The Biomedical & Imaging Information Systems (BIIS) course is designed for Healthcare Technology
Management (HTM) professionals responsible for medical device management, maintenance, and
integration in a networked healthcare environment, commonly referred to as the Healthcare Internet of
Things (HIoT). The course includes a skills assessment and survey to establish understanding of
workforce skills within a large Independent Service Organization (ISO). The scope of the training
encompasses the overlapping Information Technology (IT), Information Systems (IS), and cybersecurity-
related considerations, including standards, operations, roles, and responsibilities. Upon completion of
the program, participants can be reasonably expected to pass the CompTIA IT Fundamentals (ITF)
and/or Security + certifications.
At the conclusion of this course students will be able to:
1. Define and explain the Healthcare Internet of Things (HIoT) and identify cybersecurity threats affecting
Healthcare Delivery Organizations (HDOs) in the contemporary operational environment.
2. Examine the cybersecurity threat environment; identify and define related cybersecurity concepts and
terms; and distinguish individual and organizational cybersecurity responsibilities.
3. Identify and distinguish laws, regulations, and standards related to medical device security; analyze and
assess local policies and guidance; and synthesize and apply the guidelines and requirements in a
healthcare environment.
4. Identify individual and organizational responsibilities associated with the process of securing sensitive
data within the Healthcare Internet of Things (HIoT); appraise and apply processes for securing sensitive
data and information.
5. Describe and distinguish social engineering attack methods and consequences; correlate appropriate
preventions to thwart such attacks in a healthcare environment.
6. Analyze the Internet of Things (IoT) within a typical Healthcare Delivery Organization (HDO) and identify
corrective measures to address critical resources, processes, policies, procedures, and training programs
(qualifications) to reduce cybersecurity threats.