with a better browsing experience; allow us to assess, monitor, and improve the website’s
performance; and enable our partners to advertise to you. You may disable the cookies by changing
the settings in your browser, and you may tell us not to share your cookie data with third parties.
Course Catalog Class Schedule Learning Portal
This course provides essential knowledge about the technical environment and processes of Siron™ AML. It focuses on the aspects that are relevant for technical consultants and IT staff, in particular general understanding of technical prerequisites, product and interface handling, and tools.
This course provides essential knowledge about the technical environment and processes of Siron™ KYC. It focuses on the aspects that are relevant for technical consultants and IT staff, in particular installation, integration of watch lists, technical settings, processes, and error handling.
This two-part course provides a foundation for developing a Blaze Advisor system-enabled application. Part 1 is for both Business Analysts and Developers who maintain rules in the RMA. Part 2 is for Developers who need to understand the SRL generated by the RMA. Students are introduced to rule authoring, Structured Rule Language (SRL), testing, RMA generation, lifecycle management in the RMA, and rule project deployment.
This course is aimed at developers and rule writers. The course covers rule authoring using both interactive builder and advanced builder where participants will learn how to write using Structured Rule Language (SRL); project testing and deployment.
This course familiarizes attendees with optimization models and techniques, and the terminology used to describe them. Participants gain an understanding of the Xpress suite, the Mosel modeling and programming language, and Xpress Workbench. Through a series of projects illustrating applications of the LP and MIP methods, students learn to implement optimization models using Xpress Optimization Suite.
This course provides knowledge how Siron™ KYC is used in KYC business processes, e.g. customer onboarding or ongoing customer screening. It explains the details of the check processes and the configuration options from the business point of view. It also shows how business rules can be built in general, and in particular be used for risk assignment.