Course curriculum

  • 1

    Enterprise Identity Verification

    • Enterprise Identity Verification

    • Agenda

  • 2

    Remote IDV Technology

    • Remote IDV Technology

    • Use Cases

    • Full Technology Stack

    • For End User

    • Technology Behind

    • Identity Verification Toolkit

    • Demo

    • Quiz

  • 3

    Common IDV Use Cases

    • Common IDV Use Cases

    • Online Identity Verification

    • Biometric Authentication

    • Age Verification

    • Quiz

  • 4

    Identity Document Verification

    • Identity Document Verification

    • Standard Document IDV Process

    • Document Auto-Capture

    • Photo Quality Requirements

    • Document Classification

    • Document Support Levels

    • ID - Data Extraction L2

    • ID - Data Extraction L1

    • Generic OCR Support for Global Passports

    • Optical Character Recognition

    • Document Authenticity Validation

    • eMRTD Chip Reading in Remote IDV

    • Document IDV using NFC Reading

    • Quiz

  • 5

    eMRTD Document Specification

    • eMRTD Document Specification

    • Machine Readable Travel Document (MRTD)

    • Electronic Machine Readable Travel Document (eMRTD)

    • Security features of eMRTD

    • Reading and parsing data

    • Active Authentication Sequence

    • Certificates of Document Issuers

    • Quiz

  • 6

    Face Verification

    • Face Verification

    • Face Verification Process

    • Selfie Auto-Capture

    • Biometric Face Comparison

    • How Face Comparison Works

    • Quiz

  • 7

    Mobile Palmprint Recognition

    • Mobile Palmprint Recognition

    • Mobile Palmprint Recognition

    • Mobile Palmprint Recognition

    • Palm Verification (1:1)

    • Quiz

  • 8

    Liveness Detection

    • Liveness Detection

    • Industry-Leading Face Liveness

    • Passive Liveness Detection

    • Active Liveness Detection

    • Smile Liveness

    • Multi-Range Liveness

    • Deprecated Liveness Methods

    • Quiz

  • 9

    Video Injection Attack Detection

    • Video Injection Attack Detection

    • Deepfakes

    • Common Attack Motives

    • Attack Vectors For Face Spoofing

    • Emulation Software

    • Emulation Software

    • Man-in-the-Middle Attack

    • Hardware Injection

    • How stay protected from such attacks?

    • How video injection detection works

    • Quiz

  • 10

    Exam

    • Final exam

    • Exam