+91 9810005685 : USA +1 302-353-5180, IND +91 9818398494, 9899 809 804 | info@gtisec.com

PCIDSS Implementation Training

Greeting from GTIS!!!
GTIS brings PCI DSS 3.2.1 Implementation workshop, which would be in Gurgaon on 4th & 5th April 2020. The workshop Schedule is attached along with the registration form for your reference. We are looking forward to hearing from you soon.
VENUE: Venue will be our corporate office at Gurugram.
Date : 4th and 5th April 2020
Fees : INR 10,000/= Per Head
For Group Discount mail at training@gtisec.com

THE LAST DATE FOR REGISTRATIONS IS 30th March 2020.
Click here to Register : https://tinyurl.com/pcidssworkshop
Or
You can also reach out at training@gtisec.com for schedule and other details.

Course Agenda

Day 1

Overview of Payment Card Industry
PCI DSS Important Terminologies
Overview of Payment Brands
Overview of PCI SSC
Payment Card Industry Security Standards Council (PCI SSC)
Roles and Responsibilities under PCI

Overview of Standards from PCI SSC – (PCI DSS , PA DSS, PCI
PTS , P2PE , PCI Secure Software Framework)
Guidelines for Cardholder Data
Overview Of PCI DSS 3.2.1 Requirements
Importance of PCI Compliance
Current Industry Trends

Day 2

Overview of Payment Card Industry
PCI DSS Important Terminologies
Overview of Payment Brands
Overview of PCI SSC
Payment Card Industry Security Standards Council (PCI SSC)
Roles and Responsibilities under PCI

Overview of Standards from PCI SSC – (PCI DSS , PA DSS, PCI
PTS , P2PE , PCI Secure Software Framework)
Guidelines for Cardholder Data
Overview Of PCI DSS 3.2.1 Requirements
Importance of PCI Compliance
Current Industry Trends

Key Takeaways

Certificate
14 CPE Credits
Acquire knowledge from professional QSA on functioning of Payment Card Industry.
Realtime Examples of Implementation challenges & comprehend the complete PCI DSS compliance process.
Learn about Merchants, Service Providers & their compliance requirements

Get acquainted with roles & responsibilities of various standards & organizations in Payment Card Industry.
Learn how to minimize possibility of card breach, improve security, reduce the risk of data loss.
Gain a thorough understanding of intent behind each requirement
Realtime Examples of Implementation challenges.

DISCLAIMER:-
The information contained in this message (including any attachments) is confidential and may be privileged. If you have received it by mistake please notify the sender by return e-mail and permanently delete this message and any attachments from your system.