وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Fundamentals of PCI-DSS

سرفصل های دوره

Learn everything about the Payment Card Industry Data Security Standards, including assessment and the 12 requirements.


01 - Introduction
  • 001 01-Course-Intro.pdf
  • 001 All-Slides-Fundamentals-of-PCI-DSS.pdf
  • 001 Introduction
  • 002 Useful Information.html

  • 02 - PCI-DSS Essentials
  • 001 02-PCI-DSS-Essentials-01-Intro.pdf
  • 001 Module Intro
  • 002 02-PCI-DSS-Essentials-02-Terminology-Clarifications.pdf
  • 002 Terminology Clarifications
  • 003 02-PCI-DSS-Essentials-03-PCI-DSS-History.pdf
  • 003 PCI-DSS History
  • 004 02-PCI-DSS-Essentials-04-Merchant-Assessment.pdf
  • 004 Merchant Assessment
  • 005 02-PCI-DSS-Essentials-05-Anatomy-of-a-Payment-Flow.pdf
  • 005 Anatomy of a Payment Flow
  • 006 02-PCI-DSS-Essentials-06-Outro.pdf
  • 006 Module Outro

  • 03 - The 12 Requirements (v3.2.1)
  • 001 03-The-12-Requirements-01-Intro.pdf
  • 001 Module Intro
  • 002 03-The-12-Requirements-02-Overview.pdf
  • 002 Overview
  • 003 03-The-12-Requirements-03-Requirement-1-Keep-a-Firewall.pdf
  • 003 Requirement 1 Keep a Firewall
  • 004 03-The-12-Requirements-04-Requirement-2-No-Defaults.pdf
  • 004 Requirement 2 No Defaults
  • 005 03-The-12-Requirements-05-Requirement-3-Protect-Stored-Data.pdf
  • 005 Requirement 3 Protect Stored Data
  • 006 03-The-12-Requirements-06-Requirement-4-Protect-Transmitted-Data.pdf
  • 006 Requirement 4 Protect Transmitted Data
  • 007 03-The-12-Requirements-07-Requirement-5-Prevent-Malware.pdf
  • 007 Requirement 5 Prevent Malware
  • 008 03-The-12-Requirements-08-Requirement-6-Develop-Securely.pdf
  • 008 Requirement 6 Develop Securely
  • 009 03-The-12-Requirements-09-Requirement-7-Need-to-Know-Access.pdf
  • 009 Requirement 7 Need-to-Know Access
  • 010 03-The-12-Requirements-10-Requirement-8-Identify-Access.pdf
  • 010 Requirement 8 Identify Access
  • 011 03-The-12-Requirements-11-Requirement-9-Restrict-Physical-Access.pdf
  • 011 Requirement 9 Restrict Physical Access
  • 012 03-The-12-Requirements-12-Requirement-10-Monitor-Networks.pdf
  • 012 Requirement 10 Monitor Networks
  • 013 03-The-12-Requirements-13-Requirement-11-Test-Regularly.pdf
  • 013 Requirement 11 Test Regularly
  • 014 03-The-12-Requirements-14-Requirement-12-InfoSec-Policy.pdf
  • 014 Requirement 12 InfoSec Policy
  • 015 03-The-12-Requirements-15-General-Patterns-and-Recap.pdf
  • 015 General Patterns and Recap
  • 016 03-The-12-Requirements-16-Outro.pdf
  • 016 Module Outro

  • 04 - Outro
  • 001 04-Course-Outro.pdf
  • 001 All-Slides-Fundamentals-of-PCI-DSS.pdf
  • 001 Course Outro

  • 05 - Additional Module Security Controls
  • 001 Intro
  • 002 Acquisition Strategy
  • 002 Security-Controls-Acquisition-Strategy.pdf
  • 003 Code Analysis
  • 003 Security-Controls-Code-Analysis.pdf
  • 004 Code Signing
  • 004 Security-Controls-Code-Signing.pdf
  • 005 Controls by Data Classification
  • 005 Security-Controls-Controls-By-Data-Classification.pdf
  • 006 Criticality Analysis
  • 006 Security-Controls-Criticality-Analysis.pdf
  • 007 Cryptographic Protection
  • 007 Security-Controls-Cryptographic-Protection.pdf
  • 008 Cyber Threat Hunting
  • 008 Security-Controls-Cyber-Threat-Hunting.pdf
  • 009 Data De-Identification and Anonymisation
  • 009 Security-Controls-Data-De-Identification-Anonymisation.pdf
  • 010 Data Governance Structures
  • 010 Security-Controls-Data-Governance-Structures.pdf
  • 011 Data Purpose and Authority
  • 011 Security-Controls-Data-Usage-Purpose-Authority.pdf
  • 012 Data Retention and Disposal
  • 012 Security-Controls-Data-Retention-Disposal.pdf
  • 013 Defense-In-Depth (DID)
  • 013 Security-Controls-Defense-In-Depth-DID.pdf
  • 014 Information Tainting
  • 014 Security-Controls-Information-Tainting.pdf
  • 015 Locked RoomsDevicesPorts
  • 015 Security-Controls-Locked-Rooms-Devices-Ports.pdf
  • 016 Media DowngradingRedacting
  • 016 Security-Controls-Media-Downgrading-Redacting.pdf
  • 017 Physical Media Protection
  • 017 Security-Controls-Physical-Media-Protection.pdf
  • 018 Provider Assessment and Monitoring
  • 018 Security-Controls-Provider-Assessment-Monitoring.pdf
  • 019 SecurityPrivacy Architectures
  • 019 Security-Controls-Security-Privacy-Architectures.pdf
  • 020 Security-Controls-System-Safe-Modes.pdf
  • 020 System Safe Modes
  • 021 Security-Controls-Thin-Diskless-Devices.pdf
  • 021 ThinDiskless Devices
  • 022 Security-Controls-Usage-Agreements.pdf
  • 022 Usage Agreements
  • 023 Security-Controls-Visitor-Controls.pdf
  • 023 Visitor Controls
  • 024 Outro

  • 06 - Additional Module Pitching Technical Projects
  • 001 01-Module-Intro.pdf
  • 001 Introduction
  • 002 02-Assembling-01-Intro.pdf
  • 002 Assembling Introduction
  • 003 02-Assembling-02-Actions-and-Implementation.pdf
  • 003 Assembling Actions and Implementation
  • 004 02-Assembling-03-Roles-and-Responsibilities.pdf
  • 004 Assembling Roles and Responsibilities
  • 005 02-Assembling-04-Scope-Framework-Roadmap.pdf
  • 005 Assembling Scope, Framework, Roadmap
  • 006 02-Assembling-05-Governance-Structures.pdf
  • 006 Assembling Governance Structures
  • 007 02-Assembling-06-Trackable-Metrics.pdf
  • 007 Assembling Trackable Metrics
  • 008 03-Presenting-01-Intro.pdf
  • 008 Presenting Introduction
  • 009 03-Presenting-02-Recency-and-Primacy.pdf
  • 009 Presenting Recency and Primacy
  • 010 03-Presenting-03-Leveraging-Specifics.pdf
  • 010 Presenting Leveraging Specifics
  • 011 03-Presenting-04-Displayed-Authority.pdf
  • 011 Presenting Displayed Authority
  • 012 03-Presenting-05-The-Heros-Journey.pdf
  • 012 Presenting The Heros Journey
  • 013 03-Presenting-06-Tiredness-and-Distraction.pdf
  • 013 Presenting Tiredness and Distraction
  • 014 04-Dealing-with-Objections-01-Intro.pdf
  • 014 Dealing with Objections Introduction
  • 015 04-Dealing-with-Objections-02-Flipping-and-Diagnosing.pdf
  • 015 Dealing with Objections Flipping and Diagnosing
  • 016 04-Dealing-with-Objections-03-UP-Answers.pdf
  • 016 Dealing with Objections UP Answers
  • 017 04-Dealing-with-Objections-04-Progress-and-Loss.pdf
  • 017 Dealing with Objections Progress and Loss
  • 018 04-Dealing-with-Objections-05-Political-Capital.pdf
  • 018 Dealing with Objections Political Capital
  • 019 05-Securing-Buy-In-01-Intro.pdf
  • 019 Securing Buy-In Introduction
  • 020 05-Securing-Buy-In-02-Implementation-and-Opinions.pdf
  • 020 Securing Buy-In Implementation and Opinions
  • 021 05-Securing-Buy-In-03-Tailored-Benefits.pdf
  • 021 Securing Buy-In Tailored Benefits
  • 022 05-Securing-Buy-In-04-Effort-Shaping.pdf
  • 022 Securing Buy-In Effort Shaping
  • 023 05-Securing-Buy-In-05-Future-Lock-In.pdf
  • 023 Securing Buy-In Future Lock-In
  • 024 06-Full-Run-Throughs-01-Intro.pdf
  • 024 Full Runthroughs Introduction
  • 025 06-Full-Run-Throughs-02-Pitching-PCI-DSS.pdf
  • 025 Full Runthroughs Pitching PCI-DSS
  • 026 06-Full-Run-Throughs-03-Pitching-Vendor-Assessments.pdf
  • 026 Full Runthroughs Pitching Vendor Assessments
  • 027 06-Full-Run-Throughs-05-Pitching-Data-Governance.pdf
  • 027 Full Runthroughs Pitching Data Governance
  • 028 06-Full-Run-Throughs-04-Pitching-Data-Management.pdf
  • 028 Full Runthroughs Pitching Data Management
  • 029 07-Module-Outro.pdf
  • 029 Module Outro

  • 07 - Bonus Lecture
  • 001 Bonus Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 17395
    حجم: 3857 مگابایت
    مدت زمان: 682 دقیقه
    تاریخ انتشار: ۱۳ مرداد ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید