HITRUST Part II - Implementation

Course ID: CO00602

Objective

The HITRUST security maturity evaluation and points process awards healthcare providers a HITRUST certification. This certification verifies that the company followed the Common Security Framework (CSF). The latest version, CSF 9.3, consolidates multiple regulations. The HITRUST Foundation Part II course is detailed guidance for the organization in the right scoping, selection of risk factor-based controls level, correctly applying HITRUST scoring, planning for certification, and certification. 

The HITRUST Implementation Part II course is designed to provide the information to the management decision making and cost management by right-sizing the project and right implementation. The course is designed to ensure employees understand the importance of HITRUST and fulfill the HITRUST training requirements. The series of HITRUST courses are useful for compliance, cybersecurity, information technology, and audit professionals to enhance security and compliance skills. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.

Price: $31.98 $74.99
Add to Cart For Corporate
  • Category: Compliance
  • Duration: 60 Mins
  • CPE: 1 HR
  • Course Type: e-Learning

What you will learn:

    • Understand what is HITRUST
    • Learn about the HITRUST CSF components
    • Learn how to calculate HITRUST scores
    • Understand the steps in certification plan and plan considerations
    • Understand HITRUST Implementation Planning use case and learn to implement
    • Learn to calculate risk rating as per HITRUST
    • Understand the corrective action plan (CAP) and documentation
    • Learn how to calculate the CAP risk rating and prioritization

Breach Notification Part I - Awareness

  • Course ID: CS00301
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

  • Course ID: CS00302
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

  • Course ID: DR00101
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan

Business Continuity & Disaster Recovery (BCP / DR) Part II - Awareness

  • Course ID: DR00102
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Business Continuity Plan (BCP) vs Disaster Recovery (DR)
  • Disaster Recovery Architecture
  • Drivers for DR Architecture
  • Architectural Elements
  • Disaster Recovery Plan
  • Backup Strategy
  • Disaster Recovery Emergency Procedures

Business Continuity & Disaster Recovery (BCP / DR) Part III

  • Course ID: DR00103
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • BCP DR Frameworks and Standards
  • What is the Framework?
  • What are the different BCP frameworks?
  • Frameworks Explained
  • ISO 22301
  • National Fire Protection Association (NFPA) 1600
  • FFIEC Business Continuity
  • NIST 800-34
  • ISO 27301
  • BCP
  • Good Practice Guidelines (GPG)
  • Ready Gov
  • COBIT

Business Continuity & Disaster Recovery (BCP / DR) Part IV

  • Course ID: DR00104
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Learn about what is a backup and recovery strategy
  • Understand and learn to apply best practices for backup
  • Learn eight different backup methods and backup hardware
  • Understand what recovery is and learn about methods of recovery
  • Learn about the challenges with recovery process and prioritization

Business Continuity & Disaster Recovery (BCP / DR) Part V

  • Course ID: DR00105
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

·      What is cloud-based disaster recovery andits key features?

·      The “Recover from the Cloud“ vs “RecoverRight in the Cloud”

·      The different cloud-based recovery options:

·      Bare Metal Recovery (BMR)

·      Physical-to-virtual (P2V) Recovery

·      Virtual-to-virtual (V2V) Recovery

·      The benefits of cloud-based recovery

·      To build a cloud disaster recovery plan

 

Cloud Security Awareness

  • Course ID: CS00102
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Cloud Security
  • Cloud Basics - Cloud Concepts, Architecture and Design
  • Cloud Service Models
  • Cloud Risk Landscape
  • Cloud Security Domains
  • Cloud Data Security
  • Cloud and AWS
  • Cloud and Azure
  • Cloud Application Security Basics

Cybersecurity Maturity Model Certification (CMMC) - Part I

  • Course ID: CS00801
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Understand the need for Cybersecurity Maturity Model Certification 

  • Why the third-party contractors are the weakest cyber link?

  • Interpret the NIST SP 800-171 Controls 

  • Understand Federal Acquisition Regulation (FAR) Clause 52.204.21 for protecting Federal Contract Information (FCI)

  • Understand Defense Federal Acquisition Regulation Supplement (DFARS) Clause 252.204-7012 for protecting Controlled Unclassified Information (CUI)

  • Understand NIST SP 800-171 Protecting Controlled Unclassified Information in Non-Federal Systems and Organizations

  • Learn about the essential differences between CMMC vs. NIST 800-171

  • Learn how CMMC Model Works: Domains, Capabilities, Practices, and Processes

Cybersecurity Maturity Model Certification (CMMC) - Part II

  • Course ID: CS00802
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Learn how CMMC Model Works: Domains, Capabilities, Practices, and Processes

  • Understand the CMMC five Process Maturity levels and five Technical Practices levels

  • Understand Federal Acquisition Regulation (FAR) Clause 52.204.21 for protecting Federal Contract Information (FCI)

  • Learn about the control compliance and certification requirements for level 1 to level 5

  • Learn about the CMMC capabilities

  • Understand the 14 points of NIST 800-171 and create security protocols for 14 key areas. 

  • Learn about the CMMC Levels 2 and 3 Practices Beyond NIST 800-171

  • Learn about the implementation challenges

  • Learn about becoming a CMMC Certified Supplier

  • Understand the CMMC Scoring methodology

  • Knowledge Check

Need us to design a course for you? Contact Now
Copyrights © 2020 All Rights Reserved by SecuRetain.