PCI-DSS Course

Our PCI course is designed to help businesses and organizations comply with the PCI DSS employee security awareness training requirements.

$19.95(per seat)   Individual Pricing


Buy Now

CFISA Security Awareness - PCI Course

Our PCI course is designed to help businesses and organizations comply with the PCI DSS employee security awareness training requirements.

  • 15 lessons
  • Two quiz questions at the end of each lesson
  • Certificate upon completion

$19.95(per seat)   Individual Pricing

For Enterprise training options and pricing please see our Enterprise Options section

Course Lessons Overview

Course Welcome and Overview - 4:55 min

Learning even just the basics of information security will help protect you, your workplace, and family from the dangers of cybercrime and identity theft. Start your learning with our welcome lesson.

Lesson 1: PCI-DSS Overview - 5:55 min

An overview and understanding of the PCI-DSS compliance process is important to the safety, security and success of the business. How would you want your credit card information to be protected? Why the policies and procedures are required and how you can help.

Lesson 2:  The Impact of Cybercrime and Identity Fraud – 8:32 min

When you see the nearly dozen ways that cybercrime can hurt your workplace, your job security, and even your financial identity, then maybe you'll begin to understand why it's so important for you to do everything you can to minimize the threat.

Lesson 3: Today’s Threats – 7:36 min

There are dozens of different types of potential threats behind this wave of cybercrime, but most fall into one of just five categories. Find out what they are.

Lesson 4:  How Behavior is Exploited – 9:56 min

Hackers spend much of their time studying the predictable behavior of employees like you as a way to find just one vulnerability they can exploit in an attack on your workplace.

Lesson 5:  Strong Passwords Increase Security – 9:23 min

Your password is key to security. Learn how passwords can easily be exploited, what you can do to maximize the security your password can offer, and why following password security policies is so important to overall security.

Lesson 6:  Understanding and Recognizing Social Engineering – 4:05 min

One of the most effective and dangerous techniques hackers use to manipulate employees is called social engineering, and it's critically important that you learn how to recognize this serious threat.

Lesson 7:  Email Best Practices – 6:50 min

Inappropriate or careless use of this valuable resource can not only create significant security and legal risks, it can also have a negative impact on overall business productivity and performance.

Lesson 8:  Protecting Against Viruses, Spyware and Spam – 6:30 min

Your workplace is a target for computer viruses, spyware, keyloggers and other malicious code that are designed to steal confidential information. But there is plenty you can do to stop them.

Lesson 9:  Protecting Your Personal Workspace – 4:48 min

Protecting your physical workspace is an important part of day to day security and is directly connected to information security risk. Knowing how to protect your personal workspace will make your overall physical security better.

Lesson 10:  Security You Can Live With – 9:00 min

Security doesn't end when you leave your workplace. Learn how to protect your workplace even when you're not there - through better laptop protection, telecommuting security, and working securely on the road.

Lesson 11: Safe Web Use – 6:10 min

It's important to make sure that you remain constantly aware of security when using the web at work, and that you always follow security rules and management policies regarding appropriate web use.

Lesson 12: Protecting the Workplace from Identity Fraud – 6:50 min

Identity theft is the nation's fastest growing crime, and prevention can begin in the workplace. Learn how to protect yourself, your family, and your workplace through better awareness.

Lesson 13: Risks and Acceptable Uses of Electronic Resources – 6:08 min

To ensure smooth day-to-day operations, it's important for employees, contractors, and anyone else who uses workplace computers and networks to follow policy guidelines on acceptable systems use and security.

Lesson 14: Secure Use of Networks – 2:32 min

The protection of information handled by computer networks is a key part of a security strategy, and there are a number of important security guidelines that you should make yourself familiar with.


“The training was actually quite interesting, informative and worthwhile."

- University Services Employee

"This training will help me to protect my family at home, and I like that!"

- State Government Employee

"I felt very engaged in the training. The information was relevant and interesting."

- Tony, Los Angeles

"The online training was straightforward and easy to understand."

-Financial Services Employee

"Now that I understand why we have these rules, I will be more likely to follow them.”

- Credit Union Employee

"The online training was pleasantly straightforward and easy to comprehend."

- Steve, Miami

"I really enjoyed the fact that this training covered both business and personal practices."

- Mary, Boston

“After taking the training, I have a much better understanding of why these rules are so important.”

- Internet Sales Employee

Log in