[To buy, please contact: IBB @ +880 2 9137282, +880 2 9137283, +880 2 9137284]
Table of Contents
Module-A: Introduction to IT and Computer Systems
Chapter-1: Computer & Information
Technology
1. What is Computer?
2. What is Information Technology?
3. Importance and use of IT
Chapter-2: Electronic
Banking and Online Banking
1. Electronic Banking
1.1. ATM
1.2. POS terminal
1.3. Internet Banking
1.4. sms Banking
1.5. Alert Banking
1.6. IVR
2. Advantages and disadvantages of Electronic Banking
2.1. Advantages
2.2. Disadvantages
3. Online Banking
3.1. Advantages
3.2.
Disadvantages
Chapter-3: Introduction to
m-Commerce, Mobile Banking, e-commerce and MIS
1. m-Commerce
2. Mobile Banking
3. e-Commerce
4. MIS
Chapter-4: Computer
Hardware
1. History of Development of Computer
2. Generation of Computer
3. Types of Computer
4. Computer Hardware and Devices
4.1. Input devices
4.2. Output devices
4.3. Processing Devices
4.4. Memory Device
4.4.1. Primary
or Main memory
4.4.2. Secondary
or Auxiliary memory
4.4.3. Cache
memory
4.5. Special Devices
Chapter-5: Computer
Software and Software Systems
1. Computer Software
1.1. System Software
1.2. Application Software
2. Programming Language
2.1. Low-Level Language
2.2. High Level Language
2.3. Object Oriented Language
3. Database Management System
4. Internet and related terminologies
4.1.
Internet
4.2.
WWW
4.3.
Hypertext
4.4. Hyperlinks
4.5. Web browser
4.6. Web Page
4.7. Internet vs WWW
4.8. URL
5. E-mail
Module-B: Different Approaches to Bank Automation
Chapter-6: Networking and
Computer Hardware for Banks
1. Concept of LAN and WAN
1.1.
Local Area Network
1.2.
Wide Area Network
1.3.
Transmission Media
1.3.1. Transmission Media for LAN
1.3.2. Transmission Media for WAN
a) Land Lines
b) Microwave
c) Satellites
1.4.
LAN/WAN for Banks
1.4.1. Firewall
1.4.2. DMZ
2. Hardware & infrastructure used for Bank automation
2.1.
Advanced Hardware Terminology
2.1.1. Various
Computer Servers
a) Branch Server
b) Application Server
c) Database Server
2.1.2. RAID
2.1.3. External
Storage Device
2.1.4. SAN
Switch
2.1.5. Clustering
a) High-availability
Clusters
b) Load-balancing
clusters
2.1.6. Replication
a) Async Replication
b) Sync Replication
c) Dark Fiber
2.2.
Data Center
2.3.
Disaster Recovery Site
Chapter-7: Bank
Computerization approaches
1. Stand-alone System
2. LAN-based System
3. WAN-based System with distributed database
4. WAN-based System with centralized database
Chapter-8: Various
Software Systems for Bank
1. Core Banking Software
2. Switching Software
3. Credit Card Software
4. Payment Gateway Software
Functions of a
payment gateway software
5. Mobile Banking Software
5.1. Mobile
Banking System VS Core Banking System
5.2. Mobile
Banking system VS sms Banking system
5.3. Available
software for Mobile Banking
5.4. Customers
of Mobile Banking and menu items for them
5.5. Features of a Mobile Banking Software
Chapter-9: Plastic Money
1. Plastic money types
a) Credit
Cards
b) Debit
Cards
c) Payment, Pre-Paid
or Electronic Purse Cards
d) ATM Cards
e) Charge
Cards
f) Store,
Budget or Option Cards
2. Benefits of Plastic Money
a) Benefits
for Customers
b) Benefits
for Merchants
3. Issuer and Acquirer
4. Terminology
for Card transactions at ATM and POS terminals
4.1. On-us
transaction
4.2. Off-us or
Not on-us transaction
4.3. Remote
on-us transaction
4.4. Interchange
fee
4.5. Merchant
Commission
4.6. EMV and
Chip Card
4.7. Liability
Shifting
4.8. Charge
Back
5. Payment Associations
5.1. International
5.1.1. MasterCard
5.1.2.
VISA
5.2.
Local payment associations and ATM
Networks
5.2.1. DBBL Nexus
5.2.2. BEPS
5.2.3. Q-Cash
5.2.4. E-Cash
5.2.5. Cashlink
5.2.6. Omnibus
5.2.7. Joining, monthly and transaction fees
6. Income from Credit Card Business
6.1. Sources of income from Debit Card issuing
6.2. Sources of income from Credit Card issuing
6.3. Sources of income from ATM acquiring
6.4. Sources of income from POS acquiring
7. Technology related to Plastic Card
7.1. Plastic
7.2. Magnetic Strip and Micro Chip
7.3.
Personalization of plastic cards
8. Fraud in Plastic Money
8.1. Counterfeit
8.2. Application
Fraud
8.3. PIN Fraud
8.4. Card Not
Present
9. Plastic
Money Fraud Prevention Strategies
9.1. Action by
Card Issuers
9.2. Action by
Merchants
9.3. Action by
Cardholders
9.4. Technological
Solutions
9.4.1. Protections
against Card Counterfeiting
9.4.2. Card
Restrictions
9.4.3. Fraud
Detection Software
9.4.4. Improved
Cryptography
9.4.5. EMV
a) What is EMV?
b) What is EMVCo?
c) Benefits
of EMV
d) Why Banks should move to EMV?
e) What is the risk of counterfeit in Meg-stripe card?
f) How does EMV protect Counterfeit fraud?
g) What are main contents of a meg-stripe card and chip card?
Module-C: Electronic Payment Systems & Funds
Transfer Systems
Chapter-10: ATM and
Deposit Machine
1. ATM
1.1. Services
from ATM
1.2. How ATM
works?
1.3. ATM
Specifications & related topics
1.3.1 ATM
specification
1.3.2. Denomination
available at ATM
1.3.3. Cash
feeding by 3rd party
1.3.4. Partial
Dispense of Cash and non-dispense of cash
1.3.5. Capture
of money
1.3.6. Network
used for connectivity
1.3.7. Card
Capture and hot card
1.3.8. Space
requirement for installation of ATM
1.3.9. One-time
and monthly expenditure for an ATM booth
1.3.10. Income
from an ATM
1.4. ATM Fraud
and remedy
1.4.1.
Card Reading Devices
1.4.2.
Card-Trapping Devices
2. Deposit Machine
3. Fast Track
Chapter-11: POS terminals
1. What is POS terminal?
2. Transaction types supported at POS terminals
3. POS Specifications
4. How POS works?
5. POS terminology
a) PIN pad
b) Insert
and Swipe
c) Merchant
Commission
d) Interchange
fee
6. Number of POS terminals in operation in Bangladesh (in
year-2010)
7. Fraud at POS and remedy
Chapter-12: Internet
Banking
1. What is Internet Banking?
2. i-Banking Password
3. i-Banking functions
4. Fraud in Internet Banking
a) Capture
of password during transmission to the bank server
b) Phishing
c) Repudiation
and Digital Signature
d) Two-factor
authentication
Chapter-13: Sms and Alert
Banking System
1. sms Banking
2. Alert Banking
2.1. Debit
Alert
2.2. Credit Alert
2.3. Periodical
Alert
3. How sms Banking works?
4. Important notes for the customers
5. Security in sms and Alert Banking
Chapter-14: E-commerce
& Internet Payment Gateway
1. E-commerce
2. Internet Payment Gateway
3. How Internet Payment Gateway works?
4. PayPal as payment gateway
5. Fraud & remedy during e-commerce transactions
a) Capture
of card information during transmission to the bank server
b) Phishing
c) Repudiation
and Digital Signature
d) Two-factor
authentication
Chapter-15: M-Commerce and
Mobile Banking
1. What is m-Commerce?
2. History of m-commerce
3. Mobile Banking
3.1. What is
Mobile Banking?
3.2. Mobile
Banking activities
3.2.1. Agent and Merchant registration
3.2.2. Consumer Registration
3.2.3. Cash-in
3.2.4. Cash-out
3.2.5. Merchant Payment
3.2.6. Fund Transfer
3.2.7. Other services available to Consumers
3.3. Who will
provide PIN?
3.4. Transaction
Limits in Mobile Banking
3.5. Mobile
Banking is costly
3.6. Models in
Mobile Banking – Bank-led and Telco-led
3.7. Connectivity
- sms VS USSD
Chapter-16: Call Centre
1. What is a Call Centre?
2. What is a Contact
Centre?
3. Difference between Call
Centre and Contact Centre
4. Mode of Communication in
Contact Centre
5. Key Components of
Contact Centre
5.1. Interactive Voice Response (IVR)
5.2. Automatic
Call Distributor (ACD)
5.3. Computer
Telephony Integration (CTI)
5.4. Call
Recording System
5.5. Staff
(Agent / Supervisors)
5.6. Key
Performance Indicator (KPI)
6. How does the Call Centre
/ Contact Centre function?
7. Types of Call Centre
/Contact Centre Service
8. Call Centre/Contact
Centre Activity Type
8.1. Common Inbound Activities
8.2. Common
Outbound Activities
9. Quality Assurance at
Contact/Call Centre
Chapter-17: Systems for sending fund transfer instruction
1. Telex
2. SWIFT
2.1. What is
SWIFT?
2.2. SWIFT
traffic
2.3. SWIFT
membership
(a) Member
(b) Sub-members
(c) Participants
2.4. Why to
become SWIFT member?
2.5. Security
at SWIFT
2.6. How the
SWIFT works?
2.7. What are
the drawbacks?
2.8. User Group
in Bangladesh
3. CHIPS
4. FEDWIRE
Module-D: IT Security Standards and regulations
Chapter-18: Security
Standards and Regulations
1. Standards and Regulations
2. Benefits
of complying a Security Standard
Chapter-19: Guideline
on ICT Security for Scheduled Banks
and Financial Institutions, Version-2
(April, 2010)
published by the Central Bank of Bangladesh
1.
Introduction
1
ICT Security Management
2
ICT Operation Management
3
Physical Security
4
Information Security Standard
4.1 Access Control for
Information Systems
5.2
Network Security
5.3
Data Encryption
5.4
Virus Protection
5.5
Internet and e‐mail
5.6
Transactions through Alternative Channels
5.6.1
Services through Mobile
5.6.2
Internet Banking
5.6.3
Payment Cards
6. Software Development and
Acquisition
6.1
In‐house Software
6.2
Outsourced Software
7. Business Continuity and
Disaster Recovery Plan
7.1
Business Continuity Plan (BCP)
7.2
Disaster Recovery Plan (DRP)
7.3
Backup and Restore Plan (BRP)
8. Service Provider Management
8.1
Service Level Agreement (SLA)
8.2
Outsourcing
8.3
Cross‐border System Support
Chapter-20: BS 7799 standards
1. What is BS7799?
2. History
of BS 7799
3. BS7799
vs ISO 17799
4. Who
must comply?
5. BS7799:
Part-I: Security Domains, Objectives and Controls
6. BS 7799: Part-II: ISMS and Certification
6.1. Compliance/Certification
Process
6.2. What is an ISMS?
Module-E: Document Handling Systems, Additional
Banking Applications & Other Aspects
Chapter-21: Cheque
Processing Systems
1. Clearing and Settlement Systems
2.
Conventional Cheque Clearing
Process
3. MICR
4.
Cheque Truncation
5. RTGS
6. BACH
6.1. BACPS
6.2. BEFTN
Chapter-22: Additional
Banking Applications
1. ERP Software
1.1. What
is ERP System?
1.2. Components / Modules of an
ERP Software
1.3. Components of an ERP
System
1.4. ERP advantages and
disadvantages
1.5. Renowned
ERP Software
1.5.1. SAP ERP from SAP
1.5.2. PeopleSoft ERP from Oracle
2. CRM Software
2.1. What is CRM?
2.2. Fields
of application
2.3. Software
for CRM
3. E-mail software
3.1. What
is e-mail?
3.2. Operation Overview
3.3. Components in a messaging system
3.4. Popular E-mail Systems
3.5. Licensing of commercial product
3.5.1. Exchange Server
3.5.2. Lotus Domino
4. Anti-Virus
software
4.1. What is antivirus software?
4.2. How Antivirus works?
4.2.1. Signature
based detection
4.2.2. Behavior
Based Detection
4.3. Licensing
4.4. Popular Antivirus programs
Module-F: Risk Management and Legal Framework in IT
Chapter-23: Cyber Law
1. What is Cyber Law?
2. Cyber Crime Categories
3.
Cyber Crime Activities
3.1. Unauthorized access & Hacking
3.2. Trojan Attack
3.3. Virus and Worm attack
3.4. E-mail related crimes
3.5. Denial of Service (DoS) attacks
3.6. Pornography
3.7. Forgery
3.8. IPR
Violations
3.9. Cyber Terrorism
3.10. Banking/Credit card Related crimes
3.11. E-commerce/ Investment Frauds
3.12. Sale of illegal articles
3.13. Online gambling
3.14. Defamation
3.15. Identity Theft
3.16. Data diddling
3.17. Theft of Internet Hours
3.18. Theft of computer system (Hardware)
3.19. Physically damaging a computer system
3.20. Breach of Privacy and Confidentiality
Chapter-24: National ICT
Policy – 2002
1. Why ICT Policy?
2. Objectives
3. Coverage
4. Selected Policy Clauses
Chapter-25: ICT Act-2006
1. Introduction
2. Applicable fields
3. Objectives
4. Selected clauses