Payments Academy Logo
  • Home
  • Learn More
  • Log In

Course Content

Expand All | Collapse All
Lessons Status
1

Why Information Security is Important
  • Stories from the Field

2

Reporting a Security Incident

3

Common Security Incidents and How to Respond
  • Phishing Attempt
  • Fraud
  • Data Breach
  • Virus Infection

4

Phishing
  • Phishing Defined Further
  • Spotting Phishing Attempts

5

Passwords
  • Multi-Factor Authentication
  • Every 90 Days
  • Password Reuse
  • Strong Passwords
  • Sharing Passwords

6

Data
  • When You Have Access To Data You Shouldn’t
  • Employee Access to Data
  • PII Data
  • PCI Data
  • Monitoring Employee Access
  • What Information Should You be able to Access
  • Shredding and Physical Disposal of Physical Plastics
  • Disposal of Computers, Phones and Drives
  • Encryption
  • Sending Files
  • Nondisclosure
  • Sharing Data
  • Physical Data
  • Digital Data

7

Computer and Laptop Security
  • Computer and Laptop Security Best Practices

8

Phone Security
  • Phone Security Best Practices

9

Internet Usage
  • Internet Usage Best Practices
  • Social Media Risks and Best Practices

10

Software
  • Software Warnings and Best Practices

11

Building Security
  • Building Security Best Practices

12

Working in Public Places
  • Working in Public Places Best Practices

13

Data Retention
  • Data Retention Best Practices

14

Non-Compliance
  • Non Compliance Consequences

15

Information Security Policy
  • Review Your Company’s Information Security Policy

16

Info Security Course Quiz

2023 Information Security Awareness Covering PCI-DSS 3.2 (Required)

Learn how to protect information for yourself, your cardholders, and your company.

Course Content

Expand All | Collapse All
Lessons Status
1

Why Information Security is Important
  • Stories from the Field

2

Reporting a Security Incident

3

Common Security Incidents and How to Respond
  • Phishing Attempt
  • Fraud
  • Data Breach
  • Virus Infection

4

Phishing
  • Phishing Defined Further
  • Spotting Phishing Attempts

5

Passwords
  • Multi-Factor Authentication
  • Every 90 Days
  • Password Reuse
  • Strong Passwords
  • Sharing Passwords

6

Data
  • When You Have Access To Data You Shouldn’t
  • Employee Access to Data
  • PII Data
  • PCI Data
  • Monitoring Employee Access
  • What Information Should You be able to Access
  • Shredding and Physical Disposal of Physical Plastics
  • Disposal of Computers, Phones and Drives
  • Encryption
  • Sending Files
  • Nondisclosure
  • Sharing Data
  • Physical Data
  • Digital Data

7

Computer and Laptop Security
  • Computer and Laptop Security Best Practices

8

Phone Security
  • Phone Security Best Practices

9

Internet Usage
  • Internet Usage Best Practices
  • Social Media Risks and Best Practices

10

Software
  • Software Warnings and Best Practices

11

Building Security
  • Building Security Best Practices

12

Working in Public Places
  • Working in Public Places Best Practices

13

Data Retention
  • Data Retention Best Practices

14

Non-Compliance
  • Non Compliance Consequences

15

Information Security Policy
  • Review Your Company’s Information Security Policy

16

Info Security Course Quiz

Copyright 2026 Prepaid Program Management LLC - Privacy Policy