@@Xploitacademy thank you for your reply, there's one thing I would like to know. How can I encrypting cardholder data in an open Public network? How would a tester be able to do that practically . Doesn't the software that handles payment transactions automatically encrypts the data or am I missing something here. So let's say that we test the payment transactions data in transit with Wireshark to see if it's encrypted, what if the software is faulty and doesn't encrypt the data. How would the tester go on about fixing that issue.
@@Xploitacademy I apologize ahead of time if there's some gaps in my knowledge, I currently only have beginner certifications and I'm new to cyber security.
@@soutchicken7250 no worries, when you say encryption it means encrypting the data at rest which is stored in the databases as well as the data in transit which is over the network. Different technologies apply under each case and various encryption algorithms
This was exquisite, thank you so much!
My pleasure
Thank you Sir ! Very informative !! 👍🏻👍🏻
;)
And how do we actually perform the 12 requirements? Is there any specific training on that topic?
You can refer to the documentation in the PCI DSS website for further information. If you need any further help let me know
@@Xploitacademy thank you for your reply, there's one thing I would like to know. How can I encrypting cardholder data in an open Public network? How would a tester be able to do that practically . Doesn't the software that handles payment transactions automatically encrypts the data or am I missing something here. So let's say that we test the payment transactions data in transit with Wireshark to see if it's encrypted, what if the software is faulty and doesn't encrypt the data. How would the tester go on about fixing that issue.
@@Xploitacademy I apologize ahead of time if there's some gaps in my knowledge, I currently only have beginner certifications and I'm new to cyber security.
@@soutchicken7250 no worries, when you say encryption it means encrypting the data at rest which is stored in the databases as well as the data in transit which is over the network. Different technologies apply under each case and various encryption algorithms
thank you so much for the information, how does one encrypt the database?
For a 10 minutes videos, more than 10 ads, what nonsense!
That’s how UA-cam works
Please I want to contact you for a very important thing
Hello@xploitacademy.com
@@Xploitacademy How to prepare my self to work as PCI DSS analyst?
@@ashrafesmail3522 you need the QSA certificate, but to get it you need to work in an accredited PCI consultancy company
@@Xploitacademy IS it a must to work accredited PCI consultancy company or it can be acquired from personal training and exam?