Udemy - Fundamentals of PCI-DSS

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size3.8 GB
  • Uploaded Byfreecoursewb
  • Downloads44
  • Last checkedJul. 28th '23
  • Date uploadedJul. 27th '23
  • Seeders 1
  • Leechers25

Infohash : 53938D259337BB95F2409608DACF133B4F3F675A

Fundamentals of PCI-DSS



https://DevCourseWeb.com

Last updated 12/2022
Created by Vasco PatrĂ­cio,Vasco PatrĂ­cio Executive Coaching
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 79 Lectures ( 11h 22m ) | Size: 3.76 GB

Learn everything about the Payment Card Industry Data Security Standards, including assessment and the 12 requirements.

What you'll learn
You'll learn about the terminology essential to the PCI-DSS, such as CDE, CHD, SAD, PANs, SAQs, ROCs, QSAs, as well as other payment industry terms
You'll learn about the history of the PCI-DSS and its major revisions
You'll learn about how the assessment process works, with ROCs and SAQs, and a clarification of the 8 types of SAQs
You'll learn everything about Requirement 1, involving having a firewall configuration to isolate your card data, network documentation and more
You'll learn everything about Requirement 2, including changing vendor defaults, isolating server functionality and securing vulnerabilities in devices
You'll learn everything about Requirement 3 in terms of securing stored data, including encryption protocols, key lifecycle, key management and more
You'll learn everything about Requirement 4, protecting data in transit, including masking plaintext PANs and using strong encryption protocols such as WPA/WPA2
You'll learn everything about Requirement 5, in terms of preventing malware through an antivirus solution that is frequently updated and frequently runs scans
You'll learn everything about Requirement 6, in terms of developing securely, doing regular vulnerability assessment and patching
You'll learn everything about Requirement 7, in terms of limiting access to card data by "need-to-know", minimising who accesses it formally
You'll learn everything about Requirement 8, in terms of identifying access through unique user IDs, strong authentication and MFA, password practices and more
You'll learn everything about Requirement 9, in terms of physical security, visitor identification/authorisation, as well as media storage/transport/destruction
You'll learn everything about Requirement 10, in terms of having a logging solution, logging specific required events, specific data points, and log integrity
You'll learn everything about Requirement 11, in terms of doing regular AP (authorised + rogue) and IP audits, vulnerability testing, pentesting, etc
You'll learn everything about Requirement 12, in terms of having a company-wide InfoSec policy, including employee screening, third-party screening, etc

Requirements
You don't need any prior knowledge (knowledge of the payment industry or InfoSec helps, but is NOT required)

Files:

[ DevCourseWeb.com ] Udemy - Fundamentals of PCI-DSS
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 001 01-Course-Intro.pdf (805.2 KB)
    • 001 All-Slides-Fundamentals-of-PCI-DSS.pdf (25.5 MB)
    • 001 Introduction.mp4 (27.8 MB)
    • 001 Introduction_en.srt (2.9 KB)
    • 002 Useful Information.html (1.5 KB)
    02 - PCI-DSS Essentials
    • 001 02-PCI-DSS-Essentials-01-Intro.pdf (2.0 MB)
    • 001 Module Intro.mp4 (39.1 MB)
    • 001 Module Intro_en.srt (4.0 KB)
    • 002 02-PCI-DSS-Essentials-02-Terminology-Clarifications.pdf (1.2 MB)
    • 002 Terminology Clarifications.mp4 (152.5 MB)
    • 002 Terminology Clarifications_en.srt (21.8 KB)
    • 003 02-PCI-DSS-Essentials-03-PCI-DSS-History.pdf (633.2 KB)
    • 003 PCI-DSS History.mp4 (30.0 MB)
    • 003 PCI-DSS History_en.srt (8.8 KB)
    • 004 02-PCI-DSS-Essentials-04-Merchant-Assessment.pdf (2.4 MB)
    • 004 Merchant Assessment.mp4 (92.0 MB)
    • 004 Merchant Assessment_en.srt (24.7 KB)
    • 005 02-PCI-DSS-Essentials-05-Anatomy-of-a-Payment-Flow.pdf (970.2 KB)
    • 005 Anatomy of a Payment Flow.mp4 (46.4 MB)
    • 005 Anatomy of a Payment Flow_en.srt (17.5 KB)
    • 006 02-PCI-DSS-Essentials-06-Outro.pdf (2.0 MB)
    • 006 Module Outro.mp4 (29.4 MB)
    • 006 Module Outro_en.srt (3.7 KB)
    03 - The 12 Requirements (v3.2.1)
    • 001 03-The-12-Requirements-01-Intro.pdf (3.5 MB)
    • 001 Module Intro.mp4 (63.8 MB)
    • 001 Module Intro_en.srt (8.5 KB)
    • 002 03-The-12-Requirements-02-Overview.pdf (2.4 MB)
    • 002 Overview.mp4 (187.5 MB)
    • 002 Overview_en.srt (43.6 KB)
    • 003 03-The-12-Requirements-03-Requirement-1-Keep-a-Firewall.pdf (1,009.3 KB)
    • 003 Requirement 1 Keep a Firewall.mp4 (51.3 MB)
    • 003 Requirement 1 Keep a Firewall_en.srt (16.0 KB)
    • 004 03-The-12-Requirements-04-Requirement-2-No-Defaults.pdf (1.2 MB)
    • 004 Requirement 2 No Defaults.mp4 (61.0 MB)
    • 004 Requirement 2 No Defaults_en.srt (17.5 KB)
    • 005 03-The-12-Requirements-05-Requirement-3-Protect-Stored-Data.pdf (1.9 MB)
    • 005 Requirement 3 Protect Stored Data.mp4 (120.6 MB)
    • 005 Requirement 3 Protect Stored Data_en.srt (21.3 KB)
    • 006 03-The-12-Requirements-06-Requirement-4-Protect-Transmitted-Data.pdf (687.1 KB)
    • 006 Requirement 4 Protect Transmitted Data.mp4 (51.9 MB)
    • 006 Requirement 4 Protect Transmitted Data_en.srt (9.1 KB)
    • 007 03-The-12-Requirements-07-Requirement-5-Prevent-Malware.pdf (709.1 KB)
    • 007 Requirement 5 Prevent Malware.mp4 (36.7 MB)
    • 007 Requirement 5 Prevent Malware_en.srt (10.9 KB)
    • 008 03-The-12-Requirements-08-Requirement-6-Develop-Securely.pdf (1.0 MB)
    • 008 Requirement 6 Develop Securely.mp4 (92.0 MB)
    • 008 Requirement 6 Develop Securely_en.srt (19.4 KB)
    • 009 03-The-12-Requirements-09-Requirement-7-Need-to-Know-Access.pdf (1.0 MB)
    • 009 Requirement 7 Need-to-Know Access.mp4 (30.1 MB)
    • 009 Requirement 7 Need-to-Know Access_en.srt (8.7 KB)
    • 010 03-The-12-Requirements-10-Requirement-8-Identify-Access.pdf (856.4 KB)
    • 010 Requirement 8 Identify Access.mp4 (106.0 MB)
    • 010 Requirement 8 Identify Access_en.srt (17.5 KB)
    • 011 03-The-12-Requirements-11-Requirement-9-Restrict-Physical-Access.pdf (1.5 MB)
    • 011 Requirement 9 Restrict Physical Access.mp4 (127.7 MB)
    • 011 Requirement 9 Restrict Physical Access_en.srt (20.0 KB)
    • 012 03-The-12-Requirements-12-Requirement-10-Monitor-Networks.pdf (1.9 MB)
    • 012 Requirement 10 Monitor Networks.mp4 (76.7 MB)
    • 012 Requirement 10 Monitor Networks_en.srt (21.2 KB)
    • 013 03-The-12-Requirements-13-Requirement-11-Test-Regularly.pdf (667.2 KB)
    • 013 Requirement 11 Test Regularly.mp4 (39.6 MB)
    • 013 Requirement 11 Test Regularly_en.srt (13.6 KB)
    • 014 03-The-12-Requirements-14-Requirement-12-InfoSec-Policy.pdf (1.1 MB)
    • 014 Requirement 12 InfoSec Policy.mp4 (131.7 MB)
    • 014 Requirement 12 InfoSec Policy_en.srt (26.0 KB)
    • 015 03-The-12-Requirements-15-General-Patterns-and-Recap.pdf (2.8 MB)
    • 015 General Patterns and Recap.mp4 (137.8 MB)
    • 015 General Patterns and Recap_en.srt (42.0 KB)
    • 016 03-The-12-Requirements-16-Outro.pdf (3.5 MB)
    • 016 Module Outro.mp4 (23.9 MB)
    • 016 Module Outro_en.srt (5.9 KB)
    04 - Outro
    • 001 04-Course-Outro.pdf (805.1 KB)
    • 001 All-Slides-Fundamentals-of-PCI-DSS.pdf (25.5 MB)
    • 001 Course Outro.mp4 (22.2 MB)
    • 001 Course Outro_en.srt (2.8 KB)
    05 - Additional Module Security Controls
    • 001 Intro.mp4 (4.9 MB)
    • 001 Intro_en.srt (0.7 KB)
    • 002 Acquisition Strategy.mp4 (64.6 MB)
    • 002 Acquisition Strategy_en.srt (11.4 KB)
    • 002 Security-Controls-Acquisition-Strategy.pdf (731.8 KB)
    • 003 Code Analysis.mp4 (29.1 MB)
    • 003 Code Analysis_en.srt (10.1 KB)
    • 003 Security-Controls-Code-Analysis.pdf (947.9 KB)
    • 004 Code Signing.mp4 (40.0 MB)
    • 004 Code Signing_en.srt (10.1 KB)
    • 004 Security-Controls-Code-Signing.pdf (560.9 KB)
    • 005 Controls by Data Classification.mp4 (35.0 MB)
    • 005 Controls by Data Classification_en.srt (11.8 KB)
    • 005 Security-Controls-Controls-By-Data-Classification.pdf (1.2 MB)
    • 006 Criticality Analysis.mp4 (41.2 MB)
    • 006 Criticality Analysis_en.srt (10.0 KB)
    • 006 Security-Controls-Criticality-Analysis.pdf (595.0 KB)
    • 007 Cryptographic Protection.mp4 (24.2 MB)
    • 007 Cryptographic Protection_en.srt (10.3 KB)
    • 007 Security-Controls-Cryptographic-Protection.pdf (477.1 KB)
    • 008 Cyber Threat Hunting.mp4 (37.0 MB)
    • 008 Cyber Threat Hunting_en.srt (11.9 KB)
    • 008 Security-Controls-Cyber-Threat-Hunting.pdf (819.7 KB)
    • 009 Data De-Identification and Anonymisation.mp4 (53.6 MB)
    • 009 Data De-Identification and Anonymisation_en.srt (12.4 KB)
    • 009 Security-Controls-Data-De-Identification-Anonymisation.pdf (1.1 MB)
    • 010 Data Governance Structures.mp4 (35.4 MB)
    • 010 Data Governance Structures_en.srt (

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce