Linkedin - Working with the PCI DSS 4.0 Compliance Requirements

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size418.9 MB
  • Uploaded Byfreecoursewb
  • Downloads4
  • Last checkedApr. 27th '23
  • Date uploadedApr. 27th '23
  • Seeders 2
  • Leechers0

Infohash : 2AA3755C2454773F57D37117C61C6FD3C8C684D4

Working with the PCI DSS 4.0 Compliance Requirements



https://DevCourseWeb.com

Released 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 2h 44m | Size: 419 MB

If you have a business, organization, or entity of any kind that processes, transmits, or stores cardholder data, you need to meet PCI Data Security Standards. In this course, Laura Louthan covers what you need to know to be in compliance and work with PCI DSS—the Payment Card Industry Data Security Standard, focusing specifically on the newest control version 4.0. Laura dives into the 12 main PCI requirements, their child controls (totaling over 300), and how to meet the intent of each control as you work toward full compliance. Whether you’re a merchant, payment processor, data center, or any other business that needs to ensure the security of cardholder data, follow along with Laura’s advice on installing and maintaining security controls; configuring components; protecting data, systems, and networks; securing systems and software; controlling, authenticating, and restricting access; logging and monitoring access; security testing; risk management; and more.

Files:

[ DevCourseWeb.com ] Linkedin - Working with the PCI DSS 4.0 Compliance Requirements
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 01 - Introduction to PCI 4.0.mp4 (7.3 MB)
    • 01 - Introduction to PCI 4.0.srt (1.3 KB)
    • 02 - What you should know as background for this course.mp4 (4.4 MB)
    • 02 - What you should know as background for this course.srt (4.1 KB)
    • 03 - How this course is designed to help you learn.mp4 (8.6 MB)
    • 03 - How this course is designed to help you learn.srt (8.2 KB)
    02 - 1. Requirement 1 Install and Maintain Network Security Controls
    • 01 - Network security Creating strong network security controls.mp4 (10.5 MB)
    • 01 - Network security Creating strong network security controls.srt (7.7 KB)
    • 02 - Network security Controlling traffic appropriately.mp4 (12.5 MB)
    • 02 - Network security Controlling traffic appropriately.srt (9.6 KB)
    03 - 2. Requirement 2 Apply Secure Configurations to All System Components
    • 01 - Secure configurations Building hardening standards.mp4 (15.4 MB)
    • 01 - Secure configurations Building hardening standards.srt (13.5 KB)
    04 - 3. Requirement 3 Protect Stored Account Data
    • 01 - Stored PANs Which data can you store and how.mp4 (21.3 MB)
    • 01 - Stored PANs Which data can you store and how.srt (18.2 KB)
    • 02 - Cryptographic controls for stored PAN data.mp4 (9.7 MB)
    • 02 - Cryptographic controls for stored PAN data.srt (8.3 KB)
    • 03 - Key management policies and procedures.mp4 (13.3 MB)
    • 03 - Key management policies and procedures.srt (8.4 KB)
    05 - 4. NAME ADJUSTMENT NEEDED
    • 01 - Safely sending PAN data using strong cryptography.mp4 (11.7 MB)
    • 01 - Safely sending PAN data using strong cryptography.srt (10.3 KB)
    06 - 5. Requirement 5 Protect All Systems and Networks from Malicious Software
    • 01 - Anti-malware options and anti-phishing.mp4 (21.0 MB)
    • 01 - Anti-malware options and anti-phishing.srt (14.9 KB)
    07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software
    • 01 - Secure development.mp4 (11.7 MB)
    • 01 - Secure development.srt (9.3 KB)
    • 02 - Security vulnerabilities and protecting public sites.mp4 (14.1 MB)
    • 02 - Security vulnerabilities and protecting public sites.srt (10.1 KB)
    • 03 - Change management requirements.mp4 (15.9 MB)
    • 03 - Change management requirements.srt (13.2 KB)
    08 - 7. Requirement 7 Restrict Access to System Components and Cardholder Data by Business Need to Know
    • 01 - Designing access controls.mp4 (14.0 MB)
    • 01 - Designing access controls.srt (12.4 KB)
    • 02 - Access control systems.mp4 (5.9 MB)
    • 02 - Access control systems.srt (4.7 KB)
    09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components
    • 01 - Basic user ID requirements.mp4 (14.5 MB)
    • 01 - Basic user ID requirements.srt (13.3 KB)
    • 02 - Strong authentication for PCI.mp4 (17.3 MB)
    • 02 - Strong authentication for PCI.srt (15.8 KB)
    • 03 - Multifactor authentication requirements.mp4 (9.6 MB)
    • 03 - Multifactor authentication requirements.srt (7.8 KB)
    • 04 - System and application account requirements.mp4 (6.1 MB)
    • 04 - System and application account requirements.srt (5.2 KB)
    10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data
    • 01 - Managing physical access.mp4 (15.1 MB)
    • 01 - Managing physical access.srt (12.2 KB)
    • 02 - Managing physical media.mp4 (10.8 MB)
    • 02 - Managing physical media.srt (9.9 KB)
    • 03 - Managing physical payment devices.mp4 (7.3 MB)
    • 03 - Managing physical payment devices.srt (6.0 KB)
    11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data
    • 01 - Collecting audit logs.mp4 (15.8 MB)
    • 01 - Collecting audit logs.srt (10.5 KB)
    • 02 - Reviewing audit logs.mp4 (7.5 MB)
    • 02 - Reviewing audit logs.srt (5.9 KB)
    • 03 - Time synchronization for logs.mp4 (4.7 MB)
    • 03 - Time synchronization for logs.srt (4.3 KB)
    • 04 - Critical security control failures.mp4 (7.0 MB)
    • 04 - Critical security control failures.srt (6.3 KB)
    12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly
    • 01 - Protecting wireless access points.mp4 (5.3 MB)
    • 01 - Protecting wireless access points.srt (4.1 KB)
    • 02 - Vulnerability scanning.mp4 (11.6 MB)
    • 02 - Vulnerability scanning.srt (10.4 KB)
    • 03 - Penetration testing.mp4 (17.1 MB)
    • 03 - Penetration testing.srt (11.8 KB)
    • 04 - Network intrusions and unexpected file changes.mp4 (7.6 MB)
    • 04 - Network intrusions and unexpected file changes.srt (6.8 KB)
    13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs
    • 01 - Information security policy and acceptable use.mp4 (9.2 MB)
    • 01 - Information security policy and acceptable use.srt (6.6 KB)
    • 02 - Risk management and tracking PCI compliance.mp4 (16.4 MB)
    • 02 - Risk management and tracking PCI compliance.srt (11.8 KB)
    • 03 - Tracking PCI scope, maintaining awareness, and screening.mp4 (14.6 MB)
    • 03 - Tracking PCI scope, maintaining awareness, and screening.srt (11.9 KB)
    • 04 - Third-party service provider risks.mp4 (9.3 MB)
    • 04 - Third-party service provider risks.srt (7.6 KB)
    • 05 - Incident response.mp4 (9.5 MB)
    14 - Conclusion
    • 01 - Next steps to meet PCI 4.0.mp4 (5.2 MB)
    • 01 - Next steps to meet PCI 4.0.srt (4.2 KB)
    • Bonus Resources.txt (0.4 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce