Courses

View our portfolio of courses below, LiquidNexxus is constantly expanding and enhancing the course offering to suit the particular needs of the industry. You can also view our external scheduled programmes or request an inhouse course.

Fraud & Risk Decision Analytics

Fraud & Risk Decision Analytics

A two day course in Decision Analytics for Making Strategic Decisions for Fraud and Operational Risk.

EMV Workshops

EMV Workshops

The EMV training is designed for individuals working within banks and other key stakeholders involved in the implementation of EMV.

PCI DSS Implementation Training

PCI DSS Implementation Training

Everything you need to know about PCI DSS; both theory and practice

PA DSS Training

PA DSS Training

Everything you need to know about PA DSS; theory and practice...

Bank Card Foundation 101

Bank Card Foundation 101

An essential course for anyone in the card business...

Card Business Management & Marketing

Card Business Management & Marketing

Card business management, profitability, and risk management masterclass

Advanced Bank Card Marketing

Advanced Bank Card Marketing

How to make your brand stand out - How to increase card usage/spend

Card Operations Training

Card Operations Training

Excellence in card business operations and implementation

Card Centre Risk Management

Card Centre Risk Management

The ultimate course for any card centre managers or staff. This inmersive course provides a overview and practical guidance on managing risk and compliance in the card centre as well as handling incidents, investigations and compliance.

Card Fraud Prevention Training

Card Fraud Prevention Training

Introduction to Mobile Payments

Introduction to Mobile Payments

Introduction to Mobile Payments Understanding the mobile payments business

Mobile Financial Services: Entry Level

Mobile Financial Services: Entry Level

Mobile Financial Services: Defining Market Entry Strategy Mobile Network Operators and Financial Institutions worldwide are looking into Mobile Financial Services to remain competitive and add value for their customers. How to leverage the MNOs distribution network? This workshop delivers team members with the knowledge and insight to properly define a successful Mobile Financial Services offering.

Mobile Banking and Payment Application Security

Mobile Banking and Payment Application Security

A key challenge in the success of Mobile Banking and Mobile Payment solutions is the security of the services .... These new security risks must be identified and mitigated before deploying services to clients...

ATM Security Training

ATM Security Training

Covering all aspects of ATM Security from installation to decommisioning

ATM Service & Maintenance

ATM Service & Maintenance

ATM Network availability is a key differentiator...

ATM Management Professional

ATM Management Professional

An essential course for managing or implementing ATM networks...

(Online)Information Security Awareness

(Online)Information Security Awareness

(Online)Information Security Awareness Training Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

ISO 22301 Lead Implementer

ISO 22301 Lead Implementer

Learn the essentials of managing, controlling and implementing a Business Continuity Management System

ISO/IEC 20000

ISO/IEC 20000

The latest in IT Service Management ISO/IEC 20000 is the first international standard for IT service management. It is based on and intended to supersede the earlier BS 15000. ISO/IEC 20000, was originally developed to reflect best practice guidance contained within th

ISO 27001 Lead Implementer

ISO 27001 Lead Implementer

ISO 27001 Standard Information Security Standard Implementation Guidelines and Certification

ISO 27005 Risk Manager

ISO 27005 Risk Manager

ISO 27005 Risk Manager Information Security Standard Implementation Guidelines and Certification

CISSP® Bootcamp - Exam Preparation Training

CISSP® Bootcamp - Exam Preparation Training

CISSP® - Certified Information Systems Security Professional - Globally Recognized Expertise in the Field of Information Security.

HISP

HISP

The Holistic Information Security Practitioner (HISP) Training and Certification program addresses the current shortage of information security and compliance professionals.

Security Development Training (.NET, C# and ASP.NET )

Security Development Training (.NET, C# and ASP.NET )

The environment provides powerful means for security development, but developers should know how to apply the architecture and coding level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation

Digital Forensics & Investigations Training

Digital Forensics & Investigations Training

Electronic evidence gathering, investigations and more

Banking Cyber Security

Banking Cyber Security

Banking Cyber Security This course is targeted at IT professionals who wish to delve deeply into the latest security threats and most advanced techniques used by malicious hackers and cyber criminals today.

OPSE Certification

OPSE Certification

OPSE Certification The OPSE certification is our official OSSTMM certification based on the Open Source Security Testing Methodology Manual (OSSTMM).

OPST Certification

OPST Certification

OPST Certification The OPST is a certification of applied knowledge designed to improve the work done as a professional security tester.

Certified Trust Analyst

Certified Trust Analyst

Certified Trust Analyst The CTA is a person who can apply the proper techniques to make accurate, snap decisions on what to trust and how far that trust extends.

OPSA Certification

OPSA Certification

OPSA Certification The OPSA is a certification of applied knowledge designed to improve the work done as a professional security analyst.

SCADA & NCI Security

SCADA & NCI Security

UNICRI’s SCADA and NCI Security 101 seeks to fill the “information gap” by empowering participants with a realistic and comprehensive assessment of the threats and impediments in these infrastructures.

Secure Coding for Banking Applications

Secure Coding for Banking Applications

Software engineers developing these systems tend to forget about the fact that the burden of the security incidents we experience today are stemming from defects in the code – actually bugs – caused by incorrect coding.

Knowledge Centre

Knowledge

Schedule

Connect

Courses