Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

PCI DSS: The State of Cardholder Data Attacks

Description

In this course, you’ll learn about the criminals’ ways of working from an experienced (PFI) Forensic Investigator and discover what actually happens in the course of a PCI forensic investigation.

In this course, PCI DSS: The State of Cardholder Data Attacks, John Elliott and Aaron Willis dive into data breaches and the development of the PCI DSS. Learn all about the criminals’ ways of working from an experienced PFI, discover the control failures that typically give criminals the opportunity to mount a successful attack, and discover what actually happens in the course of a PCI forensic investigation. By the end of this course, you’ll have a solid understanding of how these criminals operate and an inside glimpse of a PCI forensic investigation.

Topics:

  • Course Overview
  • Understanding the Forensic Collection Process
  • Understanding the Threat Landscape - Point of Sale (POS) Attacks
  • Understanding the Threat Landscape - eCommerce Attacks
  • Understanding the Threat Landscape - Infrastructure Attacks

Tags
Online Course


PCI DSS: The State of Cardholder Data Attacks

Affiliate notice

In this course, you’ll learn about the criminals’ ways of working from an experienced (PFI) Forensic Investigator and discover what actually happens in the course of a PCI forensic investigation.

In this course, PCI DSS: The State of Cardholder Data Attacks, John Elliott and Aaron Willis dive into data breaches and the development of the PCI DSS. Learn all about the criminals’ ways of working from an experienced PFI, discover the control failures that typically give criminals the opportunity to mount a successful attack, and discover what actually happens in the course of a PCI forensic investigation. By the end of this course, you’ll have a solid understanding of how these criminals operate and an inside glimpse of a PCI forensic investigation.

Topics:
  • Course Overview
  • Understanding the Forensic Collection Process
  • Understanding the Threat Landscape - Point of Sale (POS) Attacks
  • Understanding the Threat Landscape - eCommerce Attacks
  • Understanding the Threat Landscape - Infrastructure Attacks