We may earn an affiliate commission when you visit our partners.
John Elliott and Jacob Ansari

The first two requirements of PCI DSS version 3.2.1 are to build and maintain secure networks and systems. You'll learn to understand what each requirement asks for and discover practical guidance from experienced PCI assessors.

Read more

The first two requirements of PCI DSS version 3.2.1 are to build and maintain secure networks and systems. You'll learn to understand what each requirement asks for and discover practical guidance from experienced PCI assessors.

The key to achieving PCI DSS compliance is a thorough knowledge of each of the sub-requirements and how they will be assessed. In this course, PCI DSS: Infrastructure Security, you’ll learn how to interpret PCI DSS requirements 1 and 2, and apply them to your organization. First, you’ll learn how PCI DSS wants a firewall configuration to be built and maintained to protect cardholder data. Next, you’ll explore the requirement to not use vendor-supplied defaults for systems passwords and other security parameters. Finally, you’ll discover practical insights about both requirements from experienced PCI assessors. When you’ve finished with this course you will have the skills and knowledge to apply PCI DSS requirements 1 and 2 to any organization’s environment and to determine whether it is compliant with the demands of the standard.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Requirement 1: Install and Maintain a Firewall Configuration
Requirement 1 Continued: Install and Maintain a Personal Firewall
Requirement 2: Do not Use Vendor-supplied Defaults
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Useful if you're looking to delve into PCI regulations for business
Core elements of PCI DSS regulations, requirements, and guidelines are presented
Provides practical guidance in applying PCI DSS requirements to your company's infrastructure security
Taught by security professionals with experience in PCI assessments

Save this course

Save PCI DSS: Infrastructure Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in PCI DSS: Infrastructure Security with these activities:
PCI DSS Awareness Program
Disseminate knowledge about PCI DSS requirements and best practices to business organizations, contributing to the overall security landscape.
Browse courses on Community Outreach
Show steps
  • Identify opportunities to volunteer
  • Prepare to educate and engage
  • Conduct awareness sessions
PCI DSS Assessment Best Practices
Explore industry-leading best practices for conducting thorough and comprehensive PCI DSS assessments to enhance knowledge and understanding.
Show steps
  • Identify recommended resources
  • Review assessment methodologies
  • Practice applying best practices
Firewall Configuration Practice
Enhance understanding and application of PCI DSS firewall configuration requirements by engaging in practice drills.
Browse courses on Firewall Configuration
Show steps
  • Identify different firewall settings
  • Practice configuring firewalls
  • Evaluate firewall effectiveness
Three other activities
Expand to see all activities and additional details
Show all six activities
Secure Password Management
Solidify knowledge of secure password management practices and their importance in PCI DSS compliance through hands-on drills.
Browse courses on Password Management
Show steps
  • Identify different password hashing algorithms
  • Practice implementing strong password policies
  • Conduct vulnerability testing
PCI DSS Compliance Plan
Develop a comprehensive plan for implementing PCI DSS requirements, ensuring a secure infrastructure and minimizing risk.
Show steps
  • Gather necessary information
  • Conduct risk assessment
  • Develop policies and procedures
  • Implement technical controls
  • Monitor and maintain compliance
PCI DSS Security Challenge
Engage in a simulated PCI DSS security challenge to test skills in identifying and mitigating vulnerabilities, enhancing problem-solving abilities.
Browse courses on Vulnerability Assessment
Show steps
  • Identify available challenges
  • Prepare for the challenge
  • Participate and complete the challenge

Career center

Learners who complete PCI DSS: Infrastructure Security will develop knowledge and skills that may be useful to these careers:
Security Analyst
Protecting cardholder data is critical for organizations that accept payments, and a Security Analyst is responsible for designing and implementing security measures to protect this data. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements ensure that an organization's environment is compliant with the demands of the standard.
Chief Information Security Officer (CISO)
A CISO is responsible for developing and implementing an organization's cybersecurity strategy, including the protection of cardholder data. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to building and maintaining a secure network.
Information Security Engineer
An Information Security Engineer is responsible for planning, implementing, and maintaining the security of an organization's information systems. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements ensure that an organization's environment is compliant with the demands of the standard.
Penetration Tester
Penetration Testers assess the security of an organization's computer systems and networks by simulating attacks. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements ensure that an organization's environment is protected from unauthorized access.
Cybersecurity Architect
Cybersecurity Architects design and implement security measures to protect an organization's computer systems and networks. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to building and maintaining a secure network.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's security policies and procedures. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's information systems.
Network Engineer
Network Engineers design, implement, and maintain computer networks. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements ensure that an organization's network is secure from unauthorized access.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization's information systems. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's information systems.
Senior Network Administrator
Senior Network Administrators are responsible for overseeing the operation and maintenance of an organization's computer networks. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's network.
Network Security Analyst
Network Security Analysts are responsible for monitoring and protecting an organization's computer networks from unauthorized access. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's network.
Security Consultant
Security Consultants help organizations develop and implement security measures. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's information systems.
IT Auditor
IT Auditors assess the security of an organization's computer systems and networks. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's information systems.
Data Protection Officer (DPO)
Data Protection Officers are responsible for ensuring that an organization's data is collected, processed, and stored in compliance with applicable laws and regulations. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's data.
Forensic Investigator
Forensic Investigators investigate cybercrimes and other security incidents. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's information systems.
Compliance Manager
Compliance Managers are responsible for ensuring that an organization complies with applicable laws and regulations. Understanding PCI DSS requirements 1 and 2 will be vital to success in this role, as these requirements are essential to ensuring the security of an organization's data.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in PCI DSS: Infrastructure Security.
This widely used textbook provides a comprehensive overview of computer security principles and practices, including topics relevant to PCI DSS.
This classic book provides a deep dive into the principles of firewalls and network security, which are essential for understanding PCI DSS requirement 1.
This classic book provides a comprehensive overview of firewalls and network security, making it a valuable resource for anyone responsible for network security.
Provides a comprehensive overview of PCI DSS compliance, including practical tips and advice.
This highly regarded book provides a comprehensive overview of security engineering principles and practices, making it a valuable resource for anyone involved in the design and implementation of secure systems.
Provides a comprehensive guide to securing Linux and Unix systems, which are commonly used in PCI DSS-compliant environments.
This comprehensive book provides a deep dive into the principles and practices of cryptography, making it a valuable resource for anyone involved in the design and implementation of secure systems.
This comprehensive book provides a broad overview of computer security principles and practices, making it a valuable resource for anyone involved in the field of computer security.
This accessible book provides a practical overview of network security principles and practices, making it a valuable resource for anyone involved in the design and implementation of secure networks.
This practical book provides a hands-on guide to finding and exploiting security flaws in web applications, making it a valuable resource for anyone involved in the security of web applications.
This accessible book provides a comprehensive guide to cybersecurity for managers, making it a valuable resource for anyone responsible for the security of their organization.
This comprehensive book provides a practical guide to security testing, making it a valuable resource for anyone involved in the testing of secure systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to PCI DSS: Infrastructure Security.
PCI DSS: Detection, Assurance, and Management
Most relevant
PCI DSS: Securing Data, Systems, and Applications
Most relevant
Compliance Framework: PCI DSS
Most relevant
PCI DSS: Achieving and Maintaining Compliance
Most relevant
PCI DSS v4: What's New
Most relevant
Information and Cyber Security GRC: Compliance Assessment...
Most relevant
PCI DSS: The State of Cardholder Data Attacks
Most relevant
PCI (Payment Card) Standards for Corporate Professionals
Most relevant
Data Center Security Management with Microsoft System...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser