HIPAA Compliance Training

HIPAA training to help your employees recognize the significance of the sensitive health information they handle, how to protect and secure it, and how to make sure your organization doesn’t become the next victim of a HIPAA violation or larger data breach.
HIPAA Act document representing HIPAA training

Course Description

Is your organization entrusted with protecting, processing or securing the personal health information of the public? If so, you should know that a HIPAA breach can cost upwards from $15 million per breach – from $100 to $50,000 per record. Handling public health information is a significant responsibility, so HIPPA compliance training is essential for your employees. 

GLS’s HIPAA training course is designed to fit snugly into an organization’s plan for HIPAA compliance. It not only explains what HIPAA is but also the rationale behind the Act and the action steps that an average employee can take to help improve the security of customer/patient/employee data.

This HIPAA training course:

employee working with health records on computer

Course Curriculum

Module 1: HIPAA Overview 
Module 2: Recognizing Protected Health Information (PHI)
Module 3: Reviewing the Rules
Module 4: Protecting Privacy
Module 5: Security Safeguards
Module 6: Conclusion

Upon Completion, Learners Will Be Able To

Request a Demo or Quote

First Name
*
Last Name
*
Job Title
Email Address
*
Phone Number
*
Organization Name
*
Organization Size
Product/Solution Area of Interest

What is HIPAA?

The Health Insurance Portability and Accountability Act, or HIPAA, was enacted by the U.S. government in 1996 to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The Act ensures that individuals’ sensitive information is protected while allowing the flow of health information needed to provide high-quality care. HIPAA laws apply to healthcare providers, health plans, healthcare clearinghouses and related business associates, as well as employers who sponsor or co-sponsor employee health insurance plans.

Department of health and human services logo
GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Clickjacking
Directory Traversal
DOM XSS
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?