โ€œIf you do not know the subject well enough
You can not explain it simply enoughโ€
Albert Einstein
With decades of hands on Industry Experience, and hundreds of
ISO audits, our Principal Trainers help you translate:-
Infact we do not teach you, but involve you and engage you one
hundred percent. To ideate, to discuss, to brainstorm.
Are you Ready to get involved?
www.isocertificationtrainingcourse.org
registrar@isocertificationtrainingcourse.org
PCI DSS Implementation Training
PCI DSS Implementation Training Course Features
PCI DSS, PA DSS and PTS are now considered the defacto payment card industry
standards. All institutions or entities which store process or transmit card holder data
are subject tocompliancewith theseconstantlyevolving standards. Manyorganisations
have achieved compliance whilst others are making significant progress in achieving
compliancenot without itschallenges. Organisationsstill face a significantchallengeof
interpreting and applying this evolving set of standards as well as ensuring that
compliance is maintained at all times, but more importantly addressing risk mitigation
measures as threats evolve.
The PCI DSS ImplementationTraining isdesigned for card paymentsand IT specialists
focused onmanaging and implementingallaspectsofPCIcompliancecontrolswith their
organisations. The training covers PCI DSS from an implementation perspective, also
covered are guidelines on PA DSS, and PTS as well as additional best practices such as
vulnerability assessment and secure software development. Delegates who attend this
course will find many answers to pressing questions and are equipped with clear and
practical guidance helping save effort, time and money.
PCI DSS Implementation Training Objectives
โ— Learn how to reduce your QSA costs and gain more control over the project;
โ— Learnabout keyaspectsofmanaging andmaintaining compliancewith keyaspects
such as change control and continuous compliance monitoring;
โ— Gainan in-depth understandingof the PCI DSS standard and its relationto other
PCI standards such as PTS DSS and PA DSS;
โ— Find out about open source and commercial tools that help implement controls
and secure systems.
Who should Attends PCI DSS Implementation Training
The training session focuses on technical issues, see the agenda for a full overview.
Suitable for those concerned with coordinating, managing, and/or implementing PCI
Compliance within their organisation, namely:
โ— CSOs, CIO, CISO, System Security Executives, Software Developers
โ— Incident Response Teams, PCI Project Managers
โ— Information Security Managers, Compliance Managers
โ— IT Audit, Payment Cards, Payment Systems or similar.
Overview of contents of PCI DSS Implementation Training
Security Breaches Overview & Vulnerability Experiences
โ— Impact of Data Compromises and Increasing Risk to Cardholder Data
โ— Compromise Examples
โ— Compromise Discussion
PCI DSS and other standards
โ— Intent of PCI DSS
โ— Relationship to Industry Standards such as ISO 27001
โ— Understanding key concepts: Compliance & Validation
โ— Validation Levels and differences between Card Brands
โ— Compliance & Validation Exercise
Securing Payment Applications
โ— Payment Application DSS Scope & Requirements
โ— Application Security and Industry Guidelines (OWASP)
โ— Application Compromise Demonstration
PIN Transaction Security (PTS)
โ— PTS Scope
โ— PIN Management
PCI DSS Requirements explanation including the 12 Sections and sub requirements as
well as practical examples, topics include:
โ— Firewall configuration Standards and Settings
โ— Network Segmentation and Firewall Rules
โ— Vendors Defaults and Admin Access
โ— System Configuration Standards
โ— Cardholder Data Retention
โ— Protecting Stored Data
โ— Encrypting Cardholder Data
โ— Encryption Key Management
โ— Encrypting Sensitive Data over Public Networks
โ— Using and updating anti-virus software principles
โ— Updated Wireless Guidelines, End to End Encryption Patch management and
change control
โ— Software Development Controls
โ— Secure Software Development
โ— Web-facing Applications
Key Concepts: Understanding Card Data
โ— CVV vs CVV2, Track 1 vs Track 2 Data, Full Track or Magnetic Stripe
โ— Track Data Characteristics and Guidelines for Searching, MOD-10
PCI DSS Applicability and Scoping
โ— Applicable Cardholder Data concepts
โ— Scoping Procedure
โ— Network Segmentation & Exercise
โ— Scoping for Virtualization/Cloud Computing
โ— Scoping Exercise
Understanding & Applying Compensating Controls
โ— Understanding Scoping: Intent vs Requirement
โ— Risk based approach: How to apply Compensating Controls
โ— Compensating Controls Case Study Scenario and Discussion
Scope Reduction: Tokenization/Encryption
โ— Understanding Encryption applied to PCI DSS
โ— The Tokenization Concept
โ— Encryption/Tokenisation Case Study
โ— End to End (E2E) encryption
โ— Restricting access to cardholder data
โ— Unique User Ids
โ— Two-Factor Authentication
โ— User Authentication
โ— Restricting physical access to cardholder data
โ— Maintaining Information Security policies
โ— Employee Acceptable Use Policy
โ— Information Security Management Responsibilities
โ— Employee Education and Screening
โ— Service Provider Requirements
โ— Incident Response Planning
โ— Virtualization, tokenization, Cloud computing
โ— Logging Access to Cardholder Data
โ— Monitoring Access to Cardholder Data
โ— Vulnerability Scans and Penetration Testing
โ— IDS and FIM
PCI DSS Implementation Training Achievement
Upon successful completion of the course a Certificate of โ€œPCIDSS Lead Implementer
Trainingโ€ will be issued.
CPD-40
CEU-4.0
PCI DSS Implementation Training Duration- 05 days
PCI DSS Implementation Training Calendar [ Click here ]
Value added PCI DSS Implementation Training
Accelerate learning with the expert faculty Lead Auditors and Principal Trainers from
the Industry. PCI DSS Implementation Learning from the "SpecialistExpert" hasmany
advantages:-
โ— It will drastically change the way of thinking and basic approach towards the
Management System Standards.
โ— You would cherish & Benchmark our training for a very long time to come.
โ— No fictitious case studies you can not connect with.
โ— Real time examples, real time scenarios you can quickly relate to.
โ— Complete Focus on your systems, processes and line of businesses.
โ— 100% involvement and engagement of the participants
โ— Learn to make the ISO Standard sweat to:-
A). Improve the profits.
B). Reduce rework, defects, customer rejections, wastage,& cost of operation
C). Enhance customer delight
D). Reduce attrition of customers and employees
E). Enhance confidence of all stakeholders
PCI DSS Implementation

PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION

  • 1.
    โ€œIf you donot know the subject well enough You can not explain it simply enoughโ€ Albert Einstein
  • 2.
    With decades ofhands on Industry Experience, and hundreds of ISO audits, our Principal Trainers help you translate:-
  • 3.
    Infact we donot teach you, but involve you and engage you one hundred percent. To ideate, to discuss, to brainstorm. Are you Ready to get involved?
  • 4.
    www.isocertificationtrainingcourse.org registrar@isocertificationtrainingcourse.org PCI DSS ImplementationTraining PCI DSS Implementation Training Course Features PCI DSS, PA DSS and PTS are now considered the defacto payment card industry standards. All institutions or entities which store process or transmit card holder data are subject tocompliancewith theseconstantlyevolving standards. Manyorganisations have achieved compliance whilst others are making significant progress in achieving compliancenot without itschallenges. Organisationsstill face a significantchallengeof interpreting and applying this evolving set of standards as well as ensuring that compliance is maintained at all times, but more importantly addressing risk mitigation measures as threats evolve. The PCI DSS ImplementationTraining isdesigned for card paymentsand IT specialists focused onmanaging and implementingallaspectsofPCIcompliancecontrolswith their organisations. The training covers PCI DSS from an implementation perspective, also covered are guidelines on PA DSS, and PTS as well as additional best practices such as vulnerability assessment and secure software development. Delegates who attend this course will find many answers to pressing questions and are equipped with clear and practical guidance helping save effort, time and money. PCI DSS Implementation Training Objectives โ— Learn how to reduce your QSA costs and gain more control over the project; โ— Learnabout keyaspectsofmanaging andmaintaining compliancewith keyaspects such as change control and continuous compliance monitoring; โ— Gainan in-depth understandingof the PCI DSS standard and its relationto other PCI standards such as PTS DSS and PA DSS; โ— Find out about open source and commercial tools that help implement controls and secure systems. Who should Attends PCI DSS Implementation Training
  • 5.
    The training sessionfocuses on technical issues, see the agenda for a full overview. Suitable for those concerned with coordinating, managing, and/or implementing PCI Compliance within their organisation, namely: โ— CSOs, CIO, CISO, System Security Executives, Software Developers โ— Incident Response Teams, PCI Project Managers โ— Information Security Managers, Compliance Managers โ— IT Audit, Payment Cards, Payment Systems or similar. Overview of contents of PCI DSS Implementation Training Security Breaches Overview & Vulnerability Experiences โ— Impact of Data Compromises and Increasing Risk to Cardholder Data โ— Compromise Examples โ— Compromise Discussion PCI DSS and other standards โ— Intent of PCI DSS โ— Relationship to Industry Standards such as ISO 27001 โ— Understanding key concepts: Compliance & Validation โ— Validation Levels and differences between Card Brands โ— Compliance & Validation Exercise Securing Payment Applications โ— Payment Application DSS Scope & Requirements โ— Application Security and Industry Guidelines (OWASP) โ— Application Compromise Demonstration PIN Transaction Security (PTS) โ— PTS Scope โ— PIN Management PCI DSS Requirements explanation including the 12 Sections and sub requirements as well as practical examples, topics include: โ— Firewall configuration Standards and Settings โ— Network Segmentation and Firewall Rules โ— Vendors Defaults and Admin Access โ— System Configuration Standards โ— Cardholder Data Retention โ— Protecting Stored Data โ— Encrypting Cardholder Data โ— Encryption Key Management โ— Encrypting Sensitive Data over Public Networks โ— Using and updating anti-virus software principles
  • 6.
    โ— Updated WirelessGuidelines, End to End Encryption Patch management and change control โ— Software Development Controls โ— Secure Software Development โ— Web-facing Applications Key Concepts: Understanding Card Data โ— CVV vs CVV2, Track 1 vs Track 2 Data, Full Track or Magnetic Stripe โ— Track Data Characteristics and Guidelines for Searching, MOD-10 PCI DSS Applicability and Scoping โ— Applicable Cardholder Data concepts โ— Scoping Procedure โ— Network Segmentation & Exercise โ— Scoping for Virtualization/Cloud Computing โ— Scoping Exercise Understanding & Applying Compensating Controls โ— Understanding Scoping: Intent vs Requirement โ— Risk based approach: How to apply Compensating Controls โ— Compensating Controls Case Study Scenario and Discussion Scope Reduction: Tokenization/Encryption โ— Understanding Encryption applied to PCI DSS โ— The Tokenization Concept โ— Encryption/Tokenisation Case Study โ— End to End (E2E) encryption โ— Restricting access to cardholder data โ— Unique User Ids โ— Two-Factor Authentication โ— User Authentication โ— Restricting physical access to cardholder data โ— Maintaining Information Security policies โ— Employee Acceptable Use Policy โ— Information Security Management Responsibilities โ— Employee Education and Screening โ— Service Provider Requirements โ— Incident Response Planning โ— Virtualization, tokenization, Cloud computing โ— Logging Access to Cardholder Data โ— Monitoring Access to Cardholder Data โ— Vulnerability Scans and Penetration Testing โ— IDS and FIM
  • 7.
    PCI DSS ImplementationTraining Achievement Upon successful completion of the course a Certificate of โ€œPCIDSS Lead Implementer Trainingโ€ will be issued. CPD-40 CEU-4.0 PCI DSS Implementation Training Duration- 05 days PCI DSS Implementation Training Calendar [ Click here ] Value added PCI DSS Implementation Training Accelerate learning with the expert faculty Lead Auditors and Principal Trainers from the Industry. PCI DSS Implementation Learning from the "SpecialistExpert" hasmany advantages:- โ— It will drastically change the way of thinking and basic approach towards the Management System Standards. โ— You would cherish & Benchmark our training for a very long time to come. โ— No fictitious case studies you can not connect with. โ— Real time examples, real time scenarios you can quickly relate to. โ— Complete Focus on your systems, processes and line of businesses. โ— 100% involvement and engagement of the participants โ— Learn to make the ISO Standard sweat to:- A). Improve the profits. B). Reduce rework, defects, customer rejections, wastage,& cost of operation C). Enhance customer delight D). Reduce attrition of customers and employees E). Enhance confidence of all stakeholders PCI DSS Implementation