C)HISSP : Certified Healthcare IS Security Practitioner

Description

Duration: 4 days

About this Course

The vendor neutral Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge to implement the best IT Healthcare Practices, as well as, regulatory compliance and standards in the healthcare industry.          Because of growing industry regulations and privacy requirements in the healthcare industry, the Certified Healthcare Information Systems Security Practitioner was developed by mile2. The CHISSPs have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity.

Mile2 Accreditations: 

  1. Accredited by the NSA CNSS 4011-4016
  2. Is approved and has been placed on Homeland Security’s National Initiative for Cyber Security Careers and Studies (NICCS) training providers and maps to the National Cybersecurity Workforce Framework
  3. Preferred cyber certification for the FBI

Audience Profile

Information System Security Officers
Privacy Officers
Health IS Managers
Risk Managers
Information Security Managers
Compliance & Privacy Officers

At Course Completion

Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/25/202312/28/2023
1/15/20241/18/2024
2/5/20242/8/2024
2/26/20242/29/2024
3/18/20243/21/2024
4/8/20244/11/2024
4/29/20245/2/2024
5/20/20245/23/2024
6/10/20246/13/2024
7/1/20247/4/2024
7/22/20247/25/2024
8/12/20248/15/2024
9/2/20249/5/2024
9/23/20249/26/2024
10/14/202410/17/2024
11/4/202411/7/2024
11/25/202411/28/2024
12/16/202412/19/2024
1/6/20251/9/2025

Curriculum

Module 1: Intro to the Healthcare Industry
▪ Healthcare Environment
▪ Third-Party Relationships
▪ Health Data Management Concepts

Module 2: Regulatory Environment
Applicable Regulations
▪ International Regulations and Controls
▪ Internal Practices Compared to New Policies and Procedures
▪ Compliance Frameworks
▪ Risk-Based Decisions

Module 3: Healthcare Privacy & Security Policies
▪ Security Objectives/Attributes
▪ Security Definitions/Concepts
▪ Privacy Principles
▪ Disparate Nature of Sensitive Data and Handling Implications

Module 4: Information Governance & Risk Management
– How organizations manage information risk through security and privacy governance, risk management lifecycles, and principle risk activities
▪ Security and Privacy Governance
▪ Risk Management Methodology
▪ Information Risk Management Life Cycles
▪ Risk Management Activities

Module 5: Information Governance & Risk Assessment
▪ Risk Assessment
▪ Procedures from within Organization Risk
▪ Risk Assessment Consistent with Role in Organization
▪ Efforts to Remediate Gaps

Module 6: Third-Party Risk Management
Definition of Third-Parties in Healthcare Context
▪ Third-Party Management Standards and Practices
▪ Third-Party Assessments and Audits
▪ Security/Privacy Events
▪ Third-Party Connectivity
▪ Third-Party Requirements Remediation Efforts

Prerequisites

A minimum of 1 year of Healthcare Information Systems