Course Content
Part 1: Foundations of PCI DSS
Part 2: The 12 High-Level Goals & Detailed Requirements
Part 3: Implementation, Assessment, and Maintenance
Lesson 1: Welcome & Course Overview
You don't currently have access to this content
2 Topics
Introduction to PCI DSS
You don't currently have access to this content
Course Objectives & Learning Path
You don't currently have access to this content
Lesson 2: Understanding the PCI DSS Ecosystem
You don't currently have access to this content
3 Topics
What is the PCI SSC? (The Council)
You don't currently have access to this content
Key Roles: Merchants, Service Providers, Acquiring Banks, QSAs
You don't currently have access to this content
The Different PCI Standards (DSS, PIN, P2PE, SSF)
You don't currently have access to this content
Lesson 3: PCI DSS v4.0.1 Core Concepts & Big Changes
You don't currently have access to this content
5 Topics
Introduction to Core Concepts and big Changes
You don't currently have access to this content
Goals vs. Requirements Structure (The 12 High-Level Goals)
You don't currently have access to this content
The Defined vs. Customized Approach (Introduction)
You don't currently have access to this content
Emphasis on Security as a Continuous Process, not an Annual Audit
You don't currently have access to this content
Increased Focus on Risk Analysis and Targeted Risk Analysis (TRA)
You don't currently have access to this content
Lesson 4: Scoping Your Cardholder Data Environment (CDE)
You don't currently have access to this content
5 Topics
1 Quiz
Important Timelines to Look out for
You don't currently have access to this content
What is a CDE? (Systems, People, Processes)
You don't currently have access to this content
Identifying Cardholder Data (CHD) and Sensitive Authentication Data (SAD)
You don't currently have access to this content
Network Segmentation: Theory and Best Practices
You don't currently have access to this content
System Components: In-Scope vs. Connected-to vs. Out-of-Scope
You don't currently have access to this content
Module 1 – Introduction to PCI DSS & Payment Security
You don't currently have access to this content
Lesson 5: Goal 1 – Install and Maintain Network Security Controls
You don't currently have access to this content
3 Topics
Requirement 1: Firewalls and Routers
You don't currently have access to this content
Network Diagrams and Data Flow Diagrams
You don't currently have access to this content
Securing Connections between trusted and untrusted networks
You don't currently have access to this content
Lesson 6: Goal 2 – Apply Secure Configurations to All System Components
You don't currently have access to this content
3 Topics
Requirement 2: Vendor Defaults (Passwords, Settings)
You don't currently have access to this content
Configuration Standards and Hardening Guides (e.g., CIS Benchmarks)
You don't currently have access to this content
Managing and Documenting System Configurations
You don't currently have access to this content
Lesson 7: Goal 3 – Protect Stored Account Data
You don't currently have access to this content
4 Topics
1 Quiz
Requirement 3: Data Retention and Disposal Policies
You don't currently have access to this content
Cryptography Fundamentals: Strong Encryption, Hashing, Key Management
You don't currently have access to this content
PAN Masking and Display Policies
You don't currently have access to this content
The Absolute Prohibition on Storing Sensitive Authentication Data
You don't currently have access to this content
Quiz: Lesson 7 PCI DSS Payment Security
You don't currently have access to this content
Lesson 8: Goal 4 – Protect Cardholder Data with Strong Cryptography During Transmission
You don't currently have access to this content
3 Topics
Requirement 4: Encryption Over Open/Public Networks
You don't currently have access to this content
TLS Implementation (Strong Protocols, Avoiding SSL)
You don't currently have access to this content
Securing Wireless Transmissions
You don't currently have access to this content
Lesson 9: Goal 5 – Protect All Systems and Networks from Malicious Software
You don't currently have access to this content
3 Topics
Requirement 5: Anti-Virus and Anti-Malware Solutions
You don't currently have access to this content
Advanced Endpoint Protection (EPP/EDR)
You don't currently have access to this content
Malware Protection on All Operating Systems
You don't currently have access to this content
Lesson 10: Goal 6 – Develop and Maintain Secure Systems and Software
You don't currently have access to this content
4 Topics
1 Quiz
Requirement 6: The Software Development Lifecycle (SDLC) and Security
You don't currently have access to this content
Addressing New Vulnerabilities (Patch Management)
You don't currently have access to this content
Secure Coding Practices (OWASP Top 10)
You don't currently have access to this content
Change Management Processes
You don't currently have access to this content
Quiz: Module 2 – PCI DSS Requirements Deep Dive (Part 1: Req 1-6)
You don't currently have access to this content
Lesson 11: Goal 7 – Restrict Access to System Components and Cardholder Data by Business Need to Know
You don't currently have access to this content
3 Topics
Requirement 7: Role-Based Access Control (RBAC)
You don't currently have access to this content
The Principle of Least Privilege
You don't currently have access to this content
Documenting Access Needs and Justifications
You don't currently have access to this content
Lesson 12: Goal 8 – Identify Users and Authenticate Access to System Components
You don't currently have access to this content
4 Topics
Requirement 8: Multi-Factor Authentication (MFA) Deep Dive
You don't currently have access to this content
Strong Password Policies and Alternatives (Passphrases)
You don't currently have access to this content
Unique IDs for Each User
You don't currently have access to this content
Secure Authentication Practices for Administrators
You don't currently have access to this content
Lesson 13: Goal 9 – Restrict Physical Access to Cardholder Data
You don't currently have access to this content
3 Topics
Requirement 9: Physical Security for Data Centers and Offices
You don't currently have access to this content
Media Destruction and Handling
You don't currently have access to this content
Physical Access Logs and Monitoring
You don't currently have access to this content
Lesson 14: Goal 10 – Log and Monitor All Access to System Components and Cardholder Data
You don't currently have access to this content
4 Topics
Requirement 10: Audit Trails and Log Management
You don't currently have access to this content
What to Log: Events, User IDs, etc.
You don't currently have access to this content
Time Synchronization (NTP)
You don't currently have access to this content
Daily Log Reviews and Automated Alerting (SIEM)
You don't currently have access to this content
Lesson 15: Goal 11 – Test Security of Systems and Networks Regularly
You don't currently have access to this content
4 Topics
Requirement 11: Vulnerability Scanning (Internal/External)
You don't currently have access to this content
Penetration Testing (Methodology, Scoping, Remediation)
You don't currently have access to this content
Intrusion Detection/Prevention Systems (IDS/IPS)
You don't currently have access to this content
File Integrity Monitoring (FIM)
You don't currently have access to this content
Lesson 16: Goal 12 – Support Information Security with Organizational Policies and Programs
You don't currently have access to this content
4 Topics
1 Quiz
Requirement 12: The Information Security Policy
You don't currently have access to this content
Risk Assessments and Targeted Risk Analysis (TRA)
You don't currently have access to this content
Employee Security Awareness Training
You don't currently have access to this content
Service Provider Management (Due Diligence, Agreements)
You don't currently have access to this content
Module 2 – PCI DSS Requirements Deep Dive
You don't currently have access to this content
Lesson 17: The Two Approaches: Defined vs. Customized
You don't currently have access to this content
3 Topics
1 Quiz
Deep Dive into the Defined Approach (Traditional Checklist)
You don't currently have access to this content
Deep Dive into the Customized Approach (Objective, Controls, TRA)
You don't currently have access to this content
How to Choose and Document Your Approach
You don't currently have access to this content
Quiz: Lesson 17 – PCI DSS Requirements Deep Dive (Part 2: Req 7-12)
You don't currently have access to this content
Lesson 18: Building a PCI DSS Compliance Program
You don't currently have access to this content
3 Topics
Roles and Responsibilities (CISO, IT Team, Business Units)
You don't currently have access to this content
Project Planning and Scoping
You don't currently have access to this content
Evidence Collection and Documentation
You don't currently have access to this content
Lesson 19: The Assessment Process
You don't currently have access to this content
3 Topics
Self-Assessment Questionnaires (SAQs): Which One is Right for You?
You don't currently have access to this content
Working with a Qualified Security Assessor (QSA)
You don't currently have access to this content
The Report on Compliance (ROC)
You don't currently have access to this content
Lesson 20: Maintaining Compliance: It’s a Journey, Not a Destination
You don't currently have access to this content
3 Topics
1 Quiz
Continuous Monitoring Strategies
You don't currently have access to this content
Handling Changes in the Environment or Business
You don't currently have access to this content
Preparing for the Next Annual Assessment
You don't currently have access to this content
Module 3 – PCI DSS Compliance Process
You don't currently have access to this content

