Course Description
This course provides details of security implementation for connected healthcare. The key tenets of the cyber security – Inventory, of hardware and software, prioritization of the critical data and applications, monitoring, advanced defense with secure SDLC and testing. The various components including, risk mitigation strategies and the longterm roadmap for the implementation of the security within the healthcare space. It also gives a deep dive on the various regulations pertaining the healthcare devices and other components of the healthcare value chain. The course also focuses on the incident reporting, the total product lifecycle framework, and how innovation can help achieve the maturity through some of the tools stack.
What am I going to get from this course?
- Detailed understanding of the connected healthcare with cyber security aspects
- Risk mitigation techniques
- Incident reporting charts
- Deep defense strategies
- Innovation aspects
- Total Product Lifecycle with some tool stack.
Curriculum
Module 1: Cyber Security – Key Tenets
Lecture 2
Focus on the Inventory
Lecture 3
Risk Prioritization Lifecycle
Lecture 4
Risk Prioritization Lifecycle Process - Technology Team Enablement
Lecture 5
Risk Prioritization Lifecycle Continued
Lecture 6
Monitoring of the Devices Application
Lecture 7
Advanced Defense
Lecture 8
Secure SDLC & Testing
Lecture 9
Secure SDLC & Testing - How Does it Work
Module 2: Cyber Security Strategy
Lecture 10
Intro to Cyber Security Strategy
Lecture 11
Holistic Cybersecurity Part 1
Lecture 12
Holistic Cybersecurity Part 2
Lecture 13
Holistic Cybersecurity Part 3
Module 3: Connected Medical Devices and Wearables
Lecture 15
Cybersecurity Issues
Lecture 16
Cybersecurity Issues
Module 4: Incident Reporting and Sharing
Lecture 18
What is Incident Reporting
Lecture 19
Incident Reporting and Sharing
Module 5: Recommendations for Better Safety, Security, and effectiveness in Networked Devices
Lecture 20
Recommendations
Module 6: Best Practices and Cybersecurity in Connected Devices
Lecture 21
Adoption of Cybersecurity
Lecture 22
Adoption of Cyber Security Continued
Module 7: Driving the Process of Improving the IoT Through Collaboration
Lecture 23
Driving the Process of Improving Cybersecurity in the IoT
Module 8: Total Product Lifecycle Framework
Lecture 24
Premarket and Post market Cybersecurity Approach
Lecture 25
Will the Expected Benefits of the IoT exceed the Cybersecurity Risks?
Quiz 1
Cyber Security for Connected Healthcare End of Course Quiz