Course curriculum
-
-
1. Introduction
-
2. Money Laundering_
-
3. Terrorist financing
-
4. Global and Local AML-CFT Regulatory Framework
-
5. Consequences of Non-Compliance with AML and CFT
-
6. Failure to comply with AML-CFT
-
7. AML-Governance and compliance culture
-
8. Compliance Culture
-
9. Signs of a weak compliance culture
-
10. Three line of defence
-
11. Importance of ongoing AML-CFT Training
-
12. Takeaway - compliance is Everyone's Responsibility
-
-
-
1. Introduction
-
2. Three key stages of amaoney Laundering
-
3. Methods of Money Laundering
-
4. How does Terrorist Financing work
-
5. Trade-based Money Laundering
-
6. Trade Exploitation
-
7. Methods of Trade Based Money Laundering used by criminals
-
8. Introduction to virtual Asset Money Laundering
-
9. Risks and challenges of virtual Asset Money Laundering
-
10. Methods of Laundering Money through virtual Assets
-
11. What is crowdfunding
-
12. Main Methods of crownfunding for terrorism
-
13. Cybercrimes
-
14. Types of cybercrimes
-
15. Cybercrime - Challenges for Regulators and institutions
-
16. Synthetic identity Theft
-
17. Global relevance including in Mauritius
-
18. Combating Synthetic identity Theft
-
19. Misuse of citizenship
-
20. shell companies
-
21. Mitigating the risks
-
22. Why Real Estate exists
-
23. How Real Estate is used
-
24. Environmental crimes
-
25. Key types of Environmental crimes
-
26. Romans scams
-
27. Conclusion
-
-
-
1. Introduction
-
2. Customer due diligence
-
3. Legal Framework
-
4. Third Party Reliance
-
5. The Fundamental Objectives of CDD
-
6. Applicability of CDD
-
7. Risk-based Approach -RBA
-
8. What are the 4 pillars of a risk-based approach
-
9. Key aspects of a risk-based approach to CDD
-
10. Benefits of a risk-based approach
-
11. Simplified and enhanced due diligence
-
12. Risk factors
-
13. Structured KYC file
-
14. Identification and verification process
-
15. Why understanding the customer is important
-
16. Private individuals ( Natural Persons) resident in Mauritius
-
17. Locally incorporated companies
-
18. Source of funds (Sof) and source of wealth (soW)
-
19. Risk factors related to soF and soW
-
20. Beneficial Owner
-
21. FIAML Regulations define
-
22. Critical implications
-
23. Beneficial owners and legal forms
-
24. Unwrapping the beneficial ownership of legal persons
-
25. Screening
-
26. Screening universe
-
27. Sanctions
-
28. Sanctions
-
29. Adverse media
-
30. Internal watchlist
-
31. Politically exposed persons
-
32. PEP
-
33. Natural persons who are or have been entrusted with prominent public functions
-
34. Identifying suspicious transactions
-
35. Defensive reporting
-
36. Red flags for identifying suspicious transactions
-
37. Conclusion
-
-
-
1. Introduction
-
2. Sanctions compliance
-
3. A brief history of global sanctions - Ancient and Pre-modern sanctions
-
4. Cold war and UN-Era sanctions
-
5. Post-Cold War expansion
-
6. Post-9-11 Financial Sanctions and counter-Terroris
-
7. Modern Sanctions Era (2010s-2020s)
-
8. Committee
-
9. National sanctions secretariat
-
10. FATF Recommendation 7
-
11. Types of sanctions
-
12. Who imposes sanctions
-
13. What are key sanctions compliance requirements
-
14. Screening
-
15. Essential component
-
16. Actions in case of positive match
-
17. Mitigating measures
-
18. Tax Compliance
-
19. Detection of tax evasion
-
20. Enforcement
-
21. What is FATCA
-
22. FATCA V CRS
-
23. Three pillars of FATCA
-
24. Conclusion
-
25. Summary
-
-
-
AML/CFT Training Programme - Multiple Choice Questionnaire
-

About this course
- 102 lessons
- 5 hours of video content