Hospital Cybersecurity for IT Professionals

This course teaches IT professionals how to respond to cyberattacks through risk management and mitigation strategies, technical countermeasures, and an understanding of hospital IT systems.

INTERESTED? Demo Course
Scroll Down Arrow


About this Course

This course examines the technical domain of cybersecurity through an exploration of system vulnerabilities, common forms of cyber-attacks, risk management and mitigation strategies, and technical countermeasures. It explores the financial and reputational damage caused by successful attacks, as well as the information technology practices required to protect healthcare organizations, critical organizational operations, and patient well-being.

Language Availability: English

Suggested Audiences: IT Professionals, Software Developers, Software Vendors

Organizational Subscription Price: Included as part of an annual subscription to our Hospital Cybersecurity series
Independent Learner Price: $99 per person


Course Content

Understanding System Vulnerabilities In-Depth

This module looks into the intricate anatomy of hospital systems and their significance to operational efficiency and patient privacy. Emphasis is placed on the vulnerability of these systems to cyberthreats and the critical role cybersecurity plays in safeguarding hospital and patient well-being.

Recommended Use: Required
ID (Language): 21557 (English)
Author(s): Keith Duemling, MBA - Catholic Health, Long Island

Primary Forms of Cyberthreats

The module describes the different types of cyberattacks, including social engineering, ransomware, loss/theft of equipment, insider malicious behavior, and vulnerable connected devices. It also discusses methods of improving cyber supply chain management.

Recommended Use: Required
ID (Language): 21553 (English)
Author(s): Kurt Zanzi, CISSP, CHPC, OpenFAIR - Sutter Health

Learning from Past Examples

The module examines case studies to illustrate the causes and consequences of successful cyberattacks. It details the direct and indirect financial and reputational damage that hospitals can suffer, along with the exposure of patient's private information. The case studies identify the educational and training tools needed to effectively recognize and respond to cyber threats.

Recommended Use: Required
ID (Language): 21554 (English)
Author(s): Keith Duemling, MBA - Catholic Health, Long Island

Risk Management and Mitigation

This module explains how cyber risk management and mitigation strategies safeguard digital assets, data, and operations from various threats and vulnerabilities. It describes how a proactive approach can minimize the potential harm caused by cyberattacks, data breaches, and other malicious activities.

Recommended Use: Required
ID (Language): 21555 (English)
Author(s): Kurt Zanzi, CISSP, CHPC, OpenFAIR - Sutter Health

Technical Countermeasures

This module explores the cybersecurity countermeasures required to protect healthcare organizations. It delves into best practices for safeguarding email systems, endpoints, and identity management while highlighting strategies for network protection, incident response, and regulatory compliance. Additionally, the module examines emerging threats from advanced technologies like AI.

Recommended Use: Required
ID (Language): 21556 (English)
Author(s): Keith Duemling, MBA - Catholic Health, Long Island


Learn More

This field is for validation purposes and should be left unchanged.
Your Name(Required)
I'd Like To Receive Emails From CITI Program