Shopping Cart | Training Portal | Contact Us | 1-800-473-5181

PCI Compliance

 

The PCI DSS is a security standard that addresses security management, network architecture, software design and other critical protective measures and the policies and procedures used during implementation of these standards. PCI DSS is intended to help businesses and organizations apply forethought and measurements to protect customer account data.

Course Description

This course is designed to provide the learner with a working knowledge of compliance, primarily with PCI. This includes the DSS (Data Security Standards), processes and requirements that businesses must adhere to in order to accept payments and to store, process and transmit cardholder data. In addition, the concepts of PCI-DSS are generalized and related to broader trends and emerging issues in information assurance and IT security

Course Outline

The following topics covered will be:

  • PCI DSS overview 2.0 including key terminology
  • PCI reporting requirements
  • Testing procedures for validating compliance
  • Payment transaction flows & service provider relationships
  • Compliance key players – QSA, PA-QSA, ISA, ASV, etc.

PCI Break Down (Control Objectives and Associated Standards)

  • Build and Maintain a Secure Network through network architecture, segmentation and active surveillance
  • Protect Cardholder Data through data isolation, access controls and security in depth
  • Maintain a Vulnerability Management Program
  • Implement Strong Access Control Measures
  • Regularly Monitor and Test Networks with active surveillance and ongoing auditign
  • Maintain an Information Security Policy
  • Address cloud integration

Targeted Candidate

This course is designed for a wide range of candidates that need to understand the importance of payment card data security and PCI Compliance requirements. It is especially designed for: Managers, Business Analysts, IT Auditors, Financial/Operational Auditors, Finance Managers, IS Managers, IT Specialists, Project/Program Analysts, Security Analysts, Software Engineers, System Administrators.



Security Blog

Does your smartphone app discover all your accounts?

There’s a chill in the air, and it’s not just the normal fall morning breeze. In the era of NSA Prism/Xkeyscore/whatnext surveillance, and...

Ethical implications of whistle blowing

(ISC)2 code of ethics; Protect society, the commonwealth, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Advance and protect...

The Great ATM Heist - is it really newsworthy?

On Friday, May 10, we saw many headlines about the latest great ATM bank robbery. Apparently these types of attacks are being regarded as...