ISC2
Information Technologies and Security in Healthcare Settings
ISC2

Information Technologies and Security in Healthcare Settings

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

6 hours to complete
3 weeks at 2 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

6 hours to complete
3 weeks at 2 hours a week
Flexible schedule
Learn at your own pace

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

October 2024

Assessments

24 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the ISC2 Healthcare Certificate Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 4 modules in this course

Welcome to the ISC2 Healthcare Essentials: Information Security in Healthcare Settings Certificate Program!​​​ The healthcare industry is relying increasingly on technology to improve patient care, streamline operations, and share information. Just like everything, however, there is a cost. With reliance on technology comes the increased risk of cyber threats, data breaches, and other security vulnerabilities that can compromise the privacy and security of sensitive patient information. ​As a result, information security has become a critical concern for healthcare organizations worldwide, requiring comprehensive strategies and measures to safeguard patient data from unauthorized access, theft, or misuse. In this context, understanding the importance of information security in healthcare organizations is essential for protecting the privacy and wellbeing of patients while maintaining the trust and confidence of the wider community.​

What's included

1 reading

The healthcare industry is exceedingly diverse, consisting of various organizations from small physician practices and large hospitals to laboratories, pharmaceutical companies, biomedical companies, payers (private, public, etc.), regulators, and public health organizations. All these organizations rely on the efficient and effective exchange of patient-related information.​ Security professionals should understand the diversity of the healthcare industry, the types of technologies, and flows of information that require various levels of protection, and how healthcare information is exchanged within the industry.​

What's included

77 readings17 assignments

The goal of this learning experience is to provide security professionals with the necessary knowledge to manage emerging healthcare technologies and to identify emerging threats utilizing these technologies throughout the information life cycle. As healthcare organizations partner with vendors, third parties, and other business associates to execute core and noncore business operations via the cloud and other service offerings, understanding how the organization’s information is shared, accessed, used, and destroyed becomes more important to the healthcare privacy and security practitioner.

What's included

29 readings6 assignments

The healthcare industry is seeing many emerging technologies, posing a challenge to security management as legacy systems and inadequately monitored devices are deployed in new ways. At the same time, regulations like GDPR and HIPAA are demanding higher levels of compliance for privacy and security. Managing data throughout its life cycle entails applying the CIA triad to each phase: creation, storage, use, sharing, archiving, and destruction. Finally, information technology management includes knowing the connectivity requirements for third parties that want, or need, to share information. The covered entity’s privacy and security protection practices must be met by the third party at an equivalent level. Data security professionals need to recommend the appropriate trust model and connection agreement for such third-party relationships.

What's included

1 assignment

Instructor

ISC2 Education & Training
ISC2
30 Courses92,038 learners

Offered by

ISC2

Recommended if you're interested in Health Informatics

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Health Informatics? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions