In today’s digital healthcare ecosystem, patient data represents both an invaluable asset for advancing care and a prime target for malicious actors. Electronic health records (EHRs), connected medical devices, telemedicine platforms, artificial intelligence tools, and third-party vendor relationships all contribute to an increasingly complex risk environment. This course, “Healthcare Data Security & Risk Management,” introduces and equips healthcare IT professionals, compliance officers, risk managers, and healthcare administrators with the knowledge and skills to analyze, evaluate, and strengthen their organization’s data protection and risk management strategies.

Healthcare Data Security & Risk Management


位教师:Joy Ardanaz
访问权限由 New York State Department of Labor 提供
您将学到什么
Analyze healthcare data protection requirements and evaluate compliance strategies.
Evaluate healthcare cybersecurity threats and design effective security controls.
Apply risk assessment methodologies to healthcare IT environments and develop comprehensive risk management plans.
Create and evaluate incident response and breach management strategies for healthcare organizations.
您将获得的技能
- Data Security
- Threat Modeling
- Continuous Monitoring
- ISO/IEC 27001
- Regulatory Compliance
- Data Management
- Risk Management
- Health Insurance Portability And Accountability Act (HIPAA) Compliance
- Cybersecurity
- Security Controls
- Medical Privacy
- Health Information Management
- Compliance Management
- Threat Management
- Computer Security Incident Management
- Incident Response
- Cyber Risk
- Personally Identifiable Information
- 技能部分已折叠。显示 7 项技能,共 18 项。
要了解的详细信息

添加到您的领英档案
4 项作业
January 2026
了解顶级公司的员工如何掌握热门技能

该课程共有6个模块
In this course, you’ll learn how to protect sensitive patient data across modern healthcare systems using clear, practical methods. You’ll break down regulatory requirements, analyze real attack scenarios, and apply hands-on techniques to secure EHRs, medical devices, telemedicine platforms, and cloud-based environments. Through step-by-step labs and case studies, you’ll assess threats, build risk-management plans, and practice incident response approaches grounded in HIPAA and industry frameworks. By the end, you’ll be able to strengthen your organization’s security posture, manage healthcare risks with confidence, and respond effectively to breaches in today’s high-risk healthcare landscape.
涵盖的内容
1个视频1篇阅读材料
In this module, you’ll learn how healthcare data is classified, governed, and protected under strict regulations like HIPAA. We’ll explore why PHI and ePHI are prime targets, how the Security and Privacy Rules shape daily operations, and what “minimum necessary” looks like in real workflows. You’ll also walk through data lifecycle management, social engineering risks, and practical ways to build stronger organizational vigilance. By the end, you’ll understand the core compliance and governance principles that anchor every effective healthcare security strategy.
涵盖的内容
10个视频2篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, you’ll examine the evolving threats that put healthcare organizations at constant risk. We’ll dig into ransomware, insider threats, IoMT vulnerabilities, and the emerging dangers tied to AI-driven systems—showing how attackers exploit clinical and operational environments. You’ll also explore essential security controls like MFA, least privilege, segmentation, and Zero Trust, all applied in healthcare-specific scenarios. By the end, you’ll be able to evaluate threats clearly and design practical defenses that balance cybersecurity with patient safety.
涵盖的内容
10个视频2篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, you’ll learn how to assess and manage cyber risks using frameworks such as NIST CSF, HITRUST, and ISO 27001. We’ll walk through how to build risk matrices, evaluate vulnerabilities, and analyze vendor and third-party exposures that can compromise healthcare systems. You’ll also explore methods for continuous monitoring, from KPIs and KRIs to dashboards that support executive decision-making. By the end, you’ll be able to develop structured, defensible risk management plans tailored to healthcare environments.
涵盖的内容
10个视频2篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, you’ll learn how healthcare organizations prepare for, detect, and respond to cyber incidents and data breaches. We’ll break down the components of an IR plan, explore digital forensics techniques, and walk through recovery strategies that minimize downtime without compromising patient care. You’ll also examine HIPAA breach notification rules, legal considerations, and real-world case studies that show how breaches unfold. By the end, you’ll be able to design and evaluate incident response and breach management plans that meet regulatory expectations and protect patient trust.
涵盖的内容
10个视频2篇阅读材料1个作业1次同伴评审1个讨论话题
In this wrap-up module, you’ll put all your learning into action through a hands-on healthcare security simulation. You’ll assess risks, review a vendor profile, draft an incident response plan, and determine HIPAA breach notification steps. By completing practical artifacts like a risk register and IR outline, you’ll finish the course with real-world skills you can apply immediately in healthcare cybersecurity.
涵盖的内容
1个视频1次同伴评审
提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.



