MODULE 1 – Self-paced

  • Terminology
  • Intro to healthcare information systems
  • Black and white hat hackers

 

Module 1 will introduce the general concepts of cybersecurity according to this curriculum: The e-learning is weekly 10 hours of activity containing 60-80 slides and 15-20 min of video explanation to give the context for the self-learning for the week’s main topic, additionally, the participants have to read around 40-60 pages to give a deeper understanding on the subject. At the end of every week, there is a short exam with 20-30 questions to assess the participants learning progress. During the live sessions, there will be 2 times 1,5 hours of live lecture/workshop.

During the training, participants will gain knowledge on the following topics:

1. Fundamentals of cybersecurity 

1.1. Introduction

1.2. Development of threats and protection of information systems

1.3. Basic Concepts of cyberspace and Cyber threats

1.4. Content of cybernetics

1.5. Basic concepts of information security

1.6. Computer security models

1.7. Basics of Information Security Management

1.8. Basics of data protection

1.9. Human and psychological aspects of cybersecurity

1.10. Cybersecurity in Healthcare

2. Introduction to applied cybersecurity 

2.1. Architecture of information systems

2.2. Basics of IT and OT networks

2.3. Complexity and interconnection of information systems

2.4. Threats to physical security

2.5. Threats to logical security

2.6. Characteristics of ICT networks, attack and protection

2.7. Computer network vulnerabilities and exploits

2.8. Concepts of secure coding

2.9. Protection measures

2.10. Mobile device and remote working security

2.11. Security issues of IoT

2.12. Security issues of ICS (OT) and Industry 4.0

2.13. Concept of DigitalForensics

3. Security testing 

3.1. Steps to design and build a security test lab

3.2. Different methodologies for security testing of IT systems

3.3. The main types of security testing methods

3.4. Opportunities for testing security devices

3.5. Functional safety testing

3.6. Vulnerability testing

3.7. Penetration testing

3.8. Local and remote vulnerability discovery and exploitation

3.9. Opportunities for testing applications and services

3.10. Security testing of web services and databases

3.11. User safety awareness tests

3.12. Methodology for testing wireless systems

3.13. Mobile device testing

3.14. Embedded system testing

4. Cybersecurity Strategy and Leadership 

4.1. Information Security Management System

4.2. IS strategy

4.3. Input data of IS strategy

4.4. Business and IS strategy

4.5. Risk assessment and risk management

4.6. Strategic planning

4.7. Regulation and standards

4.8. Cost planning

4.9. Organizational Structures

4.10. Information security Measures

4.11. Information Security mindset

4.12. Issues of implementation

4.13. Reporting

4.14. Audit

4.15. Cybersecurity accreditation and certification 

 

MODULE 2 – Self paced & live sessions

  • Standards Certifications
  • Best practices

Module 2 will provide an overview according to these needs:

Need

Learning content

Delivery

Start-ups are unaware of current security standards, cybersecurity frameworks

-Compile an up-to-date security standard list and provide overview

-Overview Security Maturity Level 

 

-Presentation within live session and/or

-Self- paced learning

Start-ups don’t have the resource to take care of cybersec

- Describe the Cybersec Framework and a step-by-step approach according to MVP, seed, Series A etc

- Cybersecurity Frameworks in Healthcare (And How to Adopt Them)

- Cybersecurity Frameworks Explained 

- Step-by-step live Demo of fictional hospital/ provider of medical devices reacting to cyberattacks (1 negative and 1 positive example)

- Self- paced learning

Healthcare has unique cybersec challenges on top of the general ones

- Budget constraints, legacy systems, lack of interoperability, medical equipment diversity, impact of breach – Describe why it is unique

- Present additional risks healthcare facilities face in comparison to other sectors

- Presentation + live demo and/or

- Self-paced learning

 

MODULE 3 – Live sessions

  • Case studies of healthcare challenges.
  • Financial aspects of data breaches and non-compliance
  • Challenges of hospital IT from the practitioner’s point of view
  • Management & leadership aspects
  • Legal implications

 

MODULE 4 – Closure of the programme

As a closure of the programme we will discuss the learning experience, and discuss further professional development opportunities.