BIIS

Biomedical & Imaging Information Systems Seminar (BIIS-S1)


Description

The Biomedical & Imaging Information Systems (BIIS) course is designed for Healthcare Technology

Management (HTM) professionals responsible for medical device management, maintenance, and

integration in a networked healthcare environment, commonly referred to as the Healthcare Internet of

Things (HIoT). The course includes a skills assessment and survey to establish understanding of

workforce skills within a large Independent Service Organization (ISO). The scope of the training

encompasses the overlapping Information Technology (IT), Information Systems (IS), and cybersecurity-

related considerations, including standards, operations, roles, and responsibilities. Upon completion of

the program, participants can be reasonably expected to pass the CompTIA IT Fundamentals (ITF)

and/or Security + certifications.


At the conclusion of this course students will be able to:

1. Define and explain the Healthcare Internet of Things (HIoT) and identify cybersecurity threats affecting

Healthcare Delivery Organizations (HDOs) in the contemporary operational environment.

2. Examine the cybersecurity threat environment; identify and define related cybersecurity concepts and

terms; and distinguish individual and organizational cybersecurity responsibilities.

3. Identify and distinguish laws, regulations, and standards related to medical device security; analyze and

assess local policies and guidance; and synthesize and apply the guidelines and requirements in a

healthcare environment.

4. Identify individual and organizational responsibilities associated with the process of securing sensitive

data within the Healthcare Internet of Things (HIoT); appraise and apply processes for securing sensitive

data and information.

5. Describe and distinguish social engineering attack methods and consequences; correlate appropriate

preventions to thwart such attacks in a healthcare environment.

6. Analyze the Internet of Things (IoT) within a typical Healthcare Delivery Organization (HDO) and identify

corrective measures to address critical resources, processes, policies, procedures, and training programs

(qualifications) to reduce cybersecurity threats.

Content
  • Introduction
  • Webinar Recordings
  • Section 1
  • Lesson 1 Overview
  • Week 1 Live Webinar Recording - 9/11/24
  • Basic Networking
  • Network fundamentals.pptx
  • Cloud Models
  • Cloud Services
  • Cloud Computing, and Virtualization concepts
  • What is Social Engineering
  • Phishing
  • Shoulder Surfing
  • Social Engineering
  • NIST - Securing Wireless Infusion Pumps in Healthcare
  • What Happens When You Dare Expert Hackers To Hack You
  • Unit 1 Quiz
  • Unit 1 Optional Reading
  • Unit 1 Additional (Optional) Resource Links
  • Section 2 7d
  • Unit 2 Overview
  • Week 2 Live Webinar Recording
  • Overview of PC Input Devices
  • An Overview of PC Output Devices
  • Computer Hardware
  • Cable Connectivity
  • Video Cables
  • Fiber Network Cables
  • Network Troubleshooting Methodology
  • Copper Network Cables
  • Defense in Depth
  • Security Concepts
  • Network Hardening
  • Data Communications
  • Network Types
  • Network Topologies
  • Understanding the OSI Model
  • Introduction to IP
  • Common Ports
  • DHCP Overview
  • Overview of DNS
  • Network Architectures
  • Installing Wireless and SOHO Networks
  • Installing a SOHO Network
  • Wireless Security
  • SCSI Drive Cables
  • Wired Network Troubleshooting
  • Unit 2 Quiz
  • Unit 2 Optional reading
  • Unit 2 Additional (Optional) Resource Links
  • Section 3 14d
  • Unit 3 Overview
  • Week 3 Webinar Recording
  • What is Right to Repair
  • Secure Application Development
  • Security Applications Development Explained
  • What is DevSecOps? 8 Minute Explaination
  • What is DevSecOps | An overview of DevSecOps
  • Secure Deployments
  • Secure Coding Techniques
  • Managment of Cybersecurity in Medical Devices
  • Provisioning and Deprovisioning
  • Virtualization Security
  • PACS and HL7
  • How to use a PACS viewer - what medical students and residents should know
  • Navigating a Patient Chart
  • EHR vs EMR
  • EHR vs EMR Software Systems
  • Adapters and Converters
  • Computer Interface Speeds and Distances
  • Unit 3 Quiz
  • Unit 3 Optional Reading
  • Unit 3 Additional (Optional) Resource Links
  • Section 4 21d
  • Unit 4 Overview
  • Week 4 Webinar Recording
  • Confidentiality, Integrity, Availability and Safety
  • Encryption | CompTIA IT Fundamentals
  • Symmetric and Asymmetric Encryption
  • Security - CIA Triad
  • Disk Redundancy
  • Network Redundancy
  • Power Redundancy
  • Replication
  • Backup Types
  • Resiliency
  • Cybersecurity Attacks
  • Securing Medical Devices and Patient Data from Cyber Attacks
  • Protecting Medical Devices from Cyberharm
  • Security
  • Securing Your Medical Device Network on a Shoestring Budget
  • Risk Analysis
  • Phishing
  • Shoulder Surfing
  • Hashing and Digital Signatures
  • Certificate Authorities
  • Cryptography
  • Cryptography Use Cases
  • Stream and Block Ciphers
  • Unit 4 Quiz
  • Unit 4 Additional (Optional) Reading
  • Unit 4 Additional (Optional) Resource Links
  • Section 5 28d
  • Unit 5 Overview
  • Week 5 Webinar Recording
  • Business Continuity
  • Disaster Planning and Recovery
  • Securing Networks
  • Securing Hosts and Data
  • Incident Response
  • Business Impact Analysis
  • Firewalls
  • Intrusion Prevention
  • Reconnaissance Tools - Part 1
  • Reconnaissance Tools - Part 2
  • File Manipulation Tools
  • Packet Tools
  • Forensic Tools
  • Data Classifications
  • Data Roles and Responsabilities
  • Privacy and Data Breeches
  • Incident Response Process
  • Incident Response Planning
  • Attack Frameworks
  • Vulnerability Scan Output
  • SIEM Dashboards
  • Digital Forensics
  • Forensic Data Acquisition
  • On-Premises vs Cloud Forensics
  • Managing Evidence
  • Unit 5 Quiz
  • Unit 5 Additional (Optional) Reading
  • Unit 5 Additional (Optional) Resource Links
  • Section 6
  • Unit 6 Overview
  • Week 6 Live Webinar - 10/16/24
  • Organizational Security
  • Security Controls
  • Security Regulations and Standards
  • Security Frameworks
  • Personnel Security
  • Organizational Policies
  • Federated Identities
  • Credential Policies
  • Managing Data
  • Risk Management Types
  • Enterprise Risk Management (ERM) and Governance Risk and Compliance (GRC)
  • Third-party Risk Management
  • Risk Analysis
  • Business Impact Analysis
  • Privacy and Data Breaches
  • Data Classifications
  • Enhancing Privacy
  • Data Roles and Responsabilities
  • Unit 6 Quiz
  • Unit 6 Additional (Optional) Reading
  • Unit 6 Additional (Optional) Resource Links
  • Final Test
  • Course Follow-up
  • End of Course Survey
  • HTM Cybersecurity Resources
  • HTM Cybersecurity Resources
  • Cybersecurity Certification Exam Objectives (ITF/SEC+)
  • Optional Course Resources (Certification Assistance)
Completion rules
  • You must complete the units "Unit 1 Quiz, Unit 2 Quiz, Unit 3 Quiz, Unit 4 Quiz, Unit 5 Quiz, Unit 6 Quiz, Final Test"
  • Leads to a certificate with a duration: Forever