Course Information

Duration

Minimum of 40 Hours

Exam Time

2 Hours Exam

Course Type

Self Paced / Blended / Classroom

Structure

Curriculum

Day 1

  • Breach Notification Awareness Part I – CS00301
  • Breach Notification Awareness Part II – CS00302

Day 2

  • Business Continuity & Disaster Recovery Awareness Part I - DR00101
  • Business Continuity & Disaster Recovery Awareness Part II - DR00102

Day 3

  • Business Continuity Disaster Recovery Part III - DR00103
  • Business Continuity Disaster Recovery Part IV - DR00104
  • Business Continuity Disaster Recovery Part V - DR00105

Day 4

  • Prevention, Detection, and Recovery from Cyberattacks Part I Awareness - CS01101
  • Prevention, Detection, and Recovery from Cyberattacks Part II CSIRT Formation - CS01102

Day 5

  • Social Engineering & Phishing Awareness Part I - CS00103
  • Social Engineering & Phishing Awareness Part II - CS00104
  • Exam

Course Details

Breach Notification Awareness Part I – CS00301


The course includes cybersecurity and privacy knowledge test as users progress through the training. The training is designed to protect and preserve the confidentiality, integrity, and availability of information owned by or in the care of the corporation.


Breach Notification Awareness Part II - CS00302


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Business Continuity & Disaster Recovery Awareness Part I - DR00101


The course provides in-depth knowledge of risk management concepts and fundamentals. The course improves risk awareness, promotes an open risk culture, and inclusion of risk in the decision-making process.Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.


Business Continuity & Disaster Recovery Awareness Part II - DR00102


The course is designed to educate employees to understand how malware can infect your device, how you can avoid malware, and what action you need to take when you get infected by malware.


Business Continuity Disaster Recovery Part III - DR00103


The course is designed for organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, and highly sensitive and confidential data.


Business Continuity Disaster Recovery Part IV - DR00104


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Business Continuity Disaster Recovery Part V - DR00105


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Prevention, Detection, and Recovery from Cyberattacks Part I Awareness - CS01101


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Prevention, Detection, and Recovery from Cyberattacks Part II CSIRT Formation - CS01102


Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore normal operations and services as quickly as possible after an unforeseen event.


Social Engineering & Phishing Awareness Part I - CS00103


This BCP and DR awareness course will provide every employee in the organization with basic knowledge about disasters, risks covered by DR, use cases, challenges, DR plans, etc.


Social Engineering & Phishing Awareness Part II - CS00104


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Exam


You have total 3 attempts for this exam.

HITRUST Alliance is composed of leaders from the healthcare industry in the pursuit of a more coherent approach to healthcare security.

HIPAA (Health Insurance Portability and Accountability Act) is a 1996 U. S. law that provides privacy standards to protect patients’ medical records and other health information provided to health plans, doctors, hospitals, and other health care providers.

Covered Entities, Business Associates, and Business Associate Subcontractors are all responsible for complying with HIPAA regulations. Section 164.308 (a)(5)(i) Security Awareness and Training Standard requires organization to implement a awareness training program.

The HITRUST security maturity evaluation and points process awards healthcare providers a certification.

This certification verifies that the company followed the Common Security Framework (CSF). The latest version, CSF 9.3, consolidates multiple regulations. The HITRUST series of courses are incredibly useful for the organization in the right scoping, selection of risk factor-based controls level, correctly applying HITRUST scoring, planning for certification, and more.

The HITRUST Foundation Part I course is designed to ensure employees understand the importance of HITRUST and fulfill the HITRUST training requirements.

The series of HITRUST courses are useful for compliance, cybersecurity, information technology, and audit professionals to enhance security and compliance skills.

HITRUST Alliance is composed of leaders from the healthcare industry in the pursuit of a more coherent approach to healthcare security.

  • This five-day healthcare security and compliance certificate program immerses attendees in the very regulations, frameworks, and other guidance
  • The only certification that combines cybersecurity, privacy and compliance
  • Successful completion of this course indicates that students are prepared to take Healthcare Security and Compliance roles and begin a career as a compliance officer
  • Self-paced course convenient for work schedules: flexibility to complete coursework at home on your own schedule
  • Attendees examine health care-related laws and regulations
  • Provide a strong ethical foundation for security, compliance and vendor management professionals
  • Offer practical insights into how to identify and address life sciences compliance risks and build effective compliance programs
  • Provide a certificate to each attendee upon completion of the program.
  • The Program is recommended for those who would benefit from an introduction (or an update) to the complex set of laws, regulations and issues affecting the drug and device industries and the government's approach to monitoring and prosecuting violators. It is not recommended for chief or senior compliance officers who are experts in compliance matters.
By the time you graduate, you can expect to be able to:

  • The employees will learn key concepts of Incident management, problem management, breach management, and understand different terminologies.
  • Learn to differentiate event, alert, incident, and breach.
  • Enhance your understanding of the incident management process. Learn to identify incidents, critical success factors, and key performance indicators specific to IM.
  • You will also learn about drivers/inputs that trigger the problem management process.
  • Learn the process of breach communication internal to the organization and very importantly communicating with outsiders.
  • Learn about legal responsibilities, applicable laws, and data breach response plan.
  • Learn the Federal and State laws that require timely breach communication.
  • Learn to create effective breach response, document policy, plan and procedure.
  • The advanced course trains candidates on the next steps instead of panicking. You will have better understanding of your roles, and do’s and don’ts once the breach occurs.
  • The course will train you on establishing problem management process roles and responsibilities, step by step approach in implementing key processes, defining process inputs/outputs, and reporting.

Various Job Oppoortunites are :


  • Compliance Officer
  • Information Security/
    Manager
  • IT Analyst
  • Developers
  • Privacy Officer
  • Compliance Auditor
  • Health Information Manager
  • Practice Manager
  • Risk Analyst
  • Medical Records Supervisor
  • Information Technology Manager
  • Privacy and Security Consultant
  • Cybersecurity Consultant/
    Analyst
  • Systems Security Analyst
  • System Analyst Manager
  • Architect
  • Cybersecurity Operations Specialist

Eligibility :

User must complete Health Security and Compliance Foundation certificate before registering for Professional certification

Take Exam

The candidate is eligible for CSC Council exam if he meets the Eligibility criteria listed below :

  • Applicants who do not attend training must prove 1 year of work experience in the compliance area
  • Applicants who are instructors, trainers, and PhDs shall also be eligible if they meet the above criteria.
  • On the application, there is a section for the applicant to list a boss, supervisor, or department lead who will act as their verifier.
  • If further information is requested from the applicant after the application is submitted and 90 days pass with no response from the applicant, the application will be automatically rejected, and a new form will have to be submitted.
  • If application is not approved, the application fee of USD 100 will not be refunded.
  • If the application is approved, then candidate must take exam in 15 working days

Apply Now

CSC - Healthcare Cybersecurity and Breach Management (HCBP)

Healthcare Cybersecurity and Breach Management (HCBP)

HITRUST Alliance is composed of leaders from the healthcare industry in the pursuit of a more coherent approach to healthcare security.

Material of HCBP

HIPAA (Health Insurance Portability and Accountability Act) is a 1996 U. S. law that provides privacy standards to protect patients’ medical records and other health information provided to health plans, doctors, hospitals, and other health care providers.

Covered Entities, Business Associates, and Business Associate Subcontractors are all responsible for complying with HIPAA regulations. Section 164.308 (a)(5)(i) Security Awareness and Training Standard requires organization to implement a awareness training program.

Price of the Course HCBP

Price: $ 750.00

The HITRUST security maturity evaluation and points process awards healthcare providers a certification.

HCBP Course Details

The HITRUST Foundation Part I course is designed to ensure employees understand the importance of HITRUST and fulfill the HITRUST training requirements.

The series of HITRUST courses are useful for compliance, cybersecurity, information technology, and audit professionals to enhance security and compliance skills.

CSC - Healthcare Cybersecurity and Breach Management (HCBP)

Healthcare Cybersecurity and Breach Management (HCBP)

HITRUST Alliance is composed of leaders from the healthcare industry in the pursuit of a more coherent approach to healthcare security.

Material of HCBP

The HITRUST Foundation Part I course is designed to ensure employees understand the importance of HITRUST and fulfill the HITRUST training requirements.

Covered Entities, Business Associates, and Business Associate Subcontractors are all responsible for complying with HIPAA regulations. Section 164.308 (a)(5)(i) Security Awareness and Training Standard requires organization to implement a awareness training program.

Price of the Blended Course HCBP

Price: $ 900.00


The HITRUST security maturity evaluation and points process awards healthcare providers a certification.

HCBP Course Details

The HITRUST Foundation Part I course is designed to ensure employees understand the importance of HITRUST and fulfill the HITRUST training requirements.

The series of HITRUST courses are useful for compliance, cybersecurity, information technology, and audit professionals to enhance security and compliance skills.


Contact Us for Classroom Course Schedule

Disclaimer

CSC-Council reserves the right to impose additional restriction to comply with the policy.

Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council.

CSC-Council reserves the right to revoke the certification of any person in breach of this requirement.