Companies Home Search Profile

Payment Card Security, Processing, and the PCI Standards

Focused View

John Elliott

1:50:23

38 View
  • 01. Course Overview.mp4
    01:42
  • 01. How Payment Card Transactions Appear on a Statement.mp4
    04:12
  • 02. The Data Stored on a Payment Card.mp4
    05:26
  • 03. The Entities Involved in Authorizing a Payment Card Transaction.mp4
    05:34
  • 04. Getting Paid Clearing and Settlement.mp4
    03:14
  • 05. E-commerce Transactions and Payment Service Providers.mp4
    05:02
  • 06. Undoing a Transaction Refunds and Chargebacks.mp4
    02:56
  • 07. Getting Cash from an ATM.mp4
    01:29
  • 08. Summary of How Payment Transactions Work.mp4
    03:09
  • 01. How Criminals Profit from Payment Card Data .mp4
    05:07
  • 02. Where to Find Data Worth Stealing.mp4
    06:32
  • 03. The Difference with Chip (EMV) Cards.mp4
    07:01
  • 04. Where the PCI Standards Come From.mp4
    04:32
  • 05. PCI DSS and PCI PA-DSS.mp4
    05:35
  • 06. PIN Transaction Security Standards.mp4
    05:33
  • 07. Point-to-point Encryption and Card Production Standards.mp4
    04:18
  • 08. Where to Find the Payment Card Industry Standards.mp4
    02:50
  • 01. Why Comply with the PCI Standards.mp4
    04:23
  • 02. What Does the PCI SSC Do.mp4
    04:44
  • 03. Qualified Security Assessors and More.mp4
    03:44
  • 04. Demonstrating Compliance with a PCI Standard.mp4
    04:42
  • 05. Matching Assessor to Activity.mp4
    04:24
  • 01. Why Become a PCIP.mp4
    03:45
  • 02. The Application Process.mp4
    05:14
  • 03. Passing the Exam.mp4
    03:15
  • 04. Staying Qualified.mp4
    02:00
  • Description


    Billions of card payment transactions happen every day. This course explains how they work, how criminals can turn payment card transactions into money, and how the PCI Security Standards aim to stop them.

    What You'll Learn?


      There is a reason that criminals steal payment card data. It is because they can turn the stolen data into money. In this course, Payment Card Security, Processing, and the PCI Standards, you'll discover how a payment card transaction gets from the store to your statement and in the process learn about the electronic messages that move between the banks and payment card schemes. First, you'll find out how criminals turn the data into money and how the payment card industry stops them with the security standards that everyone and everything in the process has to follow. Next, you'll learn about which PCI authorized assessors and laboratories are required for an organization to validate compliance with the various PCI Security Standards. Finally, you'll explore the foundation qualification, the PCI Professional, that you may want to consider. By the end of this course, you'll understand how the payment system works and the PCI Security Standards role in protecting this data.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    John Elliott
    John Elliott
    Instructor's Courses
    John Elliott is a specialist in regulated security and data protection. His fascination is the way that people engage with security directives: whether that’s a company following external regulation, an information security team developing policies, an IT team following them, or a colleague who is just trying to do their job securely. John has led information security and data protection functions in aviation and financial services. He’s represented both Visa Europe and Mastercard on the PCI Security Standards Council, and contributed to many of the PCI standards including PCI DSS v4. He has LLM in Information Rights Law, holds the expected information security certificates (CISSP, CISA , CRISC, CDPSE) and is a Fellow of the British Computer Society - the Chartered Institute for IT.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 26
    • duration 1:50:23
    • level preliminary
    • Release Date 2023/10/15

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness