We may earn an affiliate commission when you visit our partners.
John Elliott and Aaron Willis

In this course, you’ll learn about the criminals’ ways of working from an experienced (PFI) Forensic Investigator and discover what actually happens in the course of a PCI forensic investigation.

Read more

In this course, you’ll learn about the criminals’ ways of working from an experienced (PFI) Forensic Investigator and discover what actually happens in the course of a PCI forensic investigation.

In this course, PCI DSS: The State of Cardholder Data Attacks, John Elliott and Aaron Willis dive into data breaches and the development of the PCI DSS. Learn all about the criminals’ ways of working from an experienced PFI, discover the control failures that typically give criminals the opportunity to mount a successful attack, and discover what actually happens in the course of a PCI forensic investigation. By the end of this course, you’ll have a solid understanding of how these criminals operate and an inside glimpse of a PCI forensic investigation.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Understanding the Forensic Collection Process
Understanding the Threat Landscape - Point of Sale (POS) Attacks
Understanding the Threat Landscape - eCommerce Attacks
Read more
Understanding the Threat Landscape - Infrastructure Attacks

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Useful for Individuals Pursuing a Forensic Career
Provides Practical Insights from an Experienced Forensic Investigator
Covers Key Threats and Attack Vectors in Cardholder Data
Facilitates Understanding of PCI Forensic Investigations

Save this course

Save PCI DSS: The State of Cardholder Data Attacks to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in PCI DSS: The State of Cardholder Data Attacks with these activities:
Review of the PCI DSS
Refresh knowledge of the PCI DSS to be better prepared for the course material.
Browse courses on PCI DSS
Show steps
  • Read and comprehend the PCI DSS document.
  • Summarize the key requirements of the PCI DSS.
Review concepts of cryptography
Help you to recall previous background on cryptography and set foundational knowledge to build upon.
Browse courses on Cryptography
Show steps
  • Read through your notes from previous cryptography courses.
  • Go over your cryptography textbooks.
PCI DSS Discussion Group
Join a discussion group to share knowledge and learn from others about PCI DSS.
Browse courses on PCI DSS
Show steps
  • Find or start a PCI DSS discussion group.
  • Participate in discussions and share insights.
Six other activities
Expand to see all activities and additional details
Show all nine activities
PCI Forensic Investigation Simulation
Practice conducting PCI forensic investigations to improve understanding of the process.
Show steps
  • Identify and collect potential evidence.
  • Analyze and interpret the evidence.
  • Create a report of the findings.
PCI Forensic Investigation Workshop
Attend a workshop on PCI forensic investigations to gain practical experience.
Show steps
  • Find and register for a relevant workshop.
  • Attend the workshop and actively participate.
Analyze PCI forensic investigation reports
Train your eye to identify patterns and techniques used by criminals.
Browse courses on PCI DSS
Show steps
  • Obtain access to real-world PCI forensic investigation reports.
  • Review the reports thoroughly, paying attention to the methodologies and findings.
  • Identify common attack patterns and techniques used by criminals.
  • Write a summary report of your findings.
Develop and test prototypes
Further cement your understanding of common attack vectors and the typical control failures that give criminals the opportunity to mount a successful attack.
Browse courses on PCI DSS
Show steps
  • Brainstorm and develop various prototype countermeasures for each attack vector.
  • Test the prototype countermeasures in a simulated environment.
  • Analyze the results and identify areas for improvement.
Develop a PCI forensic investigation plan
Solidify your understanding of how to conduct a thorough and effective PCI forensic investigation.
Browse courses on PCI DSS
Show steps
  • Identify the objectives and scope of the investigation.
  • Develop a plan for collecting and preserving evidence.
  • Identify resources needed for the investigation.
  • Develop a timeline for the investigation.
  • Write a comprehensive investigation plan.
PCI DSS Compliance Guide
Create a guide to PCI DSS compliance to reinforce understanding of the requirements.
Show steps
  • Gather information on PCI DSS requirements.
  • Organize and outline the guide.
  • Write the guide.

Career center

Learners who complete PCI DSS: The State of Cardholder Data Attacks will develop knowledge and skills that may be useful to these careers:
PCI DSS Qualified Security Assessor
PCI DSS Qualified Security Assessors are responsible for assessing the security of payment card systems. This course can be useful to PCI DSS Qualified Security Assessors as it can help them understand the methods that criminals use to attack payment card systems. This course can also help PCI DSS Qualified Security Assessors investigate and respond to PCI forensic investigations.
Information Security Analyst
Information Security Analysts are responsible for protecting the confidentiality, integrity, and availability of information. This course can be useful to Information Security Analysts as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Information Security Analysts investigate and respond to PCI forensic investigations.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems. This course can be useful to Security Engineers as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Security Engineers investigate and respond to PCI forensic investigations.
Systems Administrator
Systems Administrators are responsible for managing and maintaining computer systems. This course can be useful to Systems Administrators as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Systems Administrators investigate and respond to PCI forensic investigations.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can be useful to Cybersecurity Analysts as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Cybersecurity Analysts investigate and respond to PCI forensic investigations.
Security Consultant
Security Consultants are responsible for providing advice and guidance to organizations on how to improve their security posture. This course can be useful to Security Consultants as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Security Consultants investigate and respond to PCI forensic investigations.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing the security of an organization's information assets. This course can be useful to CISOs as it can help them understand the methods that criminals use to attack payment card systems. This course can also help CISOs investigate and respond to PCI forensic investigations.
IT Auditor
IT Auditors are responsible for evaluating the effectiveness of an organization's IT systems and controls. This course can be useful to IT Auditors as it can help them understand the methods that criminals use to attack payment card systems. This course can also help IT Auditors investigate and respond to PCI forensic investigations.
Security Researcher
Security Researchers are responsible for identifying and researching security vulnerabilities. This course can be useful to Security Researchers as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Security Researchers investigate and respond to PCI forensic investigations.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for collecting and analyzing information about threats to an organization's security. This course can be useful to Threat Intelligence Analysts as it can help them understand the methods that criminals use to attack payment card systems.
Forensic Analyst
Forensic Analysts are responsible for collecting, examining, and analyzing evidence in order to provide expert testimony in court cases. This course can be useful to Forensic Analysts as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Forensic Analysts investigate and respond to PCI forensic investigations.
Security Manager
Security Managers are responsible for overseeing the security of an organization's information assets. This course can be useful to Security Managers as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Security Managers investigate and respond to PCI forensic investigations.
Computer Security Analyst
Computer Security Analysts are responsible for detecting and preventing security breaches, as well as investigating and responding to incidents. This course can be useful to Computer Security Analysts as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Computer Security Analysts investigate and respond to PCI forensic investigations.
Security Operations Analyst
Security Operations Analysts are responsible for monitoring and responding to security incidents. This course can be useful to Security Operations Analysts as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Security Operations Analysts investigate and respond to PCI forensic investigations.
Vulnerability Manager
Vulnerability Managers are responsible for identifying and managing vulnerabilities in an organization's systems. This course can be useful to Vulnerability Managers as it can help them understand the methods that criminals use to attack payment card systems. This course can also help Vulnerability Managers investigate and respond to PCI forensic investigations.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in PCI DSS: The State of Cardholder Data Attacks.
Provides a comprehensive overview of information security management, including topics such as risk assessment, incident response, and compliance.
Provides a comprehensive overview of security engineering principles and practices.
Provides a comprehensive overview of computer security concepts and principles.
Provides a practical guide to network security, including techniques for detecting and preventing attacks.
Provides a broad overview of data and network security concepts, which would be helpful for beginners in the field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to PCI DSS: The State of Cardholder Data Attacks.
PCI DSS: Detection, Assurance, and Management
Most relevant
PCI DSS: Securing Data, Systems, and Applications
Most relevant
PCI DSS: Infrastructure Security
Most relevant
PCI DSS: Achieving and Maintaining Compliance
Most relevant
Compliance Framework: PCI DSS
Most relevant
Forensic Science: DNA Analysis
Most relevant
Payment Card Security, Processing, and the PCI Standards
Most relevant
PCI DSS v4: What's New
Most relevant
AccessData Forensic Toolkit (FTK) Imager
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser