2-Day Instructor-Led Programme
Understand how state actors use cyber operations to attack financial systems, evade sanctions through cryptocurrency, and manipulate markets, and build the defences to detect and disrupt these operations.
Duration
2 Days
Price
$2,495
Financial infrastructure is a primary target and enabler of state-level cyber operations. SWIFT messaging attacks, cryptocurrency theft at scale, market manipulation through cyber intrusion, and sanctions evasion via decentralised finance represent a new category of financial warfare that compliance, security, and risk professionals are ill-equipped to address with traditional frameworks. This two-day programme examines the mechanics of financial cyber warfare from both the attacker and defender perspective. Delegates gain the intelligence context to understand why financial targets are selected, the technical awareness to recognise evasion tradecraft in transaction flows, and the operational skills to build detection and response capabilities aligned to financial regulators and law enforcement requirements.
State-actor transaction monitoring, cryptocurrency tracing awareness, SWIFT security assessment, OFAC compliance advising, and financial cyber incident regulatory coordination.
Explain how state actors exploit financial infrastructure for strategic advantage and revenue generation.
Identify the technical mechanisms of cryptocurrency theft and sanctions evasion used by state-sponsored groups.
Configure transaction monitoring rules to detect state-actor financial typologies.
Apply OFAC compliance requirements when state-sponsored sanctions evasion is identified.
Coordinate financial cyber incident response with regulators and law enforcement.
Advise on SWIFT security controls and anomaly detection architecture for financial systems.
Familiarity with financial crime compliance or cybersecurity at a professional level.
No advanced technical knowledge required; delegates from risk, compliance, and legal backgrounds are welcome.
Step-by-step learning journey from basics to professional practice
Master these in-demand skills through hands-on practice
A clear view of the roles this programme supports, what typically comes next, and where learners progress over time
Choose the learning format that works best for you and your team
Instructor-Led Training
Join live instructor-led sessions from anywhere. Interactive, engaging, and flexible.
Price per person
Group enrolments and early planning options available.
All prices are exclusive of VAT where applicable. Group enrolments and custom packages available on request.
Not everyone learns best in a group. If you want focused guidance, faster clarity, and confidence you can use on the job, our 1-to-1 Fast-Track Training gives you private, mentor-led support tailored to your experience and goals.
"Many learners choose 1-to-1 when they want understanding, not memorisation."
Everything you need to know about the certification exams
You will receive an Xcademia certificate of completion based on participation and successful completion of labs and scenario simulations.
Everything you need to know about this course
Both. The course is designed for cross-functional teams and explicitly bridges technical indicators with compliance obligations. Compliance and risk professionals will cover transaction monitoring and regulatory requirements; security professionals will cover intrusion patterns and detection architecture.
Take the next step in your professional development