PCI Essentials Training

PCI Essentials spans 10 modules, each one ~15 minutes. The modules can be deployed in any sequence, at any time to meet training requirements

pci-sscFeatures of the software include:

  • Real world, interactive scenarios that encourage learners to test their knowledge of key concepts.
  • Wheelz, a lively robotic guide that delivers engaging and authoratative guidance on protecting sensitive data.
  • Integrated skill assessment exercises, which explain both correct and incorrect options.

Module 1: Protecting Cardholder Data


  • Defining the purpose of PCI standards, and why compliance is important
  • Identifying both what, and who needs to comply with PCI standards
  • Identifying the information on debit and credit cards which is considered sensitive
  • Understanding how credit & debit card transactions work
  • Knowing how to securely handle cardholder data

Watch preview now

Module 2: Password Practices


  • Understanding why passwords exist, and are important
  • Learning how to use passwords properly
  • Recognising the most common mistakes people make with passwords
  • Understanding how to create a strong password
  • Learning how to deal with new equipment that requires a password

Watch preview now

Module 3: Email and Browser Security


  • Learning how to identify and handle suspicious messages
  • Understanding the security benefits of web browsers
  • Identifying malware attachments and fake hyperlinks
  • Understanding how phising (and spear phishing) attacks work in practice
  • Learning best practices for using email safely

Watch preview now

Module 4: Avoiding Social Engineering


  • Understanding what social engineering is
  • Understanding the consequences of successful social engineering exploits
  • Identifying the most common social engineering tactics
  • Understanding the importance of protecting confidential company data
  • Learning how to respond to social engineering attempts

Watch preview now

Module 5: Mobile Device and Tablet Security


  • Understanding the most common mobile threats and vulnerabilities
  • Describing how mobile point of sale systems work, and the associated risks
  • Describing proper handling for cardholder data when using mobile point of sale systems
  • Implementing best practices for securing mobile devices
  • Understanding the security risks of using personal devices for work purposes

Watch preview now

Module 6: Social Media Safety


  • Describing best practices and appropriate use of social media
  • Describing the security and secrecy of social media
  • Listing the security risks associated with using social media
  • Describing ways to limit security risk when using social media
  • Stating a general policy around using social media tools on work computers

Watch preview now

Module 7: Security While Working Remotely


  • Listing threats associated with the remote access to work resources
  • Describing available technologies for enabling secure remote working
  • Understanding how to deal appropriately with sensitive data when working remotely
  • Understanding individual responsibilities for meeting the PCI DSS requirements
  • Knowing what to do when a coputer or device is lost/stolen

Watch preview now

Module 8: Avoiding Malicious Downloads


  • Understanding the consequences of installing malicious software/downloads
  • Implementing the best practices for installing software patches and new software
  • Recognising the signs that a device has been infected
  • Configuring your web browser for security
  • Installing internet and email security software on your computer

Watch preview now

Module 9: Updating of Software and Anti-Virus Programs


  • Understanding the purpose and benefits of anti-virus programs
  • Understanding how to keep software and operating systems secure & up-to-date
  • Selecting the most secure control panel settings for Windows Update
  • Installing, maintaining and configuring anti-virus software
  • Securing mobile devices as rigorously as a computer

Watch preview now

Module 10: Physical Security


  • Describing what physical security is, and it's importance for both devices and applications
  • Listing the advantages of using screen privacy protectors
  • Understanding the importance of wearing badges on-site
  • Knowing how to report physical security incidents
  • Knowing the steps to take when someone breaches physical security, or attempts to

Watch preview now

Speak to Us

Interested in purchasing one of our security awareness training courses for your company? Speak to a member of our team to learn more about the options available, or to arrange a demo.

Find Out More