About this course


This course is in three parts. There is an examination at the end of each part.

The examination for Part I relates to Part I only. The examination for Part II relates to Parts I and II. The examination for Part III relates to all three parts. 

You may purchase each part individually or purchase a bundle of all three parts together at a discounted price. 

A bundle may not be purchased retrospectively i.e. after you have already purchased one or two Parts. 


Some in clandestine companies combine;
 Erect new stocks to trade beyond the line;
 With air and empty names beguile the town,
 And raise new credits first, then cry ’em down;
 Divide the empty nothing into shares,
And set the crowd together by the ears. 

Daniel Defoe.

This course is for all those who work in, manage, own or control companies in all jurisdictions and those that deal with and regulate them. 

Business structures, including corporations and partnerships, are intended to encourage enterprise and to protect honest entrepreneurs. 

Trusts are intended to protect the assets of families from unlawful interference and other problems.

In each case there is also a measure of the modification of the tax position as against if such structures were not to be used: some of those changes benefit the company and its owners and others benefit the state.

However, as with all things, there are those that abuse the privileges that such structures afford them. They are used as vehicles for a wide range of criminal offences of which the most obvious – but far from the only – one is tax evasion.

Also, because these structures have an identity (in some cases they are, in law, a person), they are also the target for criminals. 

In this course, we explain

a) what corporations, partnerships, trusts and other structures are

b) the terminology associated with them

c) the risks they present

d) the risks they face

and we do it all with context and historical perspective. 

You will find out about asset forfeiture in 18th Century England, how capital flight was dealt with in 18th Century France – and see how much of what we imagine is recent has a long history. 

You will learn the origins of trust law and why it is a cross-cultural phænomenon.

Also, you will learn why much of the criticism of certain professionals is unfounded – and where that criticism should be directed. 

This is a three part course. See the curriculum below for the contents of this Part.

At the end of each part, you will take an open book examination. The examinations are cumulative and cover the current and previous parts. If you achieve the pass-mark of 80%, you will receive a certificate and points towards the designation Certificate in Financial Crime Risk and Compliance. 

The entire three-part course is approximately the length of a two-day seminar but it is, of course, on demand. You have unlimited access, including any additions and updates, for 12 months and unlimited attempts at the examination. Your certificate for this course lasts for a year from the date of issue.


Language: English

Jurisdiction: Global

Level : Front Liners to Directors; all financial crime risk and compliance officers and personnel; personnel, etc. officers.

Certificated: Yes, 12 months from completion of examination

Examination: open book; pass mark 80%; validity 12 months, retakes are allowed.

Time limit: Unlimited access for 12 months from enrolment.

Certificate: yes, valid 12 months from date of examination.

Retake examination: yes.

Senior courses are part of the Learning Ladder (tm) Series and attract Course Credits for those who go on to study for the Certificate in Financial Crime Risk and Compliance.

cFCRC Credits: 40.

Portable CPE/CPD (tm) - yes, if your examination body / regulator acknowledges this course

CPE/CPD hours : 6, where acknowledged.

Price shown includes UK VAT where applicable.

Course curriculum

  1. 1
  2. 2
  3. 3
    • 10.1 Computer crime - surprisingly little evolution and no revolution.

    • 10.2 Computer crime - surprisingly little evolution and no revolution.

    • 10.3 The UK Government’s list of on-line offences.

    • 10.4 Hacking: old term, even older conduct.

    • 10.5 Online theft of money.

    • 10.6 Computer crime - surprisingly little evolution and no revolution.

    • 10.7 Computer crime - surprisingly little evolution and no revolution.

    • 10.8 Computer crime - surprisingly little evolution and no revolution.

    • 10.9 Extortion via the internet.

  4. 4
    • 11.1 Is all crime against a business a financial crime?

    • 11.2 Is all crime against a business a financial crime?

    • 11.3 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.4 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.5 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.6 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.7 CASE STUDY – where perpetrators are also victims. Sometimes.

    • 11.8 CASE STUDY – The dangers of face value.

    • 11.9 Before ″identity theft,″ identity fraud was a big thing that just didn’t have a name.

    • 11.10 CASE STUDIES – CV fraud

    • 11.11 Fraudulent orders

    • 11.12 Cheque kiting

    • 11.13 Cheque kiting

  5. 5
    • 12.1 No one ever says ″Trust me, I’m a fraudster.″

    • 12.2 No one ever says ″Trust me, I’m a fraudster.″

  6. 6
    • 13.1 How Malaysian law makes directors liable for the actions of companies.

    • 13.2 Who will carry the can?

    • 13.3 The brains of a company

    • 13.4 The convoluted and perforated law in the UK.

    • 13.5 Inconsistency between laws is commonplace.

  7. 7
    • 14.1. Crime by trusts

    • 14.2. Crime by trusts

    • 14.3. Crime by trusts

    • 14.4 A couple of Wyly characters.

  8. 8
    • 15.1 The bank that used its customers’ money for its own risky business.

    • 15.2 The Get Out of Jail Free settlement scheme.

    • 15.3 It’s a matter of principle.

  9. 9
    • 16.1 About this chapter

    • 16.2 The ownership trail in public records.

    • 16.3 How to build a digital radio business with stolen code.

    • 16.4 After judgment, get after the assets.

    • 16.5 Hiding assets.

    • 16.6 Assets in the hands of third parties

    • 16.7 The Court and Company Registers differ as to ownership and control.

    • 16.8 When the court can’t know what the court knows: the ″without prejudice″ rule.

    • 16.9 Limitations on without prejudice

    • 16.10 Limitations on without prejudice

    • 16.11 Limitations on without prejudice

    • 16.12 Limitations on without prejudice

    • 16.13 Limitations on without prejudice

    • 16.14 Pigeons, meet cat.

    • 16.15 Unambiguous impropriety

    • 16.16 Where criminal cases and civil recovery collide.

    • 16.17 Freezing assets overseas in the name of someone other than the judgment debtor.

    • 16.19 ″Concealment″ and ″transfer″.

    • 16.20 Conclusions.

    • 16.21 Footnote.

    • 16.22 Further reading.

  10. 10
    • About Kevin's Story

    • Kevin's Story - 1

    • Kevin's Story - 2

    • Kevin's Story - 3

    • Kevin's Story - 4

    • Kevin's Story - 5

    • Kevin's Story - 6

    • Final Thoughts

  11. 11
    • About this examination

    • Examination - Financial crime risks of corporate vehicles and other business structures Parts I, II and III