A Truly International Casino Gaming Compliance Certification
The Certified Gaming Compliance Specialist (CGCS) certification has been designed by Casino Gaming Thought-Leaders from around the world to deliver a curriculum that reflects the day-to-day needs and considerations of compliance professionals working in the industry.
The CGCS certification was designed to not only cover topics such as
Anti-Money Laundering (AML) and
Fraud, but to also focus on key skills such as
Ethics and
Leadership, as well as new and emerging areas such as
Sports Betting and
Match-Fixing.
Designed for all levels within the Casino Gaming industry, the CGCS certification also covers topics related to
Internal and External Audit, Regulatory Compliance and
Governance.
Access the complete CGCS Module outline here
There are 2 pathways to becoming a Certified Gaming Compliance Specialist
- Self Study - through a PDF Study Guide and Online Exam *Enroll today
- Online Blended with Live Sessions - offered jointly with Dalhousie University’s Microcredential course in Casino Gaming Investigations
Module 1: What is Leadership?
Module 2: Different leadership styles
Module 3: How to Become a Leader
Module 4: Leading Teams and Groups
Module 5: Motivating Employees and Team Members
Module 6: Leadership style
Module 7: What is Management?
Module 8: The attributes of a leader
Module 9: The Foundations and Philosophy of Ethical Behavior
Module 10: Codes of Conduct and Professionalism
Module 11: Internal accountability
Module 12: External accountability
Module 13: Ethical leadership
Module 14: Anti-Money Laundering
Module 15: Anti-Money Laundering (AML) Regime for Casinos
Module 16: Broader AML Regulatory Requirements for Casinos
Module 17: Compliance Program
Module 18: Know Your Client (KYC) Regulatory Requirements
Module 19: Suspicious Transactions and Reporting of Persons
Module 20: Risk and Red Flags in Casinos and Gaming
Module 21: High Risk and Politically Exposed Persons (PEPs)
Module 22: Reporting Requirements
Module 23: Records and Documentation
Module 24: Introduction to Fraud and Fraudulent Activities
Module 25: Types of Frauds
Module 26: Understanding Fraudsters and Fraudulent Behavior
Module 27: Classification of Fraudsters
Module 28: Fraud Triangle
Module 29: Fraud Deterrence
Module 30: Fraud Detection Methods
Module 31: Fraud Indicators and Alerts
Module 32: Fraud Investigation Process and Techniques
Module 33: Fraud Reporting and Record-Keeping
Module 34: Introduction to Corruption
Module 35: Types of Corruption and Related Activities
Module 36: Management and Employee Corruption
Module 37: Impact of Corruption on Customers
Module 38: Overview of Anti-Corruption Laws and Regulations
Module 39: Anti-Corruption Compliance Program
Module 40: Role of Governance and Management
Module 41: Role of Anti-Corruption Officer in Prevention of Corporate Corruption
Module 42: Corruption Identification and Investigation
Module 43: Reporting and Training
Module 44: International Bodies Governing AML Regime
Module 45: National Legal and Regulatory CDD/KYC Frameworks
Module 46: Role and Supervision by Regulator
Module 47: Three Lines of Defense
Module 48: Board of Directors Governance
Module 49: Board Compliance Committee (BCC)
Module 50: Compliance Function Module
51: Chief Compliance Officer (CCO)
Module 52: Role of Internal Audit
Module 53: Risk Management
Module 54: Periodic Board Reporting
Module 55: Compliance Reviews and Training
Module 56: Security and Surveillance
Module 57: Loansharking
Module 58: Sports Betting, Match-Fixing, and Odds Manipulation
Module 59: Responsible Gaming
Module 60: Human Trafficking
Module 61: Introduction to Blockchain
Module 62: Understanding Cryptocurrency Module
63: Understanding NFTs, Metaverse and Defi Module
64: Use of Metaverse by Criminals for Money Laundering
Module 65: Money Laundering Stages with Cryptocurrency
Module 66: Financial Crime Risks associated with Cryptocurrencies
Module 67: Introduction to Data, and Information Module
68: Understanding Criticality of Information and Data/Information
Fraud Module 69: Overview of Information Security Objectives
Module 70: Overview of Hacking, Data Manipulation, and Data Losses
Module 71: Cyber Security and Information Security Measures
Module 72: Understanding Risks and Information Security Risks Faced by Institutions
Module 73: Information Security Risk Management Process