وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Fundamentals of PCI-DSS

سرفصل های دوره

Learn everything about the Payment Card Industry Data Security Standards, including assessment and the 12 requirements.


01 - Introduction
  • 001 01-Course-Intro.pdf
  • 001 All-Slides-Fundamentals-of-PCI-DSS.pdf
  • 001 Introduction
  • 002 Useful Information.html

  • 02 - PCI-DSS Essentials
  • 001 02-PCI-DSS-Essentials-01-Intro.pdf
  • 001 Module Intro
  • 002 02-PCI-DSS-Essentials-02-Terminology-Clarifications.pdf
  • 002 Terminology Clarifications
  • 003 02-PCI-DSS-Essentials-03-PCI-DSS-History.pdf
  • 003 PCI-DSS History
  • 004 02-PCI-DSS-Essentials-04-Merchant-Assessment.pdf
  • 004 Merchant Assessment
  • 005 02-PCI-DSS-Essentials-05-Anatomy-of-a-Payment-Flow.pdf
  • 005 Anatomy of a Payment Flow
  • 006 02-PCI-DSS-Essentials-06-Outro.pdf
  • 006 Module Outro

  • 03 - The 12 Requirements (v3.2.1)
  • 001 03-The-12-Requirements-01-Intro.pdf
  • 001 Module Intro
  • 002 03-The-12-Requirements-02-Overview.pdf
  • 002 Overview
  • 003 03-The-12-Requirements-03-Requirement-1-Keep-a-Firewall.pdf
  • 003 Requirement 1 Keep a Firewall
  • 004 03-The-12-Requirements-04-Requirement-2-No-Defaults.pdf
  • 004 Requirement 2 No Defaults
  • 005 03-The-12-Requirements-05-Requirement-3-Protect-Stored-Data.pdf
  • 005 Requirement 3 Protect Stored Data
  • 006 03-The-12-Requirements-06-Requirement-4-Protect-Transmitted-Data.pdf
  • 006 Requirement 4 Protect Transmitted Data
  • 007 03-The-12-Requirements-07-Requirement-5-Prevent-Malware.pdf
  • 007 Requirement 5 Prevent Malware
  • 008 03-The-12-Requirements-08-Requirement-6-Develop-Securely.pdf
  • 008 Requirement 6 Develop Securely
  • 009 03-The-12-Requirements-09-Requirement-7-Need-to-Know-Access.pdf
  • 009 Requirement 7 Need-to-Know Access
  • 010 03-The-12-Requirements-10-Requirement-8-Identify-Access.pdf
  • 010 Requirement 8 Identify Access
  • 011 03-The-12-Requirements-11-Requirement-9-Restrict-Physical-Access.pdf
  • 011 Requirement 9 Restrict Physical Access
  • 012 03-The-12-Requirements-12-Requirement-10-Monitor-Networks.pdf
  • 012 Requirement 10 Monitor Networks
  • 013 03-The-12-Requirements-13-Requirement-11-Test-Regularly.pdf
  • 013 Requirement 11 Test Regularly
  • 014 03-The-12-Requirements-14-Requirement-12-InfoSec-Policy.pdf
  • 014 Requirement 12 InfoSec Policy
  • 015 03-The-12-Requirements-15-General-Patterns-and-Recap.pdf
  • 015 General Patterns and Recap
  • 016 03-The-12-Requirements-16-Outro.pdf
  • 016 Module Outro

  • 04 - Outro
  • 001 04-Course-Outro.pdf
  • 001 All-Slides-Fundamentals-of-PCI-DSS.pdf
  • 001 Course Outro

  • 05 - Additional Module Security Controls
  • 001 Intro
  • 002 Acquisition Strategy
  • 002 Security-Controls-Acquisition-Strategy.pdf
  • 003 Code Analysis
  • 003 Security-Controls-Code-Analysis.pdf
  • 004 Code Signing
  • 004 Security-Controls-Code-Signing.pdf
  • 005 Controls by Data Classification
  • 005 Security-Controls-Controls-By-Data-Classification.pdf
  • 006 Criticality Analysis
  • 006 Security-Controls-Criticality-Analysis.pdf
  • 007 Cryptographic Protection
  • 007 Security-Controls-Cryptographic-Protection.pdf
  • 008 Cyber Threat Hunting
  • 008 Security-Controls-Cyber-Threat-Hunting.pdf
  • 009 Data De-Identification and Anonymisation
  • 009 Security-Controls-Data-De-Identification-Anonymisation.pdf
  • 010 Data Governance Structures
  • 010 Security-Controls-Data-Governance-Structures.pdf
  • 011 Data Purpose and Authority
  • 011 Security-Controls-Data-Usage-Purpose-Authority.pdf
  • 012 Data Retention and Disposal
  • 012 Security-Controls-Data-Retention-Disposal.pdf
  • 013 Defense-In-Depth (DID)
  • 013 Security-Controls-Defense-In-Depth-DID.pdf
  • 014 Information Tainting
  • 014 Security-Controls-Information-Tainting.pdf
  • 015 Locked RoomsDevicesPorts
  • 015 Security-Controls-Locked-Rooms-Devices-Ports.pdf
  • 016 Media DowngradingRedacting
  • 016 Security-Controls-Media-Downgrading-Redacting.pdf
  • 017 Physical Media Protection
  • 017 Security-Controls-Physical-Media-Protection.pdf
  • 018 Provider Assessment and Monitoring
  • 018 Security-Controls-Provider-Assessment-Monitoring.pdf
  • 019 SecurityPrivacy Architectures
  • 019 Security-Controls-Security-Privacy-Architectures.pdf
  • 020 Security-Controls-System-Safe-Modes.pdf
  • 020 System Safe Modes
  • 021 Security-Controls-Thin-Diskless-Devices.pdf
  • 021 ThinDiskless Devices
  • 022 Security-Controls-Usage-Agreements.pdf
  • 022 Usage Agreements
  • 023 Security-Controls-Visitor-Controls.pdf
  • 023 Visitor Controls
  • 024 Outro

  • 06 - Additional Module Pitching Technical Projects
  • 001 01-Module-Intro.pdf
  • 001 Introduction
  • 002 02-Assembling-01-Intro.pdf
  • 002 Assembling Introduction
  • 003 02-Assembling-02-Actions-and-Implementation.pdf
  • 003 Assembling Actions and Implementation
  • 004 02-Assembling-03-Roles-and-Responsibilities.pdf
  • 004 Assembling Roles and Responsibilities
  • 005 02-Assembling-04-Scope-Framework-Roadmap.pdf
  • 005 Assembling Scope, Framework, Roadmap
  • 006 02-Assembling-05-Governance-Structures.pdf
  • 006 Assembling Governance Structures
  • 007 02-Assembling-06-Trackable-Metrics.pdf
  • 007 Assembling Trackable Metrics
  • 008 03-Presenting-01-Intro.pdf
  • 008 Presenting Introduction
  • 009 03-Presenting-02-Recency-and-Primacy.pdf
  • 009 Presenting Recency and Primacy
  • 010 03-Presenting-03-Leveraging-Specifics.pdf
  • 010 Presenting Leveraging Specifics
  • 011 03-Presenting-04-Displayed-Authority.pdf
  • 011 Presenting Displayed Authority
  • 012 03-Presenting-05-The-Heros-Journey.pdf
  • 012 Presenting The Heros Journey
  • 013 03-Presenting-06-Tiredness-and-Distraction.pdf
  • 013 Presenting Tiredness and Distraction
  • 014 04-Dealing-with-Objections-01-Intro.pdf
  • 014 Dealing with Objections Introduction
  • 015 04-Dealing-with-Objections-02-Flipping-and-Diagnosing.pdf
  • 015 Dealing with Objections Flipping and Diagnosing
  • 016 04-Dealing-with-Objections-03-UP-Answers.pdf
  • 016 Dealing with Objections UP Answers
  • 017 04-Dealing-with-Objections-04-Progress-and-Loss.pdf
  • 017 Dealing with Objections Progress and Loss
  • 018 04-Dealing-with-Objections-05-Political-Capital.pdf
  • 018 Dealing with Objections Political Capital
  • 019 05-Securing-Buy-In-01-Intro.pdf
  • 019 Securing Buy-In Introduction
  • 020 05-Securing-Buy-In-02-Implementation-and-Opinions.pdf
  • 020 Securing Buy-In Implementation and Opinions
  • 021 05-Securing-Buy-In-03-Tailored-Benefits.pdf
  • 021 Securing Buy-In Tailored Benefits
  • 022 05-Securing-Buy-In-04-Effort-Shaping.pdf
  • 022 Securing Buy-In Effort Shaping
  • 023 05-Securing-Buy-In-05-Future-Lock-In.pdf
  • 023 Securing Buy-In Future Lock-In
  • 024 06-Full-Run-Throughs-01-Intro.pdf
  • 024 Full Runthroughs Introduction
  • 025 06-Full-Run-Throughs-02-Pitching-PCI-DSS.pdf
  • 025 Full Runthroughs Pitching PCI-DSS
  • 026 06-Full-Run-Throughs-03-Pitching-Vendor-Assessments.pdf
  • 026 Full Runthroughs Pitching Vendor Assessments
  • 027 06-Full-Run-Throughs-05-Pitching-Data-Governance.pdf
  • 027 Full Runthroughs Pitching Data Governance
  • 028 06-Full-Run-Throughs-04-Pitching-Data-Management.pdf
  • 028 Full Runthroughs Pitching Data Management
  • 029 07-Module-Outro.pdf
  • 029 Module Outro

  • 07 - Bonus Lecture
  • 001 Bonus Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 17395
    حجم: 3857 مگابایت
    مدت زمان: 682 دقیقه
    تاریخ انتشار: 13 مرداد 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید