Udemy - Fundamentals Of PCI-DSS

Torrent Details

Udemy - Fundamentals of PCI-DSSUdemy - Fundamentals of PCI-DSS

NAME
Udemy - Fundamentals of PCI-DSS.torrent
CATEGORY
Other
INFOHASH
53938d259337bb95f2409608dacf133b4f3f675a
SIZE
3.8 GB in 98 files
ADDED
Uploaded on 27-07-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ DevCourseWeb.com ] Fundamentals of PCI-DSS



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com







Last updated 12/2022

Created by Vasco PatrĂ­cio,Vasco PatrĂ­cio Executive Coaching

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch

Genre: eLearning | Language: English + srt | Duration: 79 Lectures ( 11h 22m ) | Size: 3.76 GB



Learn everything about the Payment Card Industry Data Security Standards, including assessment and the 12 requirements.



What you'll learn

You'll learn about the terminology essential to the PCI-DSS, such as CDE, CHD, SAD, PANs, SAQs, ROCs, QSAs, as well as other payment industry terms

You'll learn about the history of the PCI-DSS and its major revisions

You'll learn about how the assessment process works, with ROCs and SAQs, and a clarification of the 8 types of SAQs

You'll learn everything about Requirement 1, involving having a firewall configuration to isolate your card data, network documentation and more

You'll learn everything about Requirement 2, including changing vendor defaults, isolating server functionality and securing vulnerabilities in devices

You'll learn everything about Requirement 3 in terms of securing stored data, including encryption protocols, key lifecycle, key management and more

You'll learn everything about Requirement 4, protecting data in transit, including masking plaintext PANs and using strong encryption protocols such as WPA/WPA2

You'll learn everything about Requirement 5, in terms of preventing malware through an antivirus solution that is frequently updated and frequently runs scans

You'll learn everything about Requirement 6, in terms of developing securely, doing regular vulnerability assessment and patching

You'll learn everything about Requirement 7, in terms of limiting access to card data by "need-to-know", minimising who accesses it formally

You'll learn everything about Requirement 8, in terms of identifying access through unique user IDs, strong authentication and MFA, password practices and more

You'll learn everything about Requirement 9, in terms of physical security, visitor identification/authorisation, as well as media storage/transport/destruction

You'll learn everything about Requirement 10, in terms of having a logging solution, logging specific required events, specific data points, and log integrity

You'll learn everything about Requirement 11, in terms of doing regular AP (authorised + rogue) and IP audits, vulnerability testing, pentesting, etc

You'll learn everything about Requirement 12, in terms of having a company-wide InfoSec policy, including employee screening, third-party screening, etc



Requirements

You don't need any prior knowledge (knowledge of the payment industry or InfoSec helps, but is NOT required)



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com



Get More Tutorials and Support Us -->> https://FreeCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01 - Introduction/001 01-Course-Intro.pdf805.2 KB
~Get Your Files Here !/01 - Introduction/001 All-Slides-Fundamentals-of-PCI-DSS.pdf25.5 MB
~Get Your Files Here !/01 - Introduction/001 Introduction.mp427.8 MB
~Get Your Files Here !/01 - Introduction/001 Introduction_en.srt2.9 KB
~Get Your Files Here !/01 - Introduction/002 Useful Information.html1.5 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/001 02-PCI-DSS-Essentials-01-Intro.pdf2 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/001 Module Intro.mp439.1 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/001 Module Intro_en.srt4 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/002 02-PCI-DSS-Essentials-02-Terminology-Clarifications.pdf1.2 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/002 Terminology Clarifications.mp4152.5 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/002 Terminology Clarifications_en.srt21.8 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/003 02-PCI-DSS-Essentials-03-PCI-DSS-History.pdf633.2 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/003 PCI-DSS History.mp430 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/003 PCI-DSS History_en.srt8.8 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/004 02-PCI-DSS-Essentials-04-Merchant-Assessment.pdf2.4 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/004 Merchant Assessment.mp492 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/004 Merchant Assessment_en.srt24.7 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/005 02-PCI-DSS-Essentials-05-Anatomy-of-a-Payment-Flow.pdf970.2 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/005 Anatomy of a Payment Flow.mp446.4 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/005 Anatomy of a Payment Flow_en.srt17.5 KB
~Get Your Files Here !/02 - PCI-DSS Essentials/006 02-PCI-DSS-Essentials-06-Outro.pdf2 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/006 Module Outro.mp429.4 MB
~Get Your Files Here !/02 - PCI-DSS Essentials/006 Module Outro_en.srt3.7 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/001 03-The-12-Requirements-01-Intro.pdf3.5 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/001 Module Intro.mp463.8 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/001 Module Intro_en.srt8.5 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/002 03-The-12-Requirements-02-Overview.pdf2.4 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/002 Overview.mp4187.5 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/002 Overview_en.srt43.6 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/003 03-The-12-Requirements-03-Requirement-1-Keep-a-Firewall.pdf1009.3 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/003 Requirement 1 Keep a Firewall.mp451.3 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/003 Requirement 1 Keep a Firewall_en.srt16 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/004 03-The-12-Requirements-04-Requirement-2-No-Defaults.pdf1.2 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/004 Requirement 2 No Defaults.mp461 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/004 Requirement 2 No Defaults_en.srt17.5 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/005 03-The-12-Requirements-05-Requirement-3-Protect-Stored-Data.pdf1.9 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/005 Requirement 3 Protect Stored Data.mp4120.6 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/005 Requirement 3 Protect Stored Data_en.srt21.3 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/006 03-The-12-Requirements-06-Requirement-4-Protect-Transmitted-Data.pdf687.1 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/006 Requirement 4 Protect Transmitted Data.mp451.9 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/006 Requirement 4 Protect Transmitted Data_en.srt9.1 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/007 03-The-12-Requirements-07-Requirement-5-Prevent-Malware.pdf709.1 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/007 Requirement 5 Prevent Malware.mp436.7 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/007 Requirement 5 Prevent Malware_en.srt10.9 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/008 03-The-12-Requirements-08-Requirement-6-Develop-Securely.pdf1 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/008 Requirement 6 Develop Securely.mp492 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/008 Requirement 6 Develop Securely_en.srt19.4 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/009 03-The-12-Requirements-09-Requirement-7-Need-to-Know-Access.pdf1 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/009 Requirement 7 Need-to-Know Access.mp430.1 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/009 Requirement 7 Need-to-Know Access_en.srt8.7 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/010 03-The-12-Requirements-10-Requirement-8-Identify-Access.pdf856.4 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/010 Requirement 8 Identify Access.mp4106 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/010 Requirement 8 Identify Access_en.srt17.5 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/011 03-The-12-Requirements-11-Requirement-9-Restrict-Physical-Access.pdf1.5 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/011 Requirement 9 Restrict Physical Access.mp4127.7 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/011 Requirement 9 Restrict Physical Access_en.srt20 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/012 03-The-12-Requirements-12-Requirement-10-Monitor-Networks.pdf1.9 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/012 Requirement 10 Monitor Networks.mp476.7 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/012 Requirement 10 Monitor Networks_en.srt21.2 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/013 03-The-12-Requirements-13-Requirement-11-Test-Regularly.pdf667.2 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/013 Requirement 11 Test Regularly.mp439.6 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/013 Requirement 11 Test Regularly_en.srt13.6 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/014 03-The-12-Requirements-14-Requirement-12-InfoSec-Policy.pdf1.1 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/014 Requirement 12 InfoSec Policy.mp4131.7 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/014 Requirement 12 InfoSec Policy_en.srt26 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/015 03-The-12-Requirements-15-General-Patterns-and-Recap.pdf2.8 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/015 General Patterns and Recap.mp4137.8 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/015 General Patterns and Recap_en.srt42 KB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/016 03-The-12-Requirements-16-Outro.pdf3.5 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/016 Module Outro.mp423.9 MB
~Get Your Files Here !/03 - The 12 Requirements (v3.2.1)/016 Module Outro_en.srt5.9 KB
~Get Your Files Here !/04 - Outro/001 04-Course-Outro.pdf805.1 KB
~Get Your Files Here !/04 - Outro/001 All-Slides-Fundamentals-of-PCI-DSS.pdf25.5 MB
~Get Your Files Here !/04 - Outro/001 Course Outro.mp422.2 MB
~Get Your Files Here !/04 - Outro/001 Course Outro_en.srt2.8 KB
~Get Your Files Here !/05 - Additional Module Security Controls/001 Intro.mp44.9 MB
~Get Your Files Here !/05 - Additional Module Security Controls/001 Intro_en.srt681 B
~Get Your Files Here !/05 - Additional Module Security Controls/002 Acquisition Strategy.mp464.6 MB
~Get Your Files Here !/05 - Additional Module Security Controls/002 Acquisition Strategy_en.srt11.4 KB
~Get Your Files Here !/05 - Additional Module Security Controls/002 Security-Controls-Acquisition-Strategy.pdf731.8 KB
~Get Your Files Here !/05 - Additional Module Security Controls/003 Code Analysis.mp429.1 MB
~Get Your Files Here !/05 - Additional Module Security Controls/003 Code Analysis_en.srt10.1 KB
~Get Your Files Here !/05 - Additional Module Security Controls/003 Security-Controls-Code-Analysis.pdf947.9 KB
~Get Your Files Here !/05 - Additional Module Security Controls/004 Code Signing.mp440 MB
~Get Your Files Here !/05 - Additional Module Security Controls/004 Code Signing_en.srt10.1 KB
~Get Your Files Here !/05 - Additional Module Security Controls/004 Security-Controls-Code-Signing.pdf560.9 KB
~Get Your Files Here !/05 - Additional Module Security Controls/005 Controls by Data Classification.mp435 MB
~Get Your Files Here !/05 - Additional Module Security Controls/005 Controls by Data Classification_en.srt11.8 KB
~Get Your Files Here !/05 - Additional Module Security Controls/005 Security-Controls-Controls-By-Data-Classification.pdf1.2 MB
~Get Your Files Here !/05 - Additional Module Security Controls/006 Criticality Analysis.mp441.2 MB
~Get Your Files Here !/05 - Additional Module Security Controls/006 Criticality Analysis_en.srt10 KB
~Get Your Files Here !/05 - Additional Module Security Controls/006 Security-Controls-Criticality-Analysis.pdf595 KB
~Get Your Files Here !/05 - Additional Module Security Controls/007 Cryptographic Protection.mp424.2 MB
~Get Your Files Here !/05 - Additional Module Security Controls/007 Cryptographic Protection_en.srt10.3 KB
~Get Your Files Here !/05 - Additional Module Security Controls/007 Security-Controls-Cryptographic-Protection.pdf477.1 KB
~Get Your Files Here !/05 - Additional Module Security Controls/008 Cyber Threat Hunting.mp437 MB
~Get Your Files Here !/05 - Additional Module Security Controls/008 Cyber Threat Hunting_en.srt11.9 KB
~Get Your Files Here !/05 - Additional Module Security Controls/008 Security-Controls-Cyber-Threat-Hunting.pdf819.7 KB

Alternative Torrents for 'Udemy Fundamentals of PCIDSS'.

There are no alternative torrents found.