Compliance Trainings
Courses | Description |
---|---|
Hipaa Training |
What is HIPAA • Examples of PHI • What is HIPAA • Why compliance with HIPAA is important • Examples of PHI • When is health information considered identifiable • What are permitted uses of PHI • HIPAA rules • Do’s and Don’ts • HIPAA violations |
IRCA Approved – ISO 27001 LA |
PDCA Cycle • Operation Management • Audit’s DOs & DONTs • ISO2700 Series Overview • ISO 27001:2005 Requirements • IRCA Code of Conduct• Audit Planning & Preparation • Process Audit Technique • Evidence Collection • Risk Assessment Methodologies • Incident Management • CIA & DAD • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting |
ISO 27001 LI |
…Evidence Collection • PDCA Cycle… • ISO2700 Series • Overview • ISO 27001:2005 Requirements • Audit’s DOs & DONTs • Audit Planning & Preparation • Process Audit Technique • CIA & DAD • Risk Assessment Methodologies • Incident Management • Operation Management • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting |
ISO 22301 LA |
BCM Life Cycle • BCM Audit • BCM Strategy • Incident Response • Mission Critical Activities • Business Impact Analysis (BIA) • Risk Assessment • Process Level BCM • Resource Recovery • BCM v/s DRP • BCM Exercise & Maintenance • Standard v/s Specification |
ISO 22301 LI |
Amazon AWS • Windows Azure • Cloud Computing Features • Amazon AWS • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance |
IT Risk Management |
IT Risk Assessment • OCTAVE • IT Risk Management Cycle • NIST • ISO 31000:2009 • Risk Mitigation |
IIEH Payment Industry Data Security Implementer |
PCI Requirements • PA DSS Practices • Compliance Process • PTS • Customer Card Information • Storage Best Practices • POS terminal Security • Payment Application Security • PTS • Self-Assessment Questionnaire (SAQ) • Best Practices |
Enterprise Risk Management |
COSO Framework • Risk Analysis • Risk Assessment • Risk Evaluation • Risk Perception • Risk Treatment • BCP • ERM Essentials • Risk Monitoring • Risk Management |
IT Infrastructure Library |
ervice Design • Service Strategy • Changes from ITIL v2 • ITIL v3 • Service Translation • Service Operation • Service Improvement • Processes definition and implementation • Functions definitions and allocation • Roles definitions and function-wise appropriation • Case Studies |