Billions of card payment transactions happen every day. This course explains how they work, how criminals can turn payment card transactions into money, and how the PCI Security Standards that aim to stop them.
There is a reason that criminals steal payment card data. It is because they can turn the stolen data into money. In this course, Payment Card Security, Processing, and the PCI Standards, you'll discover how a payment card transaction gets from the store to your statement and in the process learn about the electronic messages that move between the banks and payment card schemes. First, you'll find out how criminals turn the data into money and how the payment card industry stops them with the security standards that everyone and everything in the process has to follow. Next, you'll learn about which PCI authorized assessors are required for an organization to validate compliance with the various PCI Security Standards. Finally, you'll explore the foundation qualification, the PCI Professional, that you may want to consider. At the end of this course, you'll understand how the payment system works and the PCI Security Standards role in protecting this data.
John Elliott helps organizations balance risk and regulation with business needs. He is a specialist in payments (John contributed to the development of many PCI standards, including DSS), privacy and a cyber security. A passionate and innovative communicator, he presents frequently at conferences, online and in boardrooms.