elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. Navigating the PCI DSS Standards.mp4 14M
1. Navigating the PCI DSS Standards.vtt 6.1K
2. Requirement 3.1.mp4 5.5M
2. Requirement 3.1.vtt 4.5K
3. Requirement 3.2.mp4 9.6M
3. Requirement 3.2.vtt 8.2K
4. Requirement 3.3.mp4 4.1M
4. Requirement 3.3.vtt 3.9K
5. Requirement 3.4.mp4 14M
5. Requirement 3.4.vtt 11K
6. Requirement 3.5.mp4 13M
6. Requirement 3.5.vtt 9.6K
7. Requirement 3.6.mp4 19M
7. Requirement 3.6.vtt 16K
8. Requirement 3.7.mp4 1.5M
8. Requirement 3.7.vtt 1.6K
9. Why Do People Store Cardholder Data_.mp4 11M
9. Why Do People Store Cardholder Data_.vtt 3.0K
10. Retention Periods and Data Deletion.mp4 14M
10. Retention Periods and Data Deletion.vtt 4.0K
11. Storing Sensitive Authentication Data.mp4 5.9M
11. Storing Sensitive Authentication Data.vtt 1.8K
12. Masking and Truncation of Cardholder Data.mp4 30M
12. Masking and Truncation of Cardholder Data.vtt 8.9K
13. Data Compromises Involving Stored Data.mp4 20M
13. Data Compromises Involving Stored Data.vtt 5.9K
14. Compensating Controls for Requirements 3.1 to 3.3.mp4 8.4M
14. Compensating Controls for Requirements 3.1 to 3.3.vtt 2.1K
15. Protecting Stored PANs – Truncation & Tokenization.mp4 69M
15. Protecting Stored PANs – Truncation & Tokenization.vtt 21K
16. Encrypting Cardholder Data.mp4 65M
16. Encrypting Cardholder Data.vtt 18K
17. Cryptography, Breaches and the Problems with Full Disk Encryption.mp4 23M
17. Cryptography, Breaches and the Problems with Full Disk Encryption.vtt 7.2K