing is a common technique that hackers use to steal valuable information. Upon completion of this course, recommended for all employees who handle sensitive information, you'll be able to identify how phishing applies to your financial institution, recognize the types of phishing attacks, and determine how you can play a role in protecting your institution from phishing. 30 minutes Hackers use pretexting to manipulate employees into divulging company secrets. Upon completion of this course, recommended for all employees who handle sensitive information, you'll be able to describe the role of trust in pretexting, identify common pretexts, summarize the stages of a hypothetical pretext, and determine how to protect your institution from pretexting. 30 minutes Utilizing the internet in some form is an essential part of most business activity. Upon completion of this course, recommended for all employees who handle sensitive information, users will recognize common myths about internet use, have a better understanding of the vulnerabilities inherent in Web 2.0 technologies, and demonstrate familiarity with the origin of malware and common ways to protect themselves from it. 30 minutes Financial institutions have extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions. However, financial institutions need to be careful in how they interpret data to avoid illegal bias in decision making. This course provides an overview of UDAAP, fair lending, and other consumer compliance risks in big data and discusses best practices for managing these risks. 20 minutes Intended for financial institution employees working with fintech, this interactive course provides an overview of what fintech is and how it can help the institution meet the needs and pain points of its customers. It also outlines five guiding principles for fintech initiatives that can provide learners with a consistent framework for evaluating potential technology solutions and enable them to make informed decisions. Data and Records Retention Essentials for Financial Institutions Defense Against Social Engineering: Impersonation Defense Against Social Engineering: Phishing Defense Against Social Engineering: Pretexting Internet Security Essentials for Financial Institutions IT Professional: Managing UDAAP and Fair Lending Risks in Big Data IT Professional: Guiding Principles for Successful Fintech Initiatives
35
Made with FlippingBook - Online catalogs