Advanced Anti-money Laundering

Advanced Anti-money Laundering

Course schedule

Classroom Training:
DateVenueDurationPrice
1 - 12 Jun 2026London10 days£7,695
10 - 21 Aug 2026London10 days£7,695
26 Oct - 6 Nov 2026London10 days£7,695
27 - 31 Jul 2026Singapore10 days£7,695
24 - 28 Aug 2026Barcelona10 days£7,695
28 Sep - 2 Oct 2026Paris10 days£7,695
26 - 30 Oct 2026New York10 days£7,695
23 - 27 Nov 2026Istanbul10 days£7,695
7 - 18 Dec 2026Barcelona10 days£7,695

Please note: prices shown above are exclusive of VAT (20%).

If you don’t see your preferred course date, please contact us.

Course Overview

This course develops advanced strategies for preventing, detecting, and responding to cybercrime. Delegates study cybersecurity governance, penetration testing, and digital forensics. Participants learn to align technology defences with organisational risk management. The programme equips professionals to protect digital infrastructure and maintain operational continuity under cyber threat.

Who Should Attend

Professionals aiming to deepen their expertise and enhance their organisational impact. Past delegates have included:

  • Professionals
  • Managers
  • Analysts
  • Supervisors
  • Consultants

Course Outcomes

  • Design advanced AML programmes incorporating risk-based methodologies.
  • Conduct complex investigations using AI, analytics and forensic tools.
  • Evaluate high-risk customers, jurisdictions and transaction patterns.
  • Strengthen compliance culture through targeted AML training initiatives.
  • Manage relationships with regulators and respond effectively to findings.

Course Topics

Designing Effective EFMS Frameworks

  • Define target operating models covering detection, prevention, and response.
  • Integrate EFMS with case management, KYC, and transaction monitoring.
  • Set tuning, feedback, and model-performance governance processes.
  • Align programme KPIs with fraud loss reduction and customer impact.

Advanced Fraud Detection and Analytics

  • Use rules, machine learning, and network analytics for high-risk patterns.
  • Balance hit-rate and false-positive trade-offs through iterative testing.
  • Combine internal and external data sources for stronger detection.
  • Operationalise alerts with triage, prioritisation, and feedback loops.

Understanding Regulatory Frameworks and Global Standards

  • Map applicable domestic and international regulations to business activities.
  • Interpret supervisory expectations, guidance, and emerging regulatory trends.
  • Align policies, procedures, and controls with mandatory standards and codes.
  • Prepare evidence and documentation to demonstrate regulatory compliance.

Implementing Risk-Based Compliance Strategies

  • Build compliance risk registers with clear ownership and thresholds.
  • Prioritise controls using impact–likelihood scoring and risk appetite.
  • Integrate monitoring, testing, and assurance into BAU processes.
  • Use metrics and KRIs to report risk posture to senior leadership.

Conducting Investigations and Ensuring Audit Readiness

  • Design investigation protocols covering evidence, interviews, and escalation.
  • Maintain defensible records to withstand internal and external audits.
  • Coordinate with legal, audit, and HR for complex or sensitive cases.
  • Close investigations with root-cause analysis and action plans.

Cybercrime Threat Landscape in Banking

  • Profile prevalent fraud schemes and attack vectors across channels.
  • Track evolving TTPs used by cybercriminals and organised groups.
  • Assess vulnerabilities across people, process, and technology layers.
  • Use threat intelligence to anticipate and prioritise defences.

Digital Fraud Prevention Strategies

  • Layer controls for authentication, authorisation, and transaction integrity.
  • Deploy behavioural analytics, device fingerprinting, and velocity checks.
  • Balance friction, customer experience, and fraud loss outcomes.
  • Measure control effectiveness and recalibrate tuning regularly.

Cybersecurity Controls and Defences

  • Implement endpoint, network, and application security controls.
  • Strengthen identity, access management, and privileged accounts.
  • Harden APIs, encryption, and key management for financial data.
  • Embed secure-by-design practices across the change lifecycle.

Incident Response and Recovery

  • Establish playbooks for detection, containment, and eradication.
  • Coordinate crisis communications and stakeholder notifications.
  • Perform root-cause analysis and lessons-learned reviews.
  • Restore services safely with validated recovery procedures.

Customer Awareness and Behavioural Controls

  • Design campaigns to reduce social engineering and payment scams.
  • Use nudge techniques and warnings to change risky behaviours.
  • Partner with industry and law enforcement on public education.
  • Measure awareness impact and adapt content to threat trends.

Enquire About our Course

Please fill out all the fields below so we can provide the best support we can.

Your Details

Enquire About an Online Course

Please fill out all the fields below so we can provide the best support we can.

Your Details

Enquire About an In-House Course

Please fill out all the fields below so we can provide the best support we can.

Your Details

Apply below for this course

Please ensure all fields are filled out.

If for any reason you are struggling to submit this form please email us here so we can send you the relevent application forms to fill out.

Course Download

Please fill out all the fields below to download this course brochure.

Your Details