CHISSP - Certified Healthcare IS Security Practitioner
CLASS DATE(s):
Request a Class

COURSE LENGTH: 4 Days

COURSE COST: $2,399

COURSE TIMES: 9:00am - 4:30pm

Printable version of this course
print

COURSE OVERVIEW

The vendor neutral Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge to implement the best IT Healthcare Practices, as well as, regulatory compliance and standards in the healthcare industry.

Because of growing industry regulations and privacy requirements in the healthcare industry, the Certified Healthcare Information Systems Security Practitioner was developed by mile2. The CHISSPs have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity.

AUDIENCE AND PREREQUISITES

  • Information System Security Officers
  • Privacy Officers
  • Health IS Managers
  • Risk Managers
  • Information Security Managers
  • Compliance & Privacy Officers
A minimum of 1 year of Healthcare Information Systems.

  

Course Kit and Lunch not included. Course Kit $ 500.
Course will run as a live-virtual class unless a minimum enrollment is reached.

Exam Information: The Certified Digital Forensics Examiner exam is taken online. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD.

COURSE TOPICS:


Module 1: Intro to the Healthcare Industry
Healthcare Environment
Third-Party Relationships
Health Data Management Concepts

Module 2: Regulatory Environment
Applicable Regulations
International Regulations and Controls
Compliance Frameworks
Risk-Based Decisions
Code of Conduct/Ethics

Module 3: Healthcare Privacy & Security Policies
Security Objectives/Attributes
Security Definitions/Concepts
Privacy Principles
Disparate Nature of Sensitive Data and

Module 4: Information Governance & Risk Management
Security and Privacy Governance
Risk Management Methodology
Information Risk Management Life Cycles
Risk Management Activities

Module 5: Information Governance & Risk
Risk Assessment
Procedures from within Organization Risk
Risk Assessment Consistent with Role in
Efforts to Remediate Gaps

Module 6: Third-Party Risk Management
Third-Party Management Standards and
Third-Party Assessments and Audits
Security/Privacy Events
Third-Party Connectivity
Third-Party Requirements Remediation Efforts