Course curriculum

    1. 1. Introduction

    2. 2. Money Laundering_

    3. 3. Terrorist financing

    4. 4. Global and Local AML-CFT Regulatory Framework

    5. 5. Consequences of Non-Compliance with AML and CFT

    6. 6. Failure to comply with AML-CFT

    7. 7. AML-Governance and compliance culture

    8. 8. Compliance Culture

    9. 9. Signs of a weak compliance culture

    10. 10. Three line of defence

    11. 11. Importance of ongoing AML-CFT Training

    12. 12. Takeaway - compliance is Everyone's Responsibility

    1. 1. Introduction

    2. 2. Three key stages of amaoney Laundering

    3. 3. Methods of Money Laundering

    4. 4. How does Terrorist Financing work

    5. 5. Trade-based Money Laundering

    6. 6. Trade Exploitation

    7. 7. Methods of Trade Based Money Laundering used by criminals

    8. 8. Introduction to virtual Asset Money Laundering

    9. 9. Risks and challenges of virtual Asset Money Laundering

    10. 10. Methods of Laundering Money through virtual Assets

    11. 11. What is crowdfunding

    12. 12. Main Methods of crownfunding for terrorism

    13. 13. Cybercrimes

    14. 14. Types of cybercrimes

    15. 15. Cybercrime - Challenges for Regulators and institutions

    16. 16. Synthetic identity Theft

    17. 17. Global relevance including in Mauritius

    18. 18. Combating Synthetic identity Theft

    19. 19. Misuse of citizenship

    20. 20. shell companies

    21. 21. Mitigating the risks

    22. 22. Why Real Estate exists

    23. 23. How Real Estate is used

    24. 24. Environmental crimes

    25. 25. Key types of Environmental crimes

    26. 26. Romans scams

    27. 27. Conclusion

    1. 1. Introduction

    2. 2. Customer due diligence

    3. 3. Legal Framework

    4. 4. Third Party Reliance

    5. 5. The Fundamental Objectives of CDD

    6. 6. Applicability of CDD

    7. 7. Risk-based Approach -RBA

    8. 8. What are the 4 pillars of a risk-based approach

    9. 9. Key aspects of a risk-based approach to CDD

    10. 10. Benefits of a risk-based approach

    11. 11. Simplified and enhanced due diligence

    12. 12. Risk factors

    13. 13. Structured KYC file

    14. 14. Identification and verification process

    15. 15. Why understanding the customer is important

    16. 16. Private individuals ( Natural Persons) resident in Mauritius

    17. 17. Locally incorporated companies

    18. 18. Source of funds (Sof) and source of wealth (soW)

    19. 19. Risk factors related to soF and soW

    20. 20. Beneficial Owner

    21. 21. FIAML Regulations define

    22. 22. Critical implications

    23. 23. Beneficial owners and legal forms

    24. 24. Unwrapping the beneficial ownership of legal persons

    25. 25. Screening

    26. 26. Screening universe

    27. 27. Sanctions

    28. 28. Sanctions

    29. 29. Adverse media

    30. 30. Internal watchlist

    31. 31. Politically exposed persons

    32. 32. PEP

    33. 33. Natural persons who are or have been entrusted with prominent public functions

    34. 34. Identifying suspicious transactions

    35. 35. Defensive reporting

    36. 36. Red flags for identifying suspicious transactions

    37. 37. Conclusion

    1. 1. Introduction

    2. 2. Sanctions compliance

    3. 3. A brief history of global sanctions - Ancient and Pre-modern sanctions

    4. 4. Cold war and UN-Era sanctions

    5. 5. Post-Cold War expansion

    6. 6. Post-9-11 Financial Sanctions and counter-Terroris

    7. 7. Modern Sanctions Era (2010s-2020s)

    8. 8. Committee

    9. 9. National sanctions secretariat

    10. 10. FATF Recommendation 7

    11. 11. Types of sanctions

    12. 12. Who imposes sanctions

    13. 13. What are key sanctions compliance requirements

    14. 14. Screening

    15. 15. Essential component

    16. 16. Actions in case of positive match

    17. 17. Mitigating measures

    18. 18. Tax Compliance

    19. 19. Detection of tax evasion

    20. 20. Enforcement

    21. 21. What is FATCA

    22. 22. FATCA V CRS

    23. 23. Three pillars of FATCA

    24. 24. Conclusion

    25. 25. Summary

    1. AML/CFT Training Programme - Multiple Choice Questionnaire

About this course

  • 102 lessons
  • 5 hours of video content