This training program aims to prepare participants and provide them with the knowledge and skills needed to pass the professional exam and obtain the Certified Fraud Examiner (CFE) certification, which is awarded by the Association of Certified Fraud Investigators (ACFE), one of the largest anti-fraud training and education bodies in the world. This program is designed to impart knowledge of complex financial transactions and understanding of forensic and forensic methods and sciences, how to spot fraud allegations, as well as technical report writing skills.
At the end of the training program, the participant should be able to:
1 Module 1: Planning and Conducting a Fraud Examination
Definition of fraud examination
Considerations in planning a fraud examination
The basis of predication in fraud examination
Developing a fraud response plan
Preserving confidentiality in a fraud examination
2 Module 2: Collecting Evidence
Types of evidence
Rules for the collection of evidence
Methods of obtaining evidence
Disposal of evidence
3 Module 3: Interview Theory and Application
Purpose of the interview
Planning for interviews
Documenting the interview
Questioning techniques
Interviewee’s legal and administrative rights
Providing an introduction and building rapport
Assessing the interviewee’s behavior
Dealing with resistance and difficult/volatile people
Verbal and nonverbal clues to deception
Closing the interview
1 Module 4: Interviewing Suspects and Signed Statements
Purpose of the admission-seeking interview
Preparing the interview room
Rules for admission-seeking interviews
Asking admission-seeking questions
Steps in an admission-seeking interview
Rules for obtaining signed statements
2 Module 5: Covert Operations
What a covert operation is?
Documenting covert operations
Legal issues in covert operations
Procedures and considerations when using sources and informants
3 Module 6: Sources of Information
Uses of external sources of information in fraud examinations
Types of public records
Types of nonpublic records
Methods for gaining access to nonpublic records
Legalities of pretexting
General Data Protection Regulation (GDPR) application
Guidelines and use of online databases
Use of internet sources
Documenting electronic evidence obtained online
4 Module 7: Data Analysis and Reporting Tools
Data analysis functions and their applications
Advanced data analysis
Data visualization and reporting
Phases in the data analysis process
1 Module 8: Digital Forensics
Planning for digital evidence collection
Types of files to be recovered
Sources of digital evidence
The phases of a digital evidence investigation
2 Module 9: Tracing Illicit Transactions
The process of tracing illicit transactions
Obtaining and examining bank records
Types of financial records used to trace assets
Methods of tracing and analyzing financial transactions
Emerging technology implications in tracing illicit transactions
Locating hidden assets
Asset forfeiture/ recovery
3 Module 10: Report Writing
Characteristics and structure of a good report
Purpose of a fraud examination report
Rules and best practices for fraud examination reports
Providing follow-up and recommendations
1 Module 1: Accounting Concepts
The accounting equation
Balance sheet/ statement of financial position
Income statement/ statement of financial performance/ statement of operations/ profit-and loss statement/ statement of changes in financial position
Statement of cash flows
Cash vs. accrual accounting
Various accounting frameworks (GAAP, IFRS, etc.) and when they are used?
2 Module 2: Financial Statement Fraud
What financial statement fraud is?
Types of financial statement fraud schemes
Financial statement analysis
3 Module 3: Asset Misappropriation: Cash Receipts
What cash skimming is
Types of cash skimming schemes
Cash skimming schemes: Prevention and detection
What cash larceny is
Types of cash larceny schemes
Cash larceny: Prevention and detection
4 Module 4: Asset Misappropriation: Fraudulent Disbursements
Types of register disbursement schemes
Register disbursement schemes: Prevention and detection
Electronic payment tampering: Prevention and detection
Types of billing schemes
Billing schemes: Prevention and detection
Types of payroll fraud schemes
Payroll fraud schemes: Prevention and detection
Types of expense reimbursement schemes
Expense reimbursement schemes: Prevention and detection
5 Module 5: Asset Misappropriation: Inventory and Other Assets
Misuse of inventory and other assets
Types of inventory theft schemes
Concealing inventory shrinkage
Inventory schemes: Prevention and detection
1 Module 6: Corruption
What is corruption?
Types of corruption schemes
Methods of making illegal payments
Corruption schemes: Prevention and detection
2 Module 7: Theft of Data and Intellectual Property
Corporate espionage vs. competitive intelligence
Sources of competitive intelligence
How information is lost or stolen
Safeguarding proprietary information from insider and external threats
3 Module 8: Identity Theft
Types and methods of identity theft
How identity thieves steal information
Identity theft schemes: Prevention and detection
4 Module 9: Financial Institution Fraud
Types of financial institution fraud schemes
Red flags of financial institution fraud
Financial institution fraud: Prevention and detection
1 Module 10: Payment Fraud
Types of payment fraud schemes
Payment fraud schemes: Prevention and detection
2 Module 11: Insurance Fraud
Types of insurance fraud schemes
Red flags of insurance fraud
Insurance fraud: Prevention and detection
3 Module 12: Health Care Fraud
Types of health care fraud schemes
Health care fraud: Prevention and detection
4 Module 13: Consumer Fraud
Types of consumer fraud schemes (e.g., advance-fee schemes, elder fraud, pyramid schemes, Ponzi schemes)
Red flags of consumer fraud
Consumer fraud: Prevention and detection
5 Module 14: Cyber fraud
Information security goals and control objectives
Types of electronic social engineering schemes
Types of malware
Combatting insider threats
Cyber fraud: Prevention and detection
Responding to cybersecurity incidents
6 Module 15: Contract and Procurement Fraud
Basic elements and phases of contracting
Types of contract and procurement fraud schemes
Red flags of contract and procurement fraud
Contract and procurement fraud: Prevention and detection
1 Module 1: Overview of the Legal System
Criminal, civil, and administrative actions for fraud
Civil vs. common law systems
Adversarial vs. inquisitorial processes
Challenges in international cases
2 Module 2: The Law Related to Fraud
Misrepresentation of material facts
Breach of trust offenses
Mail fraud and wire fraud
False claims and documents
Corruption and related international rules and standards
Perjury
Conspiracy
Concealment of material facts/ obstruction
3 Module 3: Bankruptcy Fraud
Governance and management in bankruptcy proceedings
Types of bankruptcy filings
Role of key parties in bankruptcies
Types of bankruptcy fraud schemes
4 Module 4: Securities Fraud
Securities laws and regulation
International Organization of Securities Commissions (IOSCO) recommendations
دور المنظمات ذاتية التنظيم The role of self-regulatory organizations
Components of investment contracts
Types of securities fraud schemes
1 Module 5: Money Laundering
Money laundering stages
Methods of laundering money
Components of anti-money laundering programs
Anti-money laundering regulations and guidance
2 Module 6: Tax Fraud
Tax avoidance vs. tax evasion
Common defenses to tax evasion
Types of tax evasion schemes (e.g., income and wealth tax evasion, consumption tax schemes)
3 Module 7: Individual Rights During Examinations
Employees’ duty to cooperate
Employees’ contractual rights
Whistleblower legal protections
Employees’ rights in private actions vs. government actions
Rules regarding searches and surveillance in the workplace
Employees’ expectation of privacy
Causes of action for violations of employee rights
Data privacy and transfer laws
Consequences for failure to preserve evidence
1 Module 8: The Criminal Justice System
Corporate criminal liability
International Covenant on Civil and Political Rights (ICCPR)
Finders of fact in criminal cases
Criminal proceedings, sentencing, and restitution
Criminal discovery
The burden of proof in criminal cases
Prosecutorial discretion and bargaining agreements
Corporate deferred prosecution agreements
Appeals
2 Module 9: The Civil Justice System
Beginning the civil action
Civil discovery and discovery methods
Preservation of evidence in civil litigation
Securing assets before judgment
Trial of a civil case
The burden of proof in civil cases
Counterclaims
Alternative dispute resolution
Civil remedies and recovering fraud losses
3 Module 10: Basic Principles of Evidence
Direct vs. circumstantial evidence
Admissibility of evidence
Impeachment
الامتيازات والحماية المتعلقة بتقديم الأدلة Evidentiary privileges and protections
Direct testimony considerations
4 Module 11: Testifying
Purpose of testifying expert witnesses
Appointment of experts
Qualifying to testify as an expert witness
Cross-examination considerations and techniques
1 Module 1: Understanding Criminal Behavior
The use of punishment vs. reinforcement to modify behavior
Theory of differential association
Social control theory and social learning theory
Differential reinforcement theory
Rational choice theory
Routine activities theory
2 Module 2: White-Collar Crime
Organizational opportunity for white-collar crime
Factors that contribute to white-collar crime
Effects of white-collar crime on individuals and society
Prosecutions for white-collar criminals
Organizational vs. occupational crime
Factors that contribute to organizational crime
Ways organizations rationalize questionable conduct
Ways to control organizational crime
Components of the fraud triangle
Research and trends in occupational fraud
3 Module 3: Corporate Governance
What corporate governance is
The parties involved in corporate governance
Establishing a corporate governance framework
Principles of corporate governance
Sources of corporate governance guidance
1 Module 4: Management’s Fraud-Related Responsibilities
Definition of internal control
COSO’s five components of internal control
Management’s responsibility for the anti-fraud program
Elements of an effective anti-fraud compliance program
2 Module 5: Auditors’ Fraud-Related Responsibilities
External auditors’ fraud-related responsibilities
External auditors’ reporting requirements
Financial statement materiality
Internal control findings
Internal auditors’ fraud-related responsibilities
Internal auditors’ reporting requirements
Government auditors’ fraud-related responsibilities
Government auditors’ reporting requirements
3 Module 6: Fraud Prevention Programs
Increasing the perception of detection
Employee anti-fraud education
Reporting programs and whistleblower protection programs
Reinforcing an enterprise-wide anti-fraud culture
Response to and communication of fraud incidents
Minimizing employee pressures to commit fraud
Developing a formal anti-fraud policy
Developing an ethics program
1 Module 7: Fraud Risk Assessment
The role and objective of anti-fraud controls
Types of anti-fraud controls
Purpose and objectives of a fraud risk assessment
Elements of an effective fraud risk assessment
Types of fraud risks
Steps in conducting a fraud risk assessment
Ways to respond to residual risks
Reporting the fraud risk assessment results
The relationship between the fraud risk assessment and the internal/external audit functions
2 Module 8: Fraud Risk Management
What risk management is
Risk management frameworks
Principles of fraud risk management
Roles and responsibilities for fraud risk management
Objectives of a fraud risk management program
Defining risk appetite
Fraud risk management program compliance and oversight
Third-party fraud risk management
3 Module 9: Ethics for Fraud Examiners
Purpose of a code of ethics
Relationship between moral philosophy, ethics, and the law
Implications of engaging in illegal or unethical conduct
Identifying and avoiding conflicts of interest
Integrity requirements
Professional skepticism
Giving opinions and drawing conclusions
Dealing with privileged and confidential information
Ensuring proper qualifications for engagements
Not Available
Names of the training programs that are integrated (enriched) with the training program:
Names of the training programs that after the training program:
Add Comment