Companies Home Search Profile

PCI DSS: Infrastructure Security

Focused View

Jacob Ansari

1:49:35

24 View
  • 01 - Course Overview.mp4
    01:58
  • 02 - Navigating the PCI DSS Standards.mp4
    04:34
  • 03 - 1.1 Have and Implement Configuration and Management Standards.mp4
    12:05
  • 04 - 1.2 Build and Configure Firewalls Properly.mp4
    04:03
  • 05 - 1.3 Make All Traffic Go through a Firewall.mp4
    09:49
  • 06 - How Assessor Starts an Assessment of Firewalls and Network Devices.mp4
    03:30
  • 07 - Documenting the Business Justification for Firewall Rules.mp4
    01:04
  • 08 - Six Monthly Firewall Reviews.mp4
    04:30
  • 09 - Barriers to Achieving Compliance in Requirement 1.mp4
    02:21
  • 10 - Maintain the Network Diagram.mp4
    02:35
  • 11 - Using Firewall Management Tools.mp4
    01:30
  • 12 - Typical Areas of Non-compliance and Data Compromises.mp4
    02:29
  • 13 - Virtual Firewalls and Firewalls in the Cloud.mp4
    02:58
  • 14 - What About Routers.mp4
    02:23
  • 15 - 1.4 Personal Firewalls.mp4
    02:17
  • 16 - 1.5 Policies and Procedures.mp4
    02:34
  • 17 - Key Tips About the Personal Firewall Requirement.mp4
    04:09
  • 18 - Personal Firewalls and Corporate VPNs.mp4
    03:23
  • 19 - Where Requirement 1.4 Goes Wrong.mp4
    02:08
  • 20 - Policies and Procedures Why They Are Actually Important.mp4
    05:24
  • 21 - Policies, Data Breaches, and How to Manage Policies.mp4
    02:15
  • 22 - 2.1 Remove or Disable Default Passwords and Accounts.mp4
    03:24
  • 23 - 2.2 Develop Secure Configuration Standards.mp4
    07:12
  • 24 - 2.3 Encrypt Non-console Administration Access.mp4
    02:12
  • 25 - 2.4 Maintain an Inventory.mp4
    01:52
  • 26 - 2.5 Policies and Procedures.mp4
    01:57
  • 27 - Default Credentials.mp4
    02:14
  • 28 - System Hardening.mp4
    05:35
  • 29 - Assessing Compliance and Hidden Resources.mp4
    02:51
  • 30 - Encrypting Administration Access Over a Network.mp4
    04:19
  • Description


    The first two requirements of PCI DSS version 3.2.1 are to build and maintain secure networks and systems. You'll learn to understand what each requirement asks for and discover practical guidance from experienced PCI assessors.

    What You'll Learn?


      The key to achieving PCI DSS compliance is a thorough knowledge of each of the sub-requirements and how they will be assessed. In this course, PCI DSS: Infrastructure Security, you’ll learn how to interpret PCI DSS requirements 1 and 2, and apply them to your organization. First, you’ll learn how PCI DSS wants a firewall configuration to be built and maintained to protect cardholder data. Next, you’ll explore the requirement to not use vendor-supplied defaults for systems passwords and other security parameters. Finally, you’ll discover practical insights about both requirements from experienced PCI assessors. When you’ve finished with this course you will have the skills and knowledge to apply PCI DSS requirements 1 and 2 to any organization’s environment and to determine whether it is compliant with the demands of the standard.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jacob Ansari
    Jacob Ansari
    Instructor's Courses
    Jacob Ansari worked on Pluralsight courses that cover the topic of PCI DSS Standards.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 30
    • duration 1:49:35
    • level average
    • Release Date 2023/10/15

    Courses related to Network Security

    Courses related to Information Security