course

Fraud and Personal Identity Theft

93 Enrolled
1.5 Hours (On-Demand)
1.5 CPE  

This course is a premium course it can be accessed either by individual purchase or through a premium subscription

Purchase this course | $54

Identity theft is defined as the use of one person’s identity or personally identifying as another person without that person's permission. Identity theft can be committed against individuals as well as organizations.

Identity theft has become a major problem internationally. In today’s world of internet and social media, individuals need to be aware of the types of identify theft that could impact them personally.  This course will focus specifically on personal identify theft and processes individuals can use to protect their information.

Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.

Learning Objectives
  • Recognize the types of personal identity theft
  • Explore the laws, such as Federal Privacy Laws, that have been put into place to combat identity theft.
  • Explore the methods to protect individuals against identity theft
Last updated/reviewed: March 12, 2024

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Frameworks And Concepts
  4. Cyber Risk Framework - Identify Assets
  5. Cyber Risk Framework - Prioritize Assets
  6. Cyber Risk Framework - Protect Assets
  7. Cyber Risk Framework - Detect Part One
  8. Cyber Risk Framework - Detect Threats Part Two
  9. Cyber Risk Framework - Respond
  10. Cyber Risk Framework - Recover
  11. Cyber Risk Framework - Utilizing The Tier Approach
  12. Fraud and Personal Identity Theft
  13. Fraud and Business Identity Theft
11 Reviews (53 ratings)

Reviews

5
Member's Profile
Lynn, Thank you for the great overview of personal identity theft. I am the wiser for the time I spent with you. Now on to Business identity theft so I have the wide acumen that you offer.

4
Member's Profile
What about online identity theft companies? What do they do and are there worth the money? What are the steps to take if you have your identity stolen?

4
Anonymous Author
Good pertinent course for people whose identities may be subject to theft that goes well beyond the illegitimate use of their SSNs....

5
Anonymous Author
This course provides valuable personal and business information to help protect against personal identity theft.

5
Member's Profile
A must-see for any consumer, taxpayer, or buyer to protect their personal information

4
Anonymous Author
Nice to know the different types of identity theft that one doesn't think of

3
Member's Profile
Not the best course she has put on. So much more that needs to be covered

5
Member's Profile
Course met all expectations as described in the course description.

4
Anonymous Author
Grammatical errors continue to be a problem. otherwise pretty good.

4
Anonymous Author
The information about relevant laws was the most important to me

5
Member's Profile
Great info on the several Federal Privacy Laws.

Prerequisites
Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. 

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION And OVERVIEW
Types of Identity Theft
  Defining Personal Identity Theft3:20
  The Most Personal Types of Identity Theft13:56
  Other Types of Identity Theft 13:58
Laws and Prevention
  Laws Regarding Identity Theft 6:02
  Other Laws 8:24
  Federal Privacy Laws3:48
CONCLUSION
  Preventing Personal Identity Theft 10:24
Continuous Play
  Personal Identity Theft1:04:41
SUPPORTING MATERIALS
  Slides: Personal Identity TheftPDF
  Personal Identity Theft Glossary/IndexPDF
REVIEW and TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam