Seat Time: 1.75hrs
This course will introduce the learner to the importance of information security when handling confidential information and the ways in which security breaches could compromise bank and customer information. The course will also provide the learner with an overview of how the bank collects and handles customer information. After completing this program, the learner will understand:
- The definition of social engineering and how criminals use social engineering to commit financial crimes.
- Different types of spyware and the way that each kind operates.
- The crime of identity theft and how identity theft occurs.
T1. Introduction to Information Security: This topic will provide the learner with an overview of information security, a priority for the institution, by defining the term.
T2. History of Information Security: This topic will teach the learner about the history of information security by providing a detailed timeline describing major milestones that have contributed to the evolution of information security over time.
T3. Federal Law: This topic will teach the learner about the federal laws, such as the Gramm-Leach-Bliley Act (GLBA) and the Right to Financial Privacy Act, that require due diligence in the protection of customer information.
T4. Understanding Information as an Asset: This topic defines assets, threats, vulnerabilities, security practices and procedures all in regard to information security. After completing this topic the learner will come away with an understanding of these terms as well as the importance of protecting intellectual property.
T5. Customer Information: This topic will teach the learner about the two types of customer information, nonpublic and public, and the ways that the institution gathers, stores, and disposes of customer information.
T6. Social Engineering: This topic will define the term of social engineering for the learner and discuss the aspects, stages, and common schemes of social engineering.
T7. Cybercrime: This topic will teach the learner about the types of cybercrime that s/he may encounter and provides an in-depth discussion of identity theft, both how to prevent it and how it occurs.