Tag: DSS

Fundamentals of PCI-DSS


Free Download Fundamentals of PCI-DSS
Last updated 12/2022
Created by Vasco PatrĂ­cio,Vasco PatrĂ­cio Executive Coaching
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 79 Lectures ( 11h 22m ) | Size: 3.76 GB

(more…)

The Definitive Guide to PCI DSS Version 4


Free Download The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management
English | 2023 | ISBN: 1484292871 | 264 Pages | PDF EPUB (True) | 4 MB
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor-known as a Qualified Security Assessor (QSA)-needs to know. This book is the first reference to detail the specific documentation needed for every PCI requirement. The authors provide real-world examples of complying with the 12 main PCI requirements and clarify many of the gray areas within the PCI DSS.

(more…)

Working with the PCI DSS 4.0 Compliance Requirements


Released 4/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 2h 44m | Size: 419 MB
If you have a business, organization, or entity of any kind that processes, transmits, or stores cardholder data, you need to meet PCI Data Security Standards. In this course, Laura Louthan covers what you need to know to be in compliance and work with PCI DSS-the Payment Card Industry Data Security Standard, focusing specifically on the newest control version 4.0. Laura dives into the 12 main PCI requirements, their child controls (totaling over 300), and how to meet the intent of each control as you work toward full compliance. Whether you’re a merchant, payment processor, data center, or any other business that needs to ensure the security of cardholder data, follow along with Laura’s advice on installing and maintaining security controls; configuring components; protecting data, systems, and networks; securing systems and software; controlling, authenticating, and restricting access; logging and monitoring access; security testing; risk management; and more.

(more…)