Compliance Trainings
Courses | Description |
---|---|
Hipaa Training | What is HIPAA • Examples of PHI • What is HIPAA • Why compliance with HIPAA is important • Examples of PHI • When is health information considered identifiable • What are permitted uses of PHI • HIPAA rules • Do’s and Don’ts • HIPAA violations |
IRCA Approved - ISO 27001 LA | PDCA Cycle • Operation Management • Audit’s DOs & DONTs • ISO2700 Series Overview • ISO 27001:2005 Requirements • IRCA Code of Conduct• Audit Planning & Preparation • Process Audit Technique • Evidence Collection • Risk Assessment Methodologies • Incident Management • CIA & DAD • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting |
ISO 27001 LI | ...Evidence Collection • PDCA Cycle... • ISO2700 Series • Overview • ISO 27001:2005 Requirements • Audit’s DOs & DONTs • Audit Planning & Preparation • Process Audit Technique • CIA & DAD • Risk Assessment Methodologies • Incident Management • Operation Management • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting |
ISO 22301 LA | BCM Life Cycle • BCM Audit • BCM Strategy • Incident Response • Mission Critical Activities • Business Impact Analysis (BIA) • Risk Assessment • Process Level BCM • Resource Recovery • BCM v/s DRP • BCM Exercise & Maintenance • Standard v/s Specification |
ISO 22301 LI | Amazon AWS • Windows Azure • Cloud Computing Features • Amazon AWS • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance |
IT Risk Management | IT Risk Assessment • OCTAVE • IT Risk Management Cycle • NIST • ISO 31000:2009 • Risk Mitigation |
IIEH Payment Industry Data Security Implementer | PCI Requirements • PA DSS Practices • Compliance Process • PTS • Customer Card Information • Storage Best Practices • POS terminal Security • Payment Application Security • PTS • Self-Assessment Questionnaire (SAQ) • Best Practices |
Enterprise Risk Management | COSO Framework • Risk Analysis • Risk Assessment • Risk Evaluation • Risk Perception • Risk Treatment • BCP • ERM Essentials • Risk Monitoring • Risk Management |
IT Infrastructure Library | ervice Design • Service Strategy • Changes from ITIL v2 • ITIL v3 • Service Translation • Service Operation • Service Improvement • Processes definition and implementation • Functions definitions and allocation • Roles definitions and function-wise appropriation • Case Studies |