14.08.2023, 20:37
Fraud Prevention, Dispute Resolution And Pci-Dss Masterclass
Last updated 11/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 10.10 GB | Duration: 17h 37m
The fundamentals of fraud prevention and monitoring + dispute resolution + PCI-DSS requirements - now in one course.
What you'll learn
You'll learn about general and specific approaches to fraud, from social engineering to card block fraud, convenience fraud, and many others by different actors
You'll learn an extensive list of dispute chargeback codes, from fraudulent processing to invalid core, invalid data, late presentment, and many others
You'll learn an extensive list of fraud prevention techniques: Hotlists, velocity checks, device identification, out-of-wallet checks, fraud scores, etc
You'll learn about the dispute resolution flow for banks (acquiring + issuing), with three main steps: Retrieval request, chargeback and 2nd chargeback
You'll learn about how a fraud monitoring strategy is assembled, based on merchant risk and transaction volume, as well as data processing/usage consideartions
You'll learn about ADR (Alternative Dispute Resolution), and its three main types: negotiation, mediation and arbitration, as well as their differences
Requirements
You don't need prior knowledge (naturally, knowledge of the payment industry helps, or of fraud solutions or dispute resolution mechanisms, but is NOT required)
Description
THE ULTIMATE PAYMENT SYSTEM FRAUD/DISPUTE MASTERCLASSYou'll find this ultimate masterclass contains two courses on payment system fraud and dispute:Fundamentals of Fraud Prevention and Monitoring;Introduction to Payment Dispute Resolution;Together in this masterclass, you'll find the definitive experience for any payment professional that wants to diagnose and address any type of payment issue.You will learn about dispute frameworks, fraud prevention tools and systems, internal processes, and more.Much more.WHY FRAUD PREVENTION?If you want to understand how fraud is committed, or how disputes are resolved, you'll see it's not that easy.You'll find countless fraud techniques to take into account. You'll learn that perpetrators can be of different types and use different approaches. And you'll soon get to know that disputes can come in many shapes and sizes, and due to many different reasons.If you're aiming to know more about fraud prevention an dispute resolution - whether as a fraud monitoring professional, a payments professional, a commercial banker, or any other type of professional that wants to master the theory and practice of both, you'll agree that finding the right information is crucial.Unfortunately, most fraud prevention or dispute resolution courses you'll find nowadays don't fit the minimum requirements.Either the information you come across is too academical and not something you can put into practice, or there are no specific examples, or information is just missing!In a world where information must be constantly updated, you'll hardly find a reliable, comprehensive information source for fraud and disputesAnd this has consequences not just for your career, but yourself personally as well.What happens when you don't have enough information (or the adequate format)?You'll become confused by the myriad fraud prevention techniques and types of systems, or the myriad dispute resolution frameworks;You won't be able to properly identify when to use a certain technique to prevent a certain type of fraud of manage a certain dispute;You'll become frustrated and irritated that you don't know why a system works, or why it doesn't;You won't be able to properly identify why a fraud detection technique works, or whether a dispute resolution process works or not;You won't know how to optimize a specific fraud prevention solution (or why it's not optimized), or a dispute resolution process - both in terms of people and machine problems;So if you want to know everything about fraud and disputes, what is my proposed solution?This new course masterclass, of course!THE ULTIMATE FRAUD AND DISPUTE PREVENTION COURSEUnlike other fraud prevention or dispute resolution courses you'll find out there, this course is comprehensive and updated.In other words, not only did I make sure that you'll find more topics (and more in-depth) than other courses you may find, but I also made sure to keep the information relevant to the types of fraud and disputes you'll find nowadays.Because both fraud prevention systems and dispute resolution workflows seem complex, but they rely on simple principles and practices.In this course, you'll learn about the essentials of how fraud is both performed and prevented, as well as how disputes and chargebacks are initiated, as well as managed. Information that comes both from the principles and theory present in the finance world, but also my own experience and insider knowledge, working with multiple institutional banks.In this 11-hour+ masterclass, you'll find the following modules:Introduction to Fraud Prevention and Monitoring (~4 hours)You'll learn about the Fundamentals of Fraud (who are the perpetrators, how they obtain information, and how they commit fraud);You'll get to know the main Approaches to Fraud (including general approaches of obtaining and using information, from identity theft, to convenience fraud, social engineering and more, specific techniques such as cash return fraud or card block fraud, and the different types of perpetrators);You'll learn about all possible Fraud Prevention Techniques (individual techniques to prevent fraud including hotlists, velocity checks, and many others);You'll learn about full Fraud Prevention Systems (how complete fraud prevention solutions are assembled and maintained, and best practices of doing so);Introduction to Dispute Resolution (~2.5 hours)You'll learn the Fundamentals of Disputes (how they occur, which parties are involved);You'll get to know the ADR or Alternative Dispute Resolution framework (negotiation, mediation and arbitration, and when each should be used);You'll learn what ODR or Online Dispute Resolution is (its context, steps, and implementations);You'll get to know the principles of Dispute Resolution in Merchant Banking (how banks should deal with merchant disputes, process flow, and more);You'll learn about all major Chargeback Reason Codes (an extensive list of the major categories of chargeback reason codes, from fraud to processing errors, authorization errors or consumer disputes, as well as guidelines for both banks and merchants);Fundamentals of PCI-DSS (~5 hours)You'll learn about the Essentials of PCI-DSS (assessment process, history, goals, etc);You'll learn about the 12 Requirements of PCI-DSS v.3.2.1, and the specific controls demanded by every single one of them;By the end of this course, you will know exactly how fraud is performed, how disputes occur and are resolved, how both can be prevented, in terms of principles and techniques, and how PCI-DSS compliance can be achieved.The best of this masterclass? Inside you'll find all these 3 courses.In short, even if you only fit one of the three profiles (only fraud, only disputes, only PCI-DSS), you will still have a course dedicated to it!And naturally, if you are interested in multiple of these topics... this is the ultimate package for you.THE PERFECT COURSE... FOR WHOM?This course is targeted at different types of people. Naturally, if you're any current or future fraud prevention/dispute resolution professional, you will find this course useful. If you're a commercial banker, you'll even fit both criteria. But if you're any other professional that aims to know more about fraud or disputes, you'll also find it useful.More specifically, you're the ideal student for this course if:Introduction to Fraud Prevention and MonitoringYou're someone who wants to know more about fraud execution itself (how fraud is performed, specific executions, and by whom);You're someone who is interested in fraud prevention systems (how they work, how can they be optimized, what problems usually occur);You're someone who wants to know about specific fraud prevention tools and how they act in combination (identity verification tools, technological tools, others, and how they come together);You're someone who is interested in the role of both people and systems in fraud prevention (how to optimize both a system, but also the people working with that system);Introduction to Dispute ResolutionYou're someone who will directly deal with dispute management or resolution;You're someone who wants to know more about the different types of dispute resolution (both litigation and ADR, offline or not);You're someone who wants to specifically know how to address disputes involving merchants and cardholders (as a bank or merchant);You're someone who wants to know more about the different types of reason codes for chargebacks (and how to prevent them);Fundamentals of PCI-DSSYou're someone who will directly deal with PCI-DSS certification;You're someone who regularly deals with card data and wants to know about the associated security controls;You're someone in charge of specific controls in an organisation that deals with card data (firewall, antivirus, access control, media protection or disposal, etc)LET ME TELL YOU... EVERYTHINGSome people - including me - love to know what they're getting in a package.And by this, I mean, EVERYTHING that is in the package.So, here is a list of everything that this masterclass covers:From Fundamentals of Fraud Prevention and MonitoringYou'll learn about the general approaches to fraud, including convenience, social engineering, internal fraud and identity theft;You'll learn about how convenience fraud works, with easily accessible information that can be used to commit fraud;You'll learn about how social engineering works, manipulating people into giving up confidential information;You'll learn about how internal fraud works, by leveraging internal information to facilitate fraud;You'll learn about how identity theft works, by having enough information about someone to impersonate them;You'll learn about the different execution types of fraud, including consumer fraud, card block fraud, single-use fraud, cash return fraud, collusive and affiliate fraud, and dynamic or morphing fraud;You'll learn about how consumer fraud works, by lying about product characteristics or other elements to obtain returns or cash;You'll learn about how card block fraud works, generating a batch of card numbers and gauging which are insecure, to be later exploited in purchases;You'll learn about how single-use fraud works, by making one single purchase in a merchant (or multiple), being harder to catch;You'll learn about how cash return fraud works, by buying products with a stolen card and returning them for cash;You'll learn about how dynamic or morphing fraud works, by changing fraud execution to bypass fraud detection;You'll learn about fraud prevention techniques relying on data verification, including velocity checks, card verifications, charge and deposit verifications;You'll learn about how velocity checks work, by analyzing the number of times a credit card (or another field) is either used or changed within a given period of time;You'll learn about how card verifications work, such as Mod10, BIN, and/or card security schemes, both for data integrity and identity verification;You'll learn about how charge verifications work (verifying a charge with the bank) and deposit verifications (making a deposit to verify a bank account);You'll learn about fraud prevention techniques relying on identity verification including lists, field verifications, address verifications, manual authentication and automated lookups;You'll learn about how lists work - both hotlists and warm lists of known offenders, but also whitelists for trusted clients;You'll learn about how simple field verifications work for email, age, and others - quick, but not very effective security measures;You'll learn about how address verifications work, for both the billing and shipping addresses (the latter being more complex and expensive, but a lot more secure in terms of preventing fraud);You'll learn about how manual authentication works - by having someone call the client to verify a transaction, or manually search information to verify their identity (usually done by bank staff for KYC requirements);You'll learn about how automated lookups of addresses or phone numbers work, mostly to double-check existing information;You'll learn about fraud prevention techniques relying on technology (device or token identification, digital signatures and/or consumer location);You'll learn about how device or token identification works, by using software such as cookies or hardware such as USB dongles, smart cards or biometrics in order to tie a device to a specific person, and authenticate them using that device;You'll learn about how digital signatures work, through asymmetric cryptography, authenticating a transaction through the person's private key;You'll learn about how consumer location techniques work - both in terms of tracking someone's IP or proxy (including VPN), or through their cell phone GPS location;You'll learn about how fraud scoring and fraud rules can work to prevent fraud - appearing to be competing solutions, but actually working well together under certain conditions;You'll learn about fraud prevention techniques that are actual processes of institutions, including insurance, guarantees, manual reviews and representment;You'll learn about how insurance and guaranteed payments work, helping reimburse a merchant in the case of fraud, but representing an overhead in terms of costs and being restrictive in terms of the transactions accepted;You'll learn about how manual reviews by banks help guarantee the authenticity of a transaction, and how representment of information by the acquiring bank can help a merchant, but both with unstable results and high costs;You'll learn about technique considerations when assembling fraud prevention strategies, including determining the risk level of an entity, and the recommended techniques based on it;You'll learn about considerations in terms of the usage of fraud data - fraud rules, fraud scores, and guaranteeing consistency in the database;You'll learn about considerations in terms of the processing of fraud data - making sure that database field changes are documented, and that ETL (Extract, Transform, Load) processes don't ruin the data between operational DB and data warehouse;From Introduction to Payment Dispute ResolutionYou'll learn about the essentials of disputes (contractual vs. non-contractual disputes, payment disputes, issuer and acquirer banks);You'll learn about how ADR (Alternative Dispute Resolution) is and how it differs from litigation;You'll learn what the different types of ADR are (negotiation, mediation and arbitration), as well as the differences between these, and specific implementations of them;You'll learn about the ODR (Online Dispute Resolution) framework, as well as its context and six key principles (accountability, transparency, accessibility, credibility/accreditation, security and enforceability);You'll learn about the three major steps in an ODR process;You'll learn about the three major types of ODR tools (cyber courts, electronic ADR, internal ADR);You'll learn about implementations of ODR (such as blind bidding, cyber mediation, cyber negotiation and cyber arbitration), as well as specific case studies, such as ICANN-WIPO;You'll learn about general guidelines for more efficient dispute resolution as a merchant bank;You'll learn about the steps in the lifecycle of a dispute between an issuer and an acquirer bank, including the retrieval request, chargeback, and second chargeback;You'll learn about the conditions under which the payment scheme may become involved in a chargeback, as well as some measures by them (allocation vs. mediation, pre-arbitration vs. arbitration, liability shifts);You'll learn about disputes by different payment systems: debit cards, credit cards, ACH, prepaid cards, ATM;You'll learn about the four major categories of chargeback reason codes: fraud, authorization errors, processing errors, customer disputes;You'll learn about the usual types of chargeback reason codes due to fraud (not authorised or recognised transactions, fraudulent processing, monitored merchant or monitored card, the EMV liability shift);You'll learn about the usual types of chargeback reason codes due to authorization issues (missing or declined authorisation, card in recovery/lost card/stolen card, invalid authorization information),You'll learn about the usual types of chargeback reason codes due to processing errors (late presentment, invalid transaction code or invalid transaction data, duplicated payment or paid by other means, currency mismatches);You'll learn about the usual types of chargeback reason codes due to consumer disputes (mismatches in terms of goods - counterfeit, misrepresented, not delivered, others - cancelled or incomplete transactions, credit not processed);From Fundamentals of PCI-DSS:You'll learn about the clarification of all terms used in the PCI-DSS, including what is the CDE, what is CHD, SAD, whether an organisation must take an ROC or SAQ, as well as some "general" payment industry terms such as what is an issuing bank and an acquiring bank;You'll learn about the history of the PCI-DSS since 2004, with several iterations and its own release lifecycle;You'll learn about the merchant assessment process, based on their classification from Level 1-4, and how both SAQs and ROCs work, as well as the 8 different types of SAQs, and the types of machines/merchants they target, including the SAQ-A and SAQ-A-EP, the SAQ-B and SAQ-B-IP, the SAQ-C and SAQ-C-VT, the SAQ-P2PE-HW, and finally, the most general SAQ-D;You'll learn about the anatomy of a payment process, involving a cardholder and a merchant, from authorisation to authentication, clearing and settlement, and the role of the issuing bak, the acquiring bank and the card company;You'll learn about an overview of all 12 PCI-DSS requirements, as well as their relationship with the 6 goals;You'll learn all about Requirement 1 (Have a Firewall), including firewall configurations and standards, documentation on network topology and card data flows, setting up a DMZ, rejecting unsecured traffic, and more;You'll learn all about Requirement 2 (No Defaults), about removing default passwords/accounts/strings from devices, but also isolating server functionality and removing unnecessary ports/services/apps that may present vulnerabilities;You'll learn all about Requirement 3 (Protect Stored Data), about using strong encryption to protect cardholder data, as well as having proper data retention policies, data purging, as well as masking plaintext PANs, not storing SAD, and using proper key management and key lifecycle procedures;You'll learn all about Requirement 4 (Protect Transmitted Data), about using strong encryption when transmitting CHD across public networks such as cellular or satellite, as well as masking plaintext PANs in transit, especially across IM channels;You'll learn all about Requirement 5 (Prevent Malware), about having an antivirus solution on all commonly affected computers in order to prevent malware, as well as access control policies to prevent disabling AV software;You'll learn all about Requirement 6 (Develop Securely), about doing vulnerability ranking and timely patch installation for both internal and 3rd-party applications, as well as including security requirements in the SDLC, as well as training developers to protect against common exploits such as code injections, buffer overflows and many others;You'll learn all about Requirement 7 (Need-to-Know Access), about limiting access to CHD by personnel as much as possible, defining permissions by role, and having a formal mechanism for access control to consolidate this, such as LDAP, AD or ACLs;You'll learn all about Requirement 8 (Identify Access), about tying each action to a unique user, including forcing unique IDs, automatic logouts on inactivity, lockouts on wrong password attempts, removing inactive accounts, limiting third-party access, forbidding the use of shared IDs, forcing physical security measures to be used only by the intended user, and more;You'll learn all about Requirement 9 (Restrict Physical Access), about authorising and distinguishing visitors, enforcing access control to rooms with CHD, as well as the proper transport, storage and disposal of physical media containing CHD, with different sensitivity levels;You'll learn all about Requirement 10 (Monitor Networks), about logging. Having a logging solution that is operating, logging specific events (such as all failed operations, all admin operations, all operations on CHD, etc), logging specific elements in each event (such as the user ID, the operation status, the affected resource, etc), as well as having a single time synchronisation mechanism for all logs, FIM (File Integrity Monitoring) on logs, frequent log review and proper log retention;You'll learn all about Requirement 11 (Test Regularly), about performing regular scans for Access Points (APs), both authorised and non-authorised ones, as well as regular vulnerability scanning and regular penetration testing (from inside and outside, and multiple layers), as well as having FIM (File Integrity Monitoring) on all critical files, as well as having an IDS/IPS (Intrusion Detection/Prevention System) to prevent attacks;(Rest truncated due to text length limit);MY INVITATION TO YOURemember that you always have a 30-day money-back guarantee, so there is no risk for you.Also, I suggest you make use of the free preview videos to make sure the course really is a fit. I don't want you to waste your money.If you think this course is a fit and can take your fraud prevention knowledge to the next level... it would be a pleasure to have you as a student.See you on the other side!
Overview
Section 1: Masterclass: Intro
Lecture 1 Masterclass Intro
Lecture 2 Useful Information
Section 2: Fraud: Introduction
Lecture 3 Introduction
Section 3: Fraud: Fundamentals
Lecture 4 Fraud Fundamentals
Section 4: Fraud: Approaches
Lecture 5 Module Intro
Lecture 6 General Strategies: Intro
Lecture 7 General Strategies: Convenience
Lecture 8 General Strategies: Social Engineering
Lecture 9 General Strategies: Internal Fraud
Lecture 10 General Strategies: Identity Theft
Lecture 11 Specific Executions: Intro
Lecture 12 Specific Executions: Consumer Fraud
Lecture 13 Specific Executions: Card Block Fraud
Lecture 14 Specific Executions: Single-Use Fraud
Lecture 15 Specific Executions: Cash Return Fraud
Lecture 16 Specific Executions: Collusive/Affiliate Fraud
Lecture 17 Specific Executions: Dynamic/Tested Fraud
Lecture 18 Perpetrators: Intro
Lecture 19 Perpetrators: Consumers
Lecture 20 Perpetrators: Hackers and Crackers
Lecture 21 Perpetrators: White-Collar Criminals
Lecture 22 Perpetrators: Organized Crime Rings
Lecture 23 Module Conclusion
Section 5: Fraud: Prevention Techniques
Lecture 24 Module Intro
Lecture 25 Data Verification: Intro
Lecture 26 Data Verification: Velocity Checks
Lecture 27 Data Verification: Card Verification
Lecture 28 Data Verification: Charge/Deposit Verifications
Lecture 29 Identity Verification: Intro
Lecture 30 Identity Verification: Lists
Lecture 31 Identity Verification: Simple Field Verification
Lecture 32 Identity Verification: Address Verifications
Lecture 33 Identity Verification: Manual Authentication
Lecture 34 Identity Verification: Automated Lookups
Lecture 35 Technological Verification: Intro
Lecture 36 Technological Verification: Device/Token Authentication
Lecture 37 Technological Verification: Digital Signatures
Lecture 38 Technological Verification: Consumer Location
Lecture 39 Scores and Rules
Lecture 40 Processes: Intro
Lecture 41 Processes: Insurance and Guarantees
Lecture 42 Processes: Reviews/Representment
Lecture 43 Module Outro
Section 6: Fraud: Prevention Strategy
Lecture 44 Module Intro
Lecture 45 Strategy Stages
Lecture 46 Technique Considerations
Lecture 47 Data Usage Considerations
Lecture 48 Data Processing Considerations
Lecture 49 Module Outro
Section 7: Fraud: Conclusion
Lecture 50 Conclusion
Section 8: Dispute Resolution: Introduction
Lecture 51 Introduction
Section 9: Dispute Resolution: Considerations
Lecture 52 Dispute Considerations
Section 10: Dispute Resolution: ADR
Lecture 53 Intro
Lecture 54 Negotiation
Lecture 55 Mediation
Lecture 56 Arbitration
Lecture 57 Outro
Section 11: Dispute Resolution: ODR
Lecture 58 Intro
Lecture 59 Context and Principles
Lecture 60 Steps and Categories
Lecture 61 Implementation and Case Studies
Lecture 62 Outro
Section 12: Dispute Resolution: In Merchant Banking
Lecture 63 Intro
Lecture 64 General Guidelines
Lecture 65 Disputes by Payment System
Lecture 66 Dispute Lifecycle
Lecture 67 Scheme Involvement
Lecture 68 Outro
Section 13: Dispute Resolution: Reason Codes
Lecture 69 Intro
Lecture 70 Fraud: Introduction
Lecture 71 Fraud: Not Authorized/Recognised
Lecture 72 Fraud: Fraudulent Processing
Lecture 73 Fraud: Monitored Merchant or Card
Lecture 74 Fraud: EMV Liability Shift
Lecture 75 Authorization: Introduction
Lecture 76 Authorization: Missing/Declined Authorization
Lecture 77 Authorization: Card in Recovery/Lost/Stolen
Lecture 78 Authorization: Invalid Information
Lecture 79 Processing Errors: Introduction
Lecture 80 Processing Errors: Invalid Code or Data
Lecture 81 Processing Errors: Invalid Amount/Account
Lecture 82 Processing Errors: Duplicate/Other Payment
Lecture 83 Processing Errors: Currency Mismatches
Lecture 84 Processing Errors: Late Presentment
Lecture 85 Consumer Disputes: Introduction
Lecture 86 Consumer Disputes: Mismatch of Goods
Lecture 87 Consumer Disputes: Cancelled/Not Completed
Lecture 88 Consumer Disputes: Credit Not Processed
Lecture 89 Outro
Section 14: Dispute Resolution: Outro
Lecture 90 Course Outro
Section 15: PCI-DSS: Introduction
Lecture 91 Course Intro
Section 16: PCI-DSS: Essentials
Lecture 92 Module Intro
Lecture 93 Terminology Clarifications
Lecture 94 PCI-DSS History
Lecture 95 Merchant Assessment
Lecture 96 Anatomy of a Payment Flow
Lecture 97 Module Outro
Section 17: PCI-DSS: The 12 Requirements (v.3.2.1)
Lecture 98 Module Intro
Lecture 99 Overview
Lecture 100 Requirement 1: Keep a Firewall
Lecture 101 Requirement 2: No Defaults
Lecture 102 Requirement 3: Protect Stored Data
Lecture 103 Requirement 4: Protect Transmitted Data
Lecture 104 Requirement 5: Prevent Malware
Lecture 105 Requirement 6: Develop Securely
Lecture 106 Requirement 7: Need-to-Know Access
Lecture 107 Requirement 8: Identify Access
Lecture 108 Requirement 9: Restrict Physical Access
Lecture 109 Requirement 10: Monitor Networks
Lecture 110 Requirement 11: Test Regularly
Lecture 111 Requirement 12: InfoSec Policy
Lecture 112 General Patterns and Recap
Lecture 113 Module Outro
Section 18: PCI-DSS: Outro
Lecture 114 Course Outro
Section 19: Additional Module: Security Controls
Lecture 115 Intro
Lecture 116 Acquisition Strategy
Lecture 117 Code Analysis
Lecture 118 Code Signing
Lecture 119 Controls by Data Classification
Lecture 120 Criticality Analysis
Lecture 121 Cryptographic Protection
Lecture 122 Cyber Threat Hunting
Lecture 123 Data De-Identification and Anonymisation
Lecture 124 Data Governance Structures
Lecture 125 Data Purpose and Authority
Lecture 126 Data Retention and Disposal
Lecture 127 Defense-In-Depth
Lecture 128 Information Tainting
Lecture 129 Locked Rooms/Devices/Ports
Lecture 130 Media Downgrading/Redacting
Lecture 131 Physical Media Protection
Lecture 132 Provider Assessment and Monitoring
Lecture 133 Security/Privacy Architectures
Lecture 134 System Safe Modes
Lecture 135 Thin/Diskless Devices
Lecture 136 Usage Agreements
Lecture 137 Visitor Controls
Lecture 138 Outro
Section 20: Additional Module: Pitching Technical Projects
Lecture 139 Introduction
Lecture 140 Assembling: Introduction
Lecture 141 Assembling: Actions and Implementation
Lecture 142 Assembling: Roles and Responsibilities
Lecture 143 Assembling: Scope, Framework, Roadmap
Lecture 144 Assembling: Governance Structures
Lecture 145 Assembling: Trackable Metrics
Lecture 146 Presenting: Intro
Lecture 147 Presenting: Recency and Primacy
Lecture 148 Presenting: Leveraging Specifics
Lecture 149 Presenting: Displayed Authority
Lecture 150 Presenting: The Hero's Journey
Lecture 151 Presenting: Tiredness and Distraction
Lecture 152 Dealing with Objections: Introduction
Lecture 153 Dealing with Objections: Flipping and Diagnosing
Lecture 154 Dealing with Objections: UP Answers
Lecture 155 Dealing with Objections: Progress and Loss
Lecture 156 Dealing with Objections: Political Capital
Lecture 157 Securing Buy-In: Introduction
Lecture 158 Securing Buy-In: Implementation and Opinions
Lecture 159 Securing Buy-In: Tailored Benefits
Lecture 160 Securing Buy-In: Effort Shaping
Lecture 161 Securing Buy-In: Future Lock-In
Lecture 162 Full Runthroughs: Introduction
Lecture 163 Full Runthroughs: Pitching PCI-DSS
Lecture 164 Full Runthroughs: Pitching Vendor Assessments
Lecture 165 Full Runthroughs: Pitching Data Governance
Lecture 166 Full Runthroughs: Pitching Data Management
Lecture 167 Module Outro
Section 21: Bonus Lecture
Lecture 168 Bonus Lecture
You're any current (or future) fraud monitoring professional, looking to know more about how fraud is performed and how it's stopped,You're any current (or future) dispute resolution professional, looking to know how disputes and chargebacks are resolve between merchants and cardholders,You're anyone else curious about fraud prevention or dispute resolution!
Homepage