17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Linkedin - Working With The PCI DSS 4.0 Compliance Requirements
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
If you have a business, organization, or entity of any kind that processes, transmits, or stores cardholder data, you need to meet PCI Data Security Standards. In this course, Laura Louthan covers what you need to know to be in compliance and work with PCI DSS—the Payment Card Industry Data Security Standard, focusing specifically on the newest control version 4.0. Laura dives into the 12 main PCI requirements, their child controls (totaling over 300), and how to meet the intent of each control as you work toward full compliance. Whether you’re a merchant, payment processor, data center, or any other business that needs to ensure the security of cardholder data, follow along with Laura’s advice on installing and maintaining security controls; configuring components; protecting data, systems, and networks; securing systems and software; controlling, authenticating, and restricting access; logging and monitoring access; security testing; risk management; and more.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/01 - Introduction to PCI 4.0.mp4
7.3 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to PCI 4.0.srt
1.3 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know as background for this course.mp4
4.4 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know as background for this course.srt
4.1 KB
~Get Your Files Here !/01 - Introduction/03 - How this course is designed to help you learn.mp4
8.6 MB
~Get Your Files Here !/01 - Introduction/03 - How this course is designed to help you learn.srt
8.2 KB
~Get Your Files Here !/02 - 1. Requirement 1 Install and Maintain Network Security Controls/01 - Network security Creating strong network security controls.mp4
10.5 MB
~Get Your Files Here !/02 - 1. Requirement 1 Install and Maintain Network Security Controls/01 - Network security Creating strong network security controls.srt
7.7 KB
~Get Your Files Here !/02 - 1. Requirement 1 Install and Maintain Network Security Controls/02 - Network security Controlling traffic appropriately.mp4
12.5 MB
~Get Your Files Here !/02 - 1. Requirement 1 Install and Maintain Network Security Controls/02 - Network security Controlling traffic appropriately.srt
9.6 KB
~Get Your Files Here !/03 - 2. Requirement 2 Apply Secure Configurations to All System Components/01 - Secure configurations Building hardening standards.mp4
15.4 MB
~Get Your Files Here !/03 - 2. Requirement 2 Apply Secure Configurations to All System Components/01 - Secure configurations Building hardening standards.srt
13.5 KB
~Get Your Files Here !/04 - 3. Requirement 3 Protect Stored Account Data/01 - Stored PANs Which data can you store and how.mp4
21.3 MB
~Get Your Files Here !/04 - 3. Requirement 3 Protect Stored Account Data/01 - Stored PANs Which data can you store and how.srt
18.2 KB
~Get Your Files Here !/04 - 3. Requirement 3 Protect Stored Account Data/02 - Cryptographic controls for stored PAN data.mp4
9.7 MB
~Get Your Files Here !/04 - 3. Requirement 3 Protect Stored Account Data/02 - Cryptographic controls for stored PAN data.srt
8.3 KB
~Get Your Files Here !/04 - 3. Requirement 3 Protect Stored Account Data/03 - Key management policies and procedures.mp4
13.3 MB
~Get Your Files Here !/04 - 3. Requirement 3 Protect Stored Account Data/03 - Key management policies and procedures.srt
8.4 KB
~Get Your Files Here !/05 - 4. NAME ADJUSTMENT NEEDED/01 - Safely sending PAN data using strong cryptography.mp4
11.7 MB
~Get Your Files Here !/05 - 4. NAME ADJUSTMENT NEEDED/01 - Safely sending PAN data using strong cryptography.srt
10.3 KB
~Get Your Files Here !/06 - 5. Requirement 5 Protect All Systems and Networks from Malicious Software/01 - Anti-malware options and anti-phishing.mp4
21 MB
~Get Your Files Here !/06 - 5. Requirement 5 Protect All Systems and Networks from Malicious Software/01 - Anti-malware options and anti-phishing.srt
14.9 KB
~Get Your Files Here !/07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software/01 - Secure development.mp4
11.7 MB
~Get Your Files Here !/07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software/01 - Secure development.srt
9.3 KB
~Get Your Files Here !/07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software/02 - Security vulnerabilities and protecting public sites.mp4
14.1 MB
~Get Your Files Here !/07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software/02 - Security vulnerabilities and protecting public sites.srt
10.1 KB
~Get Your Files Here !/07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software/03 - Change management requirements.mp4
15.9 MB
~Get Your Files Here !/07 - 6. Requirement 6 Develop and Maintain Secure Systems and Software/03 - Change management requirements.srt
13.2 KB
~Get Your Files Here !/08 - 7. Requirement 7 Restrict Access to System Components and Cardholder Data by Business Need to Know/01 - Designing access controls.mp4
14 MB
~Get Your Files Here !/08 - 7. Requirement 7 Restrict Access to System Components and Cardholder Data by Business Need to Know/01 - Designing access controls.srt
12.4 KB
~Get Your Files Here !/08 - 7. Requirement 7 Restrict Access to System Components and Cardholder Data by Business Need to Know/02 - Access control systems.mp4
5.9 MB
~Get Your Files Here !/08 - 7. Requirement 7 Restrict Access to System Components and Cardholder Data by Business Need to Know/02 - Access control systems.srt
4.7 KB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/01 - Basic user ID requirements.mp4
14.5 MB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/01 - Basic user ID requirements.srt
13.3 KB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/02 - Strong authentication for PCI.mp4
17.3 MB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/02 - Strong authentication for PCI.srt
15.8 KB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/03 - Multifactor authentication requirements.mp4
9.6 MB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/03 - Multifactor authentication requirements.srt
7.8 KB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/04 - System and application account requirements.mp4
6.1 MB
~Get Your Files Here !/09 - 8. Requirement 8 Identify Users and Authenticate Access to System Components/04 - System and application account requirements.srt
5.2 KB
~Get Your Files Here !/10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data/01 - Managing physical access.mp4
15.1 MB
~Get Your Files Here !/10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data/01 - Managing physical access.srt
12.2 KB
~Get Your Files Here !/10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data/02 - Managing physical media.mp4
10.8 MB
~Get Your Files Here !/10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data/02 - Managing physical media.srt
9.9 KB
~Get Your Files Here !/10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data/03 - Managing physical payment devices.mp4
7.3 MB
~Get Your Files Here !/10 - 9. Requirement 9 Restrict Physical Access to Cardholder Data/03 - Managing physical payment devices.srt
6 KB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/01 - Collecting audit logs.mp4
15.8 MB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/01 - Collecting audit logs.srt
10.5 KB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/02 - Reviewing audit logs.mp4
7.5 MB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/02 - Reviewing audit logs.srt
5.9 KB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/03 - Time synchronization for logs.mp4
4.7 MB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/03 - Time synchronization for logs.srt
4.3 KB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/04 - Critical security control failures.mp4
7 MB
~Get Your Files Here !/11 - 10. Requirement 10 Log and Monitor All Access to System Components and Cardholder Data/04 - Critical security control failures.srt
6.3 KB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/01 - Protecting wireless access points.mp4
5.3 MB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/01 - Protecting wireless access points.srt
4.1 KB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/02 - Vulnerability scanning.mp4
11.6 MB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/02 - Vulnerability scanning.srt
10.4 KB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/03 - Penetration testing.mp4
17.1 MB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/03 - Penetration testing.srt
11.8 KB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/04 - Network intrusions and unexpected file changes.mp4
7.6 MB
~Get Your Files Here !/12 - 11. Requirement 11 Test the Security of Systems and Networks Regularly/04 - Network intrusions and unexpected file changes.srt
6.8 KB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/01 - Information security policy and acceptable use.mp4
9.2 MB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/01 - Information security policy and acceptable use.srt
6.6 KB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/02 - Risk management and tracking PCI compliance.mp4
16.4 MB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/02 - Risk management and tracking PCI compliance.srt
11.8 KB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/03 - Tracking PCI scope, maintaining awareness, and screening.mp4
14.6 MB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/03 - Tracking PCI scope, maintaining awareness, and screening.srt
11.9 KB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/04 - Third-party service provider risks.mp4
9.3 MB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/04 - Third-party service provider risks.srt
7.6 KB
~Get Your Files Here !/13 - 12. Requirement 12 Support Information Security with Organizational Policies and Programs/05 - Incident response.mp4
9.5 MB
~Get Your Files Here !/14 - Conclusion/01 - Next steps to meet PCI 4.0.mp4
5.2 MB
~Get Your Files Here !/14 - Conclusion/01 - Next steps to meet PCI 4.0.srt