MasterClass for Telecoms Fraud Professionals
GRAPA's Telco Fraud and Cyber Security Training is the industries oldest, most extensive and recognized of certifications available for the telecoms fraud professional. 

Over 800 Fraud, Audit and Security Analyst have succesfully completed this 40-hour certification and workshop program.

This program was compiled soliciting best practices in fraud management and the unique application of cyber-enabled fraud management for fraud specialists around the world and has been designed to provide attendees with a new, innovative, and comprehensive approach to the professional practice of combating fraud.

The unique and comprehensive GRAPA fraud standards, governance model, methodologies and framework guarantee the student is being provided with the latest and best in Fraud Containment tools and approaches.

GRAPA's exploit-library-driven approach provides a grounding for fraud professionals in real-world risks and exposures.

Certification : CTFA(Certified Telecoms Fraud Analyst) or DCFP (Data & Cyber Fraud Professional)

Telecoms fraud management is changing at a exponential rate, as traditional fraudsters learn how to adapt their incursion methods to leverage cyber-attacks. The scope of the fraud manager is greatly increased in this new reality, but the majority for fraud management teams are decidedly behind the times when it comes to modernizing their approaches and catching up with the fraudsters themselves. 

Image
Image

Cyber Security Confusion

One of the biggest challenges the fraud management team faces, is the internal battle over responsibility when it comes to CYBER FRAUD. Is cyberfraud a primarily FRAUD issue, or primarily an I/T Security issue. Too many teams are learning too late that the fraud team needs to take the lead if frauds are going to be detected and mitigated effectively.

Whether you want to empower your team to move in the direction of the new generation of Cyber-Enabled Fraud Countermeasures or the more traditional approach to running a fraud management team, our core curricullum can help move your team in the right direction. 

Our unit based customization approach allows you to focus on those things most critical to YOUR TEAM - today and in the future.
Professional Practice of RA & BA

This course provides the student with a comprehensive overview of the different ways hackers and cybercriminals physically hack into service providers' radio, fiber, and cable connections. Key background for anyone involved in ICT - Telecoms.

Image
Intro to Controls

Explores fraud management frameworks, GRAPA standards, and methodologies like FISHbone, Incident Management Lifecycle, and more. Discusses the uniqueness of Telecom fraud management compared to other industries.

Image

Delves into the key functions, tools, and systems used in fraud management, from benchmarking software configurations to the use of advanced analysis methods like neural networks, regression analysis, and more.

Image

The course covers the basics of how to protect a voice network from SS7, SMS and other network level hacks and attack vectors. Learn about CDRs, SMS, SS7 attack vectors and how to protect voice networks.

Image

The unit provides the student with an overview of the key components that define the security and fraud protection against hacking and incursion for data products and services.

Image
Professional Practice of RA & BA

This course provides the student with a comprehensive review of the different ways that hackers and cyber criminals physcially breech the radio, fiber and cable connections of the service providers. Key background for anyone in Fraud.

Image
Intro to Controls

This course provides the student with a comprehensive review of the different ways that hackers and cyber criminals use programming techniques to make hacks and fraud happen.

Image

Social Engineering - the science of hacking people. How do fraudsters trick people into doing things they usually would not. Social engineering is not a trick, it is a science, a skilled application of psychological and neurological principles.

Image

Provides a comprehensive look at various forms of interconnect frauds especially injection frauds, focusing on detection and prevention methods, and how these frauds impact telecom revenue.

Image
Professional Practice of RA & BA

This course examines various telecom frauds such as SIMBOX fraud. It also covers the weaknesses fraudsters exploit and best practices for fraud detection.

Image
Intro to Controls

The course looks into GSM roaming frauds, including IRSF, CAP fraud, and partner management issues. It covers standard fraud detection and prevention methods used in the roaming ecosystem.

Image

This course provides an in-depth review of accounting principles and vulnerabilities as they relate to fraud exposures and issues. Factoring, Man in the Middle and dozens of other fraud exploits use the weaknesses in accounting system as their attack

Image

This course teaches how to effectively run a fraud management department for MVNOs, MNOs, or other virtual operators. It covers fraud risks, detection techniques, and management strategies specific to virtual network operations and how to safeguard a

Image
Professional Practice of RA & BA

This course covers fraud risks in digital financial services and mBanking. It explores various fraud types, including cyber attacks, identity theft, and transaction fraud, while equipping fraud managers with tools and strategies to prevent, detect.

Image
Intro to Controls

This course covers fraud management in telecom corporate services, focusing on leased lines, CVPN, managed services, MPLS, and cloud services. It addresses key fraud risks and offers strategies for detecting, preventing and managing fraud.

Image

This course teaches fraud managers how to integrate agile management principles into fraud management practices. It explores how agile can enhance response to emerging fraud risks and delves into new fraud threats that arise in agile environments

Image

This course equips fraud managers with the knowledge and tools needed to defend channels and supply chains from fraud attacks. It covers key risks, fraud detection techniques, and strategies to secure vulnerable points in both digital and physical.

Image
Professional Practice of RA & BA

This course provides a comprehensive review of the various methods used by fraudsters to attack WiFi networks and heterogeneous networks (Het Net), along with the strategies and best practices for protecting them from security breaches and fraud. 

Image
Intro to Controls

This course provides an in depth review of the different business intelligence techniques adpated to optimize your fraud management practice. How to use data warehouse, statistical models and predictive outcomes.

Image

This course provides a comprehensive review of the fixed line services - Cable - Fiber - DSL and how to protect them from fraud attack.

Image

Telecoms Fraud Management Program Outline Professional Practices, Principles & Methods

1. Telecoms Fraud Management Fundamentals
2. Managing a fraud management system effectively
3. Voice Network Fraud and Controls
4. Data Network Fraud and Controls
5. Interconnect Frauds – Non-Traffic based
6. Interconnect Frauds – Traffic based
7. Roaming Fraud Management
8. Physical Hacking of Voice and Data Networks
9. Logical Hacking of Voice and Data Networks
10. Social Engineering and its role in frauds
11. Collusion and Employee Frauds
12. Collusion and Customer Frauds
13. Accounting Fraud Management
14. Corporate Sales and Backhaul Fraud
15. Customer Frauds
16. Channel, Agent and Point of Sales Fraud
17. Supply Chain Fraud
18. Mbanking, Money Laundering and Credit Card Frauds
19. Broadcast and Content Fraud Management
20. Principles of Cyber Fraud Management

Learn about the primary mission of Fraud Management to:

a) Proactively identify all major risks to the company due to fraud attack from user, partner and cyber attack vectors. 
b) Quantify those risks in a consistent manner so that management has a clear understanding of how significant that risk is
c) Report and follow-up on risk to operational teams and top management
d) Mitigate the risk and work with operational manager to remedy the root causes.

Learning Objectives :

* Gain an exhaustive overview of all of the different areas within the telecom where Fraud Management teams are typically involved
* Learn about SiMBOX Fraud, Interconnect Frauds, Bypass Fraud, Traffic Piracy, Premium Rate Fraud, PBX HACKING AND ALL OTHER MAJOR FORMS OF TELECOMS FRAUD
* Learn the latest methods for the detection and deterence of the largest frauds
* Learn about the emerging role of fraud management within the context of the larger cyber security domain
* A comprehensive introduction to the full range of fraud vulnerabilities in network, I/T, sales, operations, accounting, channels and the customer domains.
* Learn how proactive FM teams are helping protect their companies assets and revenues
* An introduction to the Scientific, Systematic and Proven approach to the organization and addressing of fraud risks as defined by the GRAPA standards and Fraud Experts from around the world
* Learn how frauds are organized and carried out , and the proper methods for detection and deterrence of the frauds.
* How to build and deploy an effective and efficient fraud management team.