BIIS

Biomedical & Imaging Information Systems Seminar (BIIS-S1)


Description
The Biomedical & Imaging Information Systems (BIIS) course is designed for Healthcare Technology
Management (HTM) professionals responsible for medical device management, maintenance, and
integration in a networked healthcare environment, commonly referred to as the Healthcare Internet of
Things (HIoT). The course includes a skills assessment and survey to establish understanding of
workforce skills within a large Independent Service Organization (ISO). The scope of the training
encompasses the overlapping Information Technology (IT), Information Systems (IS), and cybersecurity-
related considerations, including standards, operations, roles, and responsibilities. Upon completion of
the program, participants can be reasonably expected to pass the CompTIA IT Fundamentals (ITF)
and/or Security + certifications.

At the conclusion of this course students will be able to:
1. Define and explain the Healthcare Internet of Things (HIoT) and identify cybersecurity threats affecting
Healthcare Delivery Organizations (HDOs) in the contemporary operational environment.
2. Examine the cybersecurity threat environment; identify and define related cybersecurity concepts and
terms; and distinguish individual and organizational cybersecurity responsibilities.
3. Identify and distinguish laws, regulations, and standards related to medical device security; analyze and
assess local policies and guidance; and synthesize and apply the guidelines and requirements in a
healthcare environment.
4. Identify individual and organizational responsibilities associated with the process of securing sensitive
data within the Healthcare Internet of Things (HIoT); appraise and apply processes for securing sensitive
data and information.
5. Describe and distinguish social engineering attack methods and consequences; correlate appropriate
preventions to thwart such attacks in a healthcare environment.
6. Analyze the Internet of Things (IoT) within a typical Healthcare Delivery Organization (HDO) and identify
corrective measures to address critical resources, processes, policies, procedures, and training programs
(qualifications) to reduce cybersecurity threats.
Content
  • Introduction
  • Webinar Recordings
  • Week 1 Webinar Recording
  • Week 2 Webinar Recording
  • Week 3 Webinar Recording
  • Week 4 Webinar Recording
  • Week 5 Webinar Recording
  • Week 6 Webinar Recording
  • Section 1
  • Lesson 1 Overview
  • Week 1 Webinar Recording
  • Basic Networking
  • Network fundamentals.pptx
  • Cloud Models
  • Cloud Services
  • Cloud Computing, and Virtualization concepts
  • What is Social Engineering
  • Phishing
  • Shoulder Surfing
  • Social Engineering
  • NIST - Securing Wireless Infusion Pumps in Healthcare
  • What Happens When You Dare Expert Hackers To Hack You
  • Unit 1 Quiz
  • Unit 1 Optional Reading
  • Unit 1 Additional (Optional) Resource Links
  • Section 2 7d
  • Unit 2 Overview
  • Week 2 Webinar Recording
  • Overview of PC Input Devices
  • An Overview of PC Output Devices
  • Computer Hardware
  • Cable Connectivity
  • Video Cables
  • Fiber Network Cables
  • Network Troubleshooting Methodology
  • Copper Network Cables
  • Defense in Depth
  • Security Concepts
  • Network Hardening
  • Data Communications
  • Network Types
  • Network Topologies
  • Understanding the OSI Model
  • Introduction to IP
  • Common Ports
  • DHCP Overview
  • Overview of DNS
  • Network Architectures
  • Installing Wireless and SOHO Networks
  • Installing a SOHO Network
  • Wireless Security
  • SCSI Drive Cables
  • Wired Network Troubleshooting
  • Unit 2 Quiz
  • Unit 2 Optional reading
  • Unit 2 Additional (Optional) Resource Links
  • Section 3 14d
  • Unit 3 Overview
  • Week 3 Webinar Recording
  • What is Right to Repair
  • Secure Application Development
  • Security Applications Development Explained
  • What is DevSecOps? 8 Minute Explaination
  • What is DevSecOps | An overview of DevSecOps
  • Secure Deployments
  • Secure Coding Techniques
  • Managment of Cybersecurity in Medical Devices
  • Provisioning and Deprovisioning
  • Virtualization Security
  • PACS and HL7
  • How to use a PACS viewer - what medical students and residents should know
  • Navigating a Patient Chart
  • EHR vs EMR
  • EHR vs EMR Software Systems
  • Adapters and Converters
  • Computer Interface Speeds and Distances
  • Unit 3 Quiz
  • Unit 3 Optional Reading
  • Unit 3 Additional (Optional) Resource Links
  • Section 4 21d
  • Unit 4 Overview
  • Week 4 Webinar Recording
  • Confidentiality, Integrity, Availability and Safety
  • Encryption | CompTIA IT Fundamentals
  • Symmetric and Asymmetric Encryption
  • Security - CIA Triad
  • Disk Redundancy
  • Network Redundancy
  • Power Redundancy
  • Replication
  • Backup Types
  • Resiliency
  • Cybersecurity Attacks
  • Securing Medical Devices and Patient Data from Cyber Attacks
  • Protecting Medical Devices from Cyberharm
  • Security
  • Securing Your Medical Device Network on a Shoestring Budget
  • Risk Analysis
  • Phishing
  • Shoulder Surfing
  • Hashing and Digital Signatures
  • Certificate Authorities
  • Cryptography
  • Cryptography Use Cases
  • Stream and Block Ciphers
  • Unit 4 Quiz
  • Unit 4 Additional (Optional) Reading
  • Unit 4 Additional (Optional) Resource Links
  • Section 5 28d
  • Unit 5 Overview
  • Week 5 Webinar Recording
  • Business Continuity
  • Disaster Planning and Recovery
  • Securing Networks
  • Securing Hosts and Data
  • Incident Response
  • Business Impact Analysis
  • Firewalls
  • Intrusion Prevention
  • Reconnaissance Tools - Part 1
  • Reconnaissance Tools - Part 2
  • File Manipulation Tools
  • Packet Tools
  • Forensic Tools
  • Data Classifications
  • Data Roles and Responsabilities
  • Privacy and Data Breeches
  • Incident Response Process
  • Incident Response Planning
  • Attack Frameworks
  • Vulnerability Scan Output
  • SIEM Dashboards
  • Digital Forensics
  • Forensic Data Acquisition
  • On-Premises vs Cloud Forensics
  • Managing Evidence
  • Unit 5 Quiz
  • Unit 5 Additional (Optional) Reading
  • Unit 5 Additional (Optional) Resource Links
  • Section 6
  • Unit 6 Overview
  • Week 6 Webinar Recording
  • Organizational Security
  • Security Controls
  • Security Regulations and Standards
  • Security Frameworks
  • Personnel Security
  • Organizational Policies
  • Federated Identities
  • Credential Policies
  • Managing Data
  • Risk Management Types
  • Enterprise Risk Management (ERM) and Governance Risk and Compliance (GRC)
  • Third-party Risk Management
  • Risk Analysis
  • Business Impact Analysis
  • Privacy and Data Breaches
  • Data Classifications
  • Enhancing Privacy
  • Data Roles and Responsabilities
  • Unit 6 Quiz
  • Unit 6 Additional (Optional) Reading
  • Unit 6 Additional (Optional) Resource Links
  • Final Test
  • Course Follow-up
  • End of Course Survey
  • HTM Cybersecurity Resources
  • HTM Cybersecurity Resources
  • Cybersecurity Certification Exam Objectives (ITF/SEC+)
  • Optional Course Resources (Certification Assistance)
Completion rules
  • You must complete the units "Unit 1 Quiz, Unit 2 Quiz, Unit 3 Quiz, Unit 4 Quiz, Unit 5 Quiz, Unit 6 Quiz, Final Test"
  • Leads to a certificate with a duration: Forever