Compliance Trainings

Compliance Trainings

Courses Description Duration
Hipaa Training
...What is HIPAA • Examples of PHI... • What is HIPAA • Why compliance to HIPAA is important • Examples of PHI • When is health information considered identifiable • What are permitted uses of PHI • HIPAA rules • Do’s and Don’ts • HIPAA violations 1 days
IRCA Approved - ISO 27001 LA
...PDCA Cycle • Operation Management... • Audit’s DOs & DONTs • ISO2700 Series Overview • ISO 27001:2005 Requirements • IRCA Code of Conduct• Audit Planning & Preparation • Process Audit Technique • Evidence Collection • Risk Assessment Methodologies • Incident Management • CIA & DAD • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting 5 days
ISO 27001 LI
...Evidence Collection • PDCA Cycle... • ISO2700 Series • Overview • ISO 27001:2005 Requirements • Audit’s DOs & DONTs • Audit Planning & Preparation • Process Audit Technique • CIA & DAD • Risk Assessment Methodologies • Incident Management • Operation Management • Nonconformities • Observations • Corrective Action • Preventive Action • Reporting 4 days
ISO 22301 LA
...BCM Life Cycle • BCM Audit... • BCM Strategy • Incident Response • Mission Critical Activities • Business Impact Analysis (BIA) • Risk Assessment • Process Level BCM • Resource Recovery • BCM v/s DRP • BCM Exercise & Maintenance • Standard v/s Specification 4 days
ISO 22301 LI
...Amazon AWS • Windows Azure... • Cloud Computing Features • Amazon AWS • Best Practices • OWASP Top 10 Risk • Cloud Security Alliance 4 days
IT Risk Management
...IT Risk Assessment • OCTAVE... • IT Risk Management Cycle • NIST • ISO 31000:2009 • Risk Mitigation 2 days
Certified Payment Industry Data Security Implementer(CPI DSI)
...PCI Requirements • PA DSS... Practices • Compliance Process • PTS • Customer Card Information • Storage Best Practices • POS terminal Security • Payment Application Security • PTS • Self-Assessment Questionnaire (SAQ) • Best Practices 3 days
Enterprise Risk Management
...COSO Framework • Risk Analysis... • Risk Assessment • Risk Evaluation • Risk Perception • Risk Treatment • BCP • ERM Essentials • Risk Monitoring • Risk Management 2 days
IT Infrastructure Library (ITIL)
...Service Design • Service Strategy... • Changes from ITIL v2 • ITIL v3 • Service Translation • Service Operation • Service Improvement • Processes definition and implementation • Functions definitions and allocation • Roles definitions and function-wise appropriation • Case Studies 2 days

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content