Payment Card Security, Processing, and the PCI Standards
Billions of card payment transactions happen every day. This course explains how they work, how criminals can turn payment card transactions into money, and how the PCI Security Standards that aim to stop them.
What you'll learn
There is a reason that criminals steal payment card data. It is because they can turn the stolen data into money. In this course, Payment Card Security, Processing, and the PCI Standards, you'll discover how a payment card transaction gets from the store to your statement and in the process learn about the electronic messages that move between the banks and payment card schemes. First, you'll find out how criminals turn the data into money and how the payment card industry stops them with the security standards that everyone and everything in the process has to follow. Next, you'll learn about which PCI authorized assessors are required for an organization to validate compliance with the various PCI Security Standards. Finally, you'll explore the foundation qualification, the PCI Professional, that you may want to consider. At the end of this course, you'll understand how the payment system works and the PCI Security Standards role in protecting this data.
Table of contents
- How Payment Card Transactions Appear on a Statement 4m
- The Data Stored on a Payment Card 5m
- The Entities Involved in Authorizing a Payment Card Transaction 6m
- Getting Paid: Clearing and Settlement 3m
- E-commerce Transactions and Payment Service Providers 5m
- Undoing a Transaction: Refunds and Chargebacks 3m
- Getting Cash from an ATM 1m
- Summary of How Payment Transactions Work 3m
- How Criminals Profit from Payment Card Data 5m
- Where to Find Data Worth Stealing 7m
- The Difference with Chip (EMV) Cards 7m
- Where the PCI Standards Come From 5m
- PCI DSS and PCI PA-DSS 6m
- PIN Transaction Security Standards 6m
- Point-to-point Encryption and Card Production Standards 4m
- Where to Find the Payment Card Industry Standards 3m