Fraud Detection, Investigation and Prevention

Combines Fraud Accounting With Digital Forensics

This course combines fraud accounting with digital forensics and explains to the participants the nature of financial fraud, how to detect fraudulent activities, and most importantly how to investigate any type of financial fraud. It also explores the various possible avenues of computer-based investigations. The training focuses on audit techniques, fraud detection techniques, accounting and law, practically auditing and investigation of frauds, collection of evidence/documentation which can stand the test of legal scrutiny and write succinct, factual reports.

It is power-packed with case studies designed to give participants a clear idea of real-world frauds and how investigative techniques can be deployed to nail the fraudsters and determine the extent and exact nature of the fraud. The course has been designed by two of the leading experts in this field – Mr. Chetan Dalal who brings unparalleled expertise in the domain of financial fraud investigation and Mr. K. K. Mookhey who is one of the leading computer forensic experts. Also, Mr. V. C. Mishra a leading handwriting analysis and document forgery expert will conduct a session on his area of expertise.

Specific Objectives

  • Understanding nature of fraud and fraudster
  • Purpose of Investigation
  • How to Detect Large Value Frauds
  • Forensic Auditing Techniques
  • Computer-based Forensics
  • Data Analytics for Fraud Detection and Investigation
  • Evidence Presentation
  • Report Writing and Articulation

Who Should attend this course?

  • CXOs
  • Chief Internal Auditors
  • Heads of Internal Audit
  • Chief security officers
  • Heads of Risk Management
  • Heads of Legal Department
  • Heads of Regulatory Compliance
  • Heads of Legal
  • In-house Legal Counsel
  • Accountants
  • Internal, External Auditors

Course Contents

  • Case study – Typical Corporate Financial Fraud & Investigation
  • Nature of corporate fraud
  • Statistics on fraud
  • Techniques and psychology of a fraudster
  • Conducting Fraud Risk Assessments
  • Implementing Fraud Risk Management Programs
  • Roles & Responsibilities for FRM
  • IIA Recommendations on FRM
  • Identifying Red-Flags
  • Implementing Continuous Monitoring
  • Case Studies of Fraud Investigations
  • Auditing Techniques
  • Auditing method 1- “Tiger Team Test”
  • Auditing method 2- “Application of Benford’s Theorem”
  • Auditing method 3- “Use of Barium test”
  • Auditing method 4- “ Data Analytics for Fraud Investigation”
  • Auditing method 5- “Application of inverse logic”
  • Auditing method 6- “Use of Space-time dimension in data evaluation”
  • Exercises & Case Studies
  • The Nature and Purpose of Forensic Interviews
  • The difference between Interviews and Interrogations
  • Types of Witnesses
  • The Environment of the Interview Room
  • The Use of Video and Audio Recording
  • Case studies – the largest credit card heist in history!
  • Advancement of technologies and opportunities for fraudsters
  • Intellectual Property Theft
  • Forensic Imaging
  • Analyzing the Data
  • Network analysis
  • Email tracing
  • Development of "Exhibits" for Use in Court
  • The Forensic Report as Evidence in a Court of Law
  • Approaches for the Development of the Forensic Report
  • Various Formats of the Forensic Report
  • Introduction to Excel as an Audit Tool
  • Advantages of Using Excel for Data Analysis
  • Detect Duplicate Vendors
  • Detect Vendors with same PO box, tel, email but different name
  • Detect Vendor Accounts opened on Holidays
  • Analysis of various Masters in an ERP
  • Analysis of Trends in data
  • Q&A – Conclusion

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content