Online Training Course

Security Essentials for Health IT

Build critical cybersecurity knowledge and skills needed by health IT teams to protect patient data and reduce organizational risk. 

Course Overview

The role of an IT professional is changing–particularly in the healthcare industry where digital transformations and increased connectivity of critical medical equipment has made it the target of cyber attacks. Health IT professionals are increasingly taking on cybersecurity tasks to combat these growing threats, yet often encounter knowledge gaps that inhibit cybersecurity capabilities. 

N2K’s Security Essentials for Health IT is a five (5) hour, 100% online course designed to teach IT professionals foundational cybersecurity concepts and lexicon, with a specific emphasis on their impact in protecting patient data and reducing risk within healthcare organizations.

Relevant and Specific Training

This course was intentionally designed for IT and cyber-enabled teams within healthcare organizations. From start to finish, our course content addresses cybersecurity threats and vulnerabilities associated with protecting patient data and maintaining medical equipment, while incorporating real-world examples from healthcare cybersecurity and IT leaders.

Prerequisites

It is recommended to have some experience in IT or computer networking. However, there are no formal prerequisites. 

Certifications

For individuals who complete the Security Essentials for Health IT course, CompTIA’s Security+ is the perfect introductory cybersecurity certification to demonstrate a firm grasp on foundational cybersecurity concepts and skills.

Who should take this course?

This introductory course is designed for health IT and entry-level healthcare cybersecurity professionals, and beneficial to individuals who regularly access or maintain sensitive patient data or medical technology.  

  • Clinical Engineers who need a foundational understanding of cyber threats and vulnerabilities related to maintaining medical equipment.
  • IT Help Desk whose daily responsibilities have grown to include cybersecurity tasks.
  • Systems or Network Administrators who assess security posture and implement appropriate solutions to combat ransomware and data breaches.
  • New or transitioning cybersecurity practitioners who need to develop fundamental cybersecurity skills.

Benefits of Training

Organizations participating in this offering will experience the following major benefits:

  • Efficiently build cybersecurity knowledge, skills, and abilities related to health IT responsibilities.
  • Increase confidence and ability to converse on, and handle, cybersecurity incidents.
  • Close cyber talent gaps by upskilling or reskilling health IT practitioners.

THIS OFFERING INCLUDES

An intelligent solution.

Diagnostic Assessment

Easily administer a diagnostic assessment is used to determine each team member’s strengths and weaknesses.

Security Essentials for Health IT

Video Lessons

Engage with introductory videos, modular lessons, and interviews with Health IT experts.

Kali Linux

Hands-On Activities

Take-home activities and hands-on labs reinforce practical applications of security concepts.

Final Assessment

Participants conclude training with a final assessment to determine improvement across knowledge and skills.

Want to learn how N2K can set up your team for success?

Course Outline

As a true foundational curriculum, the Security Essentials for Health IT course spans five major domains that establishes foundational cybersecurity knowledge, examines vulnerabilities of an organization’s network and devices from internal and external threats, and common defenses to reduce risk. Click on the sections below to see the expanded topic areas within each domain.

  • This unit provides an introduction to cybersecurity, including important industry words and phrases to establish a common lexicon.

    • Defining Cybersecurity
    • CIA Framework
    • CIA Framework Applied to Healthcare
    • Defining Risk
    • Privileged Access
    • Defining Sensitive Data
    • Laws, Regulations, and Compliance Initiatives in Cybersecurity
    • HIPAA and Cybersecurity
  • This unit examines insecure aspects of network and device communication, It also highlights the fact that many services and devices are insecure by default and not designed with security in mind.

    • The Network
    • IoT Devices
    • Healthcare IoMT
    • Cloud Computing
    • Cloud Computing in Healthcare
    • Passwords
  • This unit examines internal and external methods attackers use to exploit vulnerabilities, including technical, network-based attacks (MITM, DoS) and non-technical attacks (social engineering).

    • Threat Actors
    • Third Parties
    • Third Parties in Healthcare
    • Social Engineering
    • Social Engineering in Healthcare
    • Man-in-the-Middle
    • Man-in-the-Middle (MITM) Attacks on Healthcare Networks
    • DoS Attacks
    • Boston Children’s Hospital DDoS
    • Malware
    • WannaCry Ransomware
  • This unit covers common defenses against threat actors, such as VPNs and network segmentation, as well as less technical efforts that can be used across teams and business leaders. 

    • Network Segmentation
    • Network Segmentation in Healthcare
    • VPNs
    • Securing Telehealth
    • Incident Response
    • Patch Management
    • Patch Management in Healthcare
  • This unit covers cloud development environments, secure deployment configurations, and monitoring services configuration.

    • Communicating About Cybersecurity
    • Communicating with Physicians
    • Writing Cybersecurity Reports
    • Connection Between IT and Cybersecurity Teams
    • Communicating with Third Parties
This course includes:
  • 4 hours on-demand training videos
  • Practical, hands-on activities
  • 15 question diagnostic exam
  • 15 question final exam
  • 15 knowledge check questions
  • Health IT expert interviews
  • Performance Tracker
  • Summary Video
  • Deep-dive into notable breaches and cyber incidents

Why N2K?

When it comes to cybersecurity training, we know that you and your organization have several options to choose from. This is what separates N2K from the pack.

Data-Driven

Measure improvements with robust performance analytics

Relevant

Build the right knowledge and skills specific to roles

Efficient

Foster long-term retention without wasting time on cramming

Cost-Effective

Total costs average 50% less per person compared to the leading bootcamp

Request Pricing

Why N2K?

When it comes to certification training, we know that you and your organization have several options to choose from. This is what separates N2K from the pack.

DATA-DRIVEN

Measure improvements with robust performance analytics

EFFICIENT

Foster long-term retention without wasting time on cramming

RELEVANT

Build the right knowledge and skills specific to roles

COST-EFFECTIVE

Total costs average at least 50% less per person compared to the leading bootcamp

Request Pricing

Request more information on training options for your cybersecurity teams. Private classes are available.


“Our team is totally embracing the value of cybersecurity. Now they just get it.”

Jon Benedict, TRIMEDX

GartnerPeerInsights_N2K

Security Essentials for Health IT FAQs

  • The standard training modality of the course is video-on-demand. Participants have access to all training tools including video lessons, guided labs, knowledge checks, and more within our proprietary LMS for 180-days. Live online instruction is available upon request.

  • No. While certain units and topics may reflect select certifications, the intended purpose of the Security Essentials for Health IT course is not to prepare for an exam but to cover the foundational concepts, processes, and regulations related to cybersecurity in Health IT.

    • Sam Meisenberg, Cybersecurity Instructor, Curriculum Developer, CISSP, Security+, CEH
    • David Lehr, Chief Strategy Officer at Meritus Health
    • Saad Chaudhry, Chief Information Officer at Luminus Health
    • Scott McClure, Sr. Director, Technology at the Graham Holdings Company
  • Yes! Participants receive a digital badge once they have successfully completed the course. This badge can be displayed on social profiles or email signatures. Click here to learn more about N2K’s digital badging.