facebook-pixel
USD 99.00

Self Paced Learning

USD 0.00

Instructor Led Online Classes

USD 0.00

Instructor Led On-site Classes

There are no active batches for this course. If you have any question feel free to contact us

There are no active batches for this course. If you have any question feel free to contact us

Certification

Industry recognized certification enables you to add this credential to your resume upon completion of all courses

Need Custom Training for Your Team?
Get Quote
Call Us

Toll Free (844) 397-3739

Inquire About This Course
Instructor
Anand Vemula, Instructor - Cyber Security for Connected Healthcare

Anand Vemula

Has 20 years high tech experience in IoT, AI, Deep Learning, Cybersecurity, Cloud, and Communications. Anand assumed various roles in large multinational companies like Cognizant; Verizon; HP; and advised for multiple startups. He's an alumnus of BITS Pilani and IIPM, NewDelhi.

Instructor: Anand Vemula

This course provides details of security implementation for connected healthcare

  • Understand connected healthcare with the cybersecurity aspects.
  • Learn risk mitigation techniques.
  • Instructor has 20 years experience working in IoT with various multinational companies. 

Duration: 2h 51m

Course Description

This course provides details of security implementation for connected healthcare. The key tenets of the cyber security – Inventory, of hardware and software, prioritization of the critical data and applications, monitoring, advanced defense with secure SDLC and testing. The various components including, risk mitigation strategies and the longterm roadmap for the implementation of the security within the healthcare space. It also gives a deep dive on the various regulations pertaining the healthcare devices and other components of the healthcare value chain. The course also focuses on the incident reporting, the total product lifecycle framework, and how innovation can help achieve the maturity through some of the tools stack.

What am I going to get from this course?

  • Detailed understanding of the connected healthcare with cyber security aspects
  • Risk mitigation techniques 
  • Incident reporting charts
  • Deep defense strategies
  • Innovation aspects
  • Total Product Lifecycle with some tool stack.

Prerequisites and Target Audience

What will students need to know or do before starting this course?

  • Familiarity with healthcare processes and systems is a plus but not compulsory
     

Who should take this course? Who should not?

  • Business leaders.
  • Program managers 
  • Technologists
  • Students
     
          

Curriculum

Module 1: Cyber Security – Key Tenets

Lecture 1 Introduction
Lecture 2 Focus on the Inventory
Lecture 3 Risk Prioritization Lifecycle
Lecture 4 Risk Prioritization Lifecycle Process - Technology Team Enablement
Lecture 5 Risk Prioritization Lifecycle Continued
Lecture 6 Monitoring of the Devices Application
Lecture 7 Advanced Defense
Lecture 8 Secure SDLC & Testing
Lecture 9 Secure SDLC & Testing - How Does it Work

Module 2: Cyber Security Strategy

Lecture 10 Intro to Cyber Security Strategy
Lecture 11 Holistic Cybersecurity Part 1
Lecture 12 Holistic Cybersecurity Part 2
Lecture 13 Holistic Cybersecurity Part 3

Module 3: Connected Medical Devices and Wearables

Lecture 14 Intro
Lecture 15 Cybersecurity Issues
Lecture 16 Cybersecurity Issues
Lecture 17 Regulations

Module 4: Incident Reporting and Sharing

Lecture 18 What is Incident Reporting
Lecture 19 Incident Reporting and Sharing

Module 5: Recommendations for Better Safety, Security, and effectiveness in Networked Devices

Lecture 20 Recommendations

Module 6: Best Practices and Cybersecurity in Connected Devices

Lecture 21 Adoption of Cybersecurity
Lecture 22 Adoption of Cyber Security Continued

Module 7: Driving the Process of Improving the IoT Through Collaboration

Lecture 23 Driving the Process of Improving Cybersecurity in the IoT

Module 8: Total Product Lifecycle Framework

Lecture 24 Premarket and Post market Cybersecurity Approach

Module 9: Innovation

Lecture 25 Will the Expected Benefits of the IoT exceed the Cybersecurity Risks?
Quiz 1 Cyber Security for Connected Healthcare End of Course Quiz