Overview
Learn vital security strategies for healthcare environments. Cybersecurity is critical to address the unique challenges of protecting patient and organizational data. Show that you’re on the forefront of securing patient health information and navigating a complex regulatory environment.
Whether you’re looking to stay ahead of the curve through professional development or exploring a pathway to the ISC2 CISSP Certification, this specialization gives you the flexibility to suit your needs.
This course is a text-based, sixteen-hour learning experience.
Course 1 - Healthcare Essentials: Information Security in Healthcare Settings
Course 2 - Privacy and Security for Healthcare Organizations
Course 3 - Risk Management and Risk Assessment in a Healthcare Setting
Syllabus
Course 1: Information Technologies and Security in Healthcare Settings
- Offered by ISC2. This is course one in the ISC2 Healthcare Certificate Specialization. Information security and technology play a critical ... Enroll for free.
Course 2: Privacy and Security for Healthcare Organizations
- Offered by ISC2. This is course two in the ISC2 Healthcare Certificate Specialization. Patients have expectations of privacy and that they ... Enroll for free.
Course 3: Risk Management and Risk Assessment in a Healthcare Setting
- Offered by ISC2. This is course three in the ISC2 Healthcare Certificate Specialization. Risk management is a crucial element for ... Enroll for free.
- Offered by ISC2. This is course one in the ISC2 Healthcare Certificate Specialization. Information security and technology play a critical ... Enroll for free.
Course 2: Privacy and Security for Healthcare Organizations
- Offered by ISC2. This is course two in the ISC2 Healthcare Certificate Specialization. Patients have expectations of privacy and that they ... Enroll for free.
Course 3: Risk Management and Risk Assessment in a Healthcare Setting
- Offered by ISC2. This is course three in the ISC2 Healthcare Certificate Specialization. Risk management is a crucial element for ... Enroll for free.
Courses
-
This is course one in the ISC2 Healthcare Certificate Specialization. Information security and technology play a critical role in the healthcare industry. With the increasing use of electronic health records (EHRs), telemedicine, and other digital technologies, healthcare providers and organizations must prioritize the security of sensitive patient data. Information security in healthcare involves protecting patient data from unauthorized access, use, disclosure, and destruction. Technology also plays a crucial role in healthcare by enabling more efficient and effective care delivery. However, the use of technology in healthcare also introduces new security risks. Healthcare organizations must ensure that their systems are up-to-date and secure to protect against malicious actors and data breaches. They must also train their staff on proper security practices and be prepared to respond to security incidents. Overall, information security and technology are essential components of healthcare delivery. By implementing effective security measures and utilizing technology in a responsible manner, healthcare organizations can provide high-quality care while protecting patient privacy and data. This course is set up in two parts: Information Security and Information Technologies. This course will cover the following learning objectives: Part 1: Information Security Objectives Define the healthcare environment. Examine third party relationships. Identify essential health data management concepts. Part 2: Information Technologies Objectives Describe the impact of healthcare information technologies on Privacy and Security. Describe data life cycle management. Determine the most secure methods of third-party connectivity.
-
This is course two in the ISC2 Healthcare Certificate Specialization. Patients have expectations of privacy and that they will have some control over their medical information. In a healthcare context, this can include medical images, diagnoses, and notes relating to their treatment, the state of their health-related financial information, and other sensitive facts. To protect this information, organizations apply a range of safeguards to provide assurance that information is shared only if necessary. This includes processes, procedures, techniques, or technologies specifically designed to guarantee the confidentiality, integrity, and availability of the information. The ultimate objective is to ensure that personally identifiable information (PII) is adequately protected regardless of its state or the system in which the information exists. This course will cover the following learning objectives: Identify essential security and privacy principles. Define the relationship between privacy and security. Describe sensitive data handling.
-
This is course three in the ISC2 Healthcare Certificate Specialization. Risk management is a crucial element for understanding information and privacy security. This domain sets the foundation for the entire course; terms defined here will be used in this book and in your day-to-day career. Risk management is one of the most complicated and important topics in information security, and this chapter does not pretend to cover all the different elements pertaining to it, but it provides a high-level glimpse of the essential concepts of this vital function. In the healthcare industry, the importance of adopting a risk management approach is even more crucial, due to the sensitive nature of the information. Data sharing can, in many cases, be a matter of life and death in the healthcare industry. However, patient safety is not the only objective. Saving someone's life only to have their most sensitive secrets leaked to unauthorized parties is counterproductive. Hence, the security and privacy practitioner must balance the clinical need for information and the patient's rightful expectation of privacy. Like other industries, the healthcare industry relies on technology to improve operations and patient care. In many cases, these technologies come with associated risks that must be considered. The industry also has unique regulatory and business requirements that the security and privacy practitioner must uphold. This course will cover the following learning objectives: - Define the foundations of enterprise risk management. - Explain the information risk management and assessment process. - Identify control assessment procedures using organization risk frameworks. - Explain the process of monitoring for and mitigating risk. - Define continuous monitoring.
Taught by
ISC2 Education & Training