00:00:00 - Well, hello and welcome to the
CompTIA health care IT
00:00:04 - technician Nugget from
00:00:06 - My name is Michael Shannon.
00:00:08 - And I am so excited to be with
you this entire Nugget series
00:00:12 - to help you not only pass that
certification exam for health
00:00:16 - care IT technician, but also
to help prepare you for a
00:00:20 - exciting and profitable career
in IT, specifically in the
00:00:25 - health care industry.
00:00:27 - Now, you can see down here I've
got some certifications.
00:00:29 - I'm a CCNP Security.
00:00:31 - So that's a Cisco professional
00:00:34 - But I also have certifications
in Juniper and do Juniper
00:00:38 - security as well.
00:00:39 - I have the CISSP
00:00:42 - And I have a specialization
in HIPAA, CHSS.
00:00:47 - That's the certified HIPAA
00:00:49 - As a matter of fact, I was one
of the first groups of people,
00:00:52 - the actual first class, to
receive that specialization
00:00:56 - way back when HIPAA Academy
was first giving out
00:01:00 - certifications, when HIPAA
was just getting started.
00:01:03 - So I've been doing this for a
long time, working with IT
00:01:07 - with health care and the
00:01:09 - And let me tell you, that
was a tough exam.
00:01:11 - Only half of us-- we all went
to Iowa to study and test
00:01:15 - under Ali Pabrai, who is the
head of HIPAA Academy and the
00:01:18 - one that's really on the
forefront of HIPAA education.
00:01:21 - We studied with him.
00:01:22 - And I only half of us
passed the exam.
00:01:24 - So I was very fortunate.
00:01:26 - I also got the Certified HIPAA
00:01:28 - the CHP, from HIPAA Academy.
00:01:31 - Now, I've got to tell you, I
have been waiting a long time
00:01:35 - to have just this kind of
certification that combines IT
00:01:39 - and security and health care.
00:01:41 - In my opinion, it's been
too long coming.
00:01:44 - But thankfully, CompTIA, that
non-profit organization and
00:01:49 - advocate for the IT industry
with 25 years in the industry,
00:01:54 - has provided this IT
00:01:57 - I'm really excited about it.
00:01:59 - Now, here's one of the
00:02:00 - about this Nugget series.
00:02:02 - I will be your primary trainer
and instructor and your guide
00:02:06 - throughout this journey
through health care IT
00:02:09 - technician.
00:02:10 - But I have, as my consultant
and my technical reviewer--
00:02:14 - and from time to time,
we're going to
00:02:15 - hear from this person--
00:02:17 - Shelly Smith, who has, oh,
I don't know, decades of
00:02:20 - experience in the health care
industry, especially on the
00:02:24 - administrative side
00:02:25 - And she's very well-certified.
00:02:27 - And I have a ton of
confidence in her.
00:02:29 - As a matter of fact, I have 100%
confidence in her and her
00:02:32 - ability to review and to add
input and to provide health
00:02:36 - care insight to me and
to you as well.
00:02:39 - As a matter of fact, I went down
to Austin where Shelly
00:02:42 - is, Austin, Texas, and
interviewed her and got quite
00:02:46 - a few answers and information
from her that I'm going to be
00:02:49 - distributing and interspersing
00:02:51 - entire Nugget series.
00:02:52 - So let's listen to my first
little interview with Shelley,
00:02:55 - as she gave us a little bit
of her background and her
00:02:59 - experience that she's going to
bring to the table in this
00:03:02 - CompTIA health care IT
00:03:05 - OK.
00:03:05 - It's our privilege to have
Shelley Smith here with us
00:03:08 - throughout this Nugget series
as our medical industry
00:03:11 - consultant and technical
00:03:14 - So Shelly, tell us a little
bit about your background.
00:03:17 - And what are you doing
now in the industry?
00:03:20 - Hi, Mike.
00:03:20 - Well, thanks for having me.
00:03:22 - A little bit about
00:03:24 - I have 30 years plus experience
in the health
00:03:26 - information management field.
00:03:28 - I'm an RHIA, a certified
00:03:32 - And I have a certification
in clinical documentation
00:03:35 - improvement.
00:03:37 - The majority of my work has
00:03:40 - I've worked in health
information management for
00:03:42 - large networks of hospitals,
including coding departments,
00:03:46 - risk management, quality
assurance, HIPAA compliance,
00:03:50 - and, most recently, as a
00:03:52 - specialist.
00:03:54 - OK.
00:03:54 - Well, that's just a small
portion of much of the
00:03:57 - interview that we're going to
be listening to throughout
00:03:59 - this Nugget series with Shelly
from time to time.
00:04:01 - And like I said, I have the
utmost confidence in her.
00:04:04 - She is not somebody that I
went out and looked for
00:04:08 - somebody out on the internet
00:04:11 - She is actually my cousin.
00:04:12 - I've known her my entire life.
00:04:14 - And I have total confidence in
her ability to make sure that
00:04:17 - this Nugget is going to be
as good as it can be.
00:04:20 - So we'll be hearing more
from her in the future.
00:04:22 - What I want to do now is I want
to talk more about this
00:04:25 - particular certification and
what are the objectives that
00:04:29 - we need to cover throughout
this entire Nugget series.
00:04:32 - Let's take a look at the domains
of the health care IT
00:04:36 - technician certificate.
00:04:38 - OK.
00:04:39 - To certify as a health care IT
technician, you're going to
00:04:42 - have to master five
00:04:45 - And you can see the bulk of
our exam is going to cover
00:04:49 - domains 3, 4, and 5.
00:04:52 - 13% will be on Regulatory
Requirements, domain 1.
00:04:57 - 15% is domain 2, Organizational
00:05:01 - 26% is going to be
00:05:05 - 25% Medical Business
00:05:09 - And then 21% and will be domain
5, the Security domain.
00:05:15 - And in this CBT Nugget, I will
cover every one of the
00:05:19 - sub-topics.
00:05:20 - And we're going to go through
all these in a second here.
00:05:22 - But I'll make sure that we
have all of these bases
00:05:24 - covered so that you'll be more
than prepared for this exam,
00:05:29 - but more than that, prepared to
get out there in the real
00:05:32 - world and get a job with a
health care organization.
00:05:36 - Now, here's our exam.
00:05:37 - It is CompTIA exam HIT-001.
00:05:42 - On the exam, you're going
to have 75 questions.
00:05:45 - And you've got one hour to
pass those questions.
00:05:49 - It's a multiple choice type
of test, multiple choice,
00:05:53 - multiple answer, or
00:05:55 - It is vendor neutral.
00:05:57 - So there will not be any
specific questions on, let's
00:06:01 - say, Microsoft or Linux or Sun
Solaris Blade servers or
00:06:07 - particular security
00:06:09 - However, throughout this Nugget
series, I will be using
00:06:13 - actual equipment.
00:06:14 - I'll be doing actual
demonstrations to teach you
00:06:17 - the concepts and the
principles and the
00:06:19 - methodologies.
00:06:20 - Will you have to replicate
those on the exam?
00:06:23 - No.
00:06:23 - But it's a great way for you to
learn how to implement IT
00:06:27 - operations, how to implement
00:06:30 - And so we'll have some
00:06:33 - And it will also help you,
because chances are most shops
00:06:37 - you're going to be dealing with
are going to be working
00:06:38 - with Microsoft, or Cisco,
00:06:42 - So you'd be well prepared for
some real-world scenarios.
00:06:45 - Now, to pass this exam, on a
scale of 1 to 900, you have to
00:06:50 - get a 650 out of 900
to pass the exam.
00:06:54 - And the exam is administered
in English only.
00:06:57 - So that's the HIT-001 exam.
00:07:00 - Let's break down these five
different domains and the
00:07:03 - subtopics that we're going to
be discovering and learning
00:07:07 - within each of those
00:07:10 - OK.
00:07:10 - Our first two domains,
Regulatory Requirements and
00:07:13 - Organizational Behavior, will
make up about 28% of the exam.
00:07:17 - And we can see here, oh, I
don't know, about nine
00:07:20 - objectives of those
first two domains.
00:07:23 - First off, we'll be talking
about identifying standard
00:07:27 - agencies, like HHS
and ONC and CMS.
00:07:31 - We'll talk about different laws,
like HIPAA and high tech
00:07:35 - and different regulations.
00:07:36 - We'll even mention one of my
favorite organizations, the
00:07:38 - NIST or the NIST.
00:07:40 - Then we'll explain and classify
00:07:44 - controls and HIPAA compliance
00:07:47 - We'll define PHI.
00:07:49 - We'll look at what a
covered entity is.
00:07:51 - We'll look at basically some
of the security violations,
00:07:56 - fines, and requirements.
00:07:57 - We even have an entire domain
here on security.
00:08:01 - We won't steal too much
from that domain.
00:08:04 - But we'll talk about other
definitions as well that fall
00:08:07 - under HIPAA controls
00:08:09 - Then we'll summarize regulatory
rules of things
00:08:13 - like retention of records,
disposal of records, and
00:08:16 - archiving of records.
00:08:18 - How long are we going
to store them?
00:08:20 - Different types of records--
00:08:22 - public records, private records,
00:08:25 - And also, ways of disposing
of our records--
00:08:29 - destruction or disposition
00:08:32 - Then the final piece of domain
1 is to explain and interpret
00:08:37 - in a fundamental, rudimentary
way legal best practices,
00:08:41 - requirements, and
00:08:44 - We'll talk about things like
business associate agreements,
00:08:47 - service level agreements,
waivers of liability, some
00:08:51 - things like that.
00:08:52 - Then we'll get into domain 2,
00:08:56 - We'll be using best practices
for handling PHI.
00:09:00 - Maybe you're wondering
what PHI stands for.
00:09:03 - PHI stands for personal health
information or, more recently,
00:09:09 - protected health information.
00:09:12 - So we'll look at best
00:09:13 - where you're going to place
your PC, using privacy
00:09:17 - screens, using screensavers,
locking out of sessions,
00:09:22 - things like that.
00:09:23 - We'll identify EHR and
EMR access roles and
00:09:28 - responsibilities.
00:09:30 - EHR stands for electronic
00:09:33 - And EMR stands for electronic
00:09:38 - We'll look at various medical
roles, like an RN and an MD
00:09:41 - and a PA, those people you deal
with quite often, office
00:09:45 - managers, staff.
00:09:46 - We'll talk about different
00:09:48 - that you might have.
00:09:50 - We'll look at access for
business associates and
00:09:52 - contractors.
00:09:54 - And we'll look at access
00:09:56 - In 2.3, we'll be looking
at applying the proper
00:09:59 - communication methods
in the workplace.
00:10:03 - How do we deal with email and
instant messaging or faxes?
00:10:08 - What kind of phone security
do we have?
00:10:10 - Are we going to use secure
file transfer protocol?
00:10:13 - Those kind of things,
00:10:15 - In 2.4, we'll look at
organizational structures and
00:10:18 - different methods or different
modes of operation--
00:10:22 - organizational structures like
hospitals, nursing homes, home
00:10:25 - health care, surgical centers,
labs, those types of things.
00:10:29 - And also at different methods,
differences in the scope of
00:10:32 - their work, the resource
availability, and how formal
00:10:37 - are your procedures.
00:10:38 - For example, they may be less
formal in a hospice
00:10:41 - environment but much more
formal in a hospital.
00:10:45 - Less formal in a private
practice but more formal in a
00:10:48 - surgical center.
00:10:50 - And then 2.5 is based on
different scenarios and
00:10:53 - situations.
00:10:54 - We want to look at daily
activities that also follow a
00:10:58 - code of conduct--
00:10:59 - operating in a professional
fashion, standard operating
00:11:03 - procedures in different areas
of the facility, like the
00:11:07 - examination room versus the
emergency room versus the
00:11:11 - recovery room, very
00:11:13 - Look at adapting our social
behavior based on environment
00:11:17 - sensitivity.
00:11:18 - For example, a surgical center
that might be doing plastic
00:11:22 - surgery, for example, or
reconstructive surgery, you
00:11:25 - may need to adapt your social
behavior, because it's a much
00:11:28 - more sensitive environment then
maybe just going into a
00:11:31 - normal private practice.
00:11:33 - Also things like using proper
sanitation and conforming to
00:11:38 - management directives.
00:11:40 - So those are our first two
domains, a lot of things to
00:11:43 - learn, a lot of things
00:11:44 - And that leads this into our
third domain, IT Operations.
00:11:49 - Now, the IT operations domain is
the kind of thing you would
00:11:53 - find on the CompTIA A+ and
the CompTIA Network+
00:11:59 - certification path.
00:12:00 - So if you're somebody who
already has A+ knowledge and
00:12:04 - Network+ knowledge, you might
be able to deprecate your
00:12:09 - study time in these nuggets,
maybe just focusing on the
00:12:14 - things that are specific
to health care--
00:12:16 - EHR and EMR technologies.
00:12:19 - It just depends.
00:12:20 - We're going to be really
focusing all of this stuff on
00:12:23 - health care and medical
00:12:26 - So it's going to be very
specific to those
00:12:28 - environments.
00:12:28 - But we'll look at different
00:12:32 - technologies--
00:12:33 - the TCP/IP stack and application
00:12:37 - like DNS and DHCP.
00:12:39 - We'll talk about the importance
of 802.11x, 11b,
00:12:44 - 11g, 11n, which is our wireless
environment, and then
00:12:48 - maybe using things like remote
desktop protocol and Citrix.
00:12:51 - We'll talk about different types
of devices as well and
00:12:53 - some major industry terms
that we have to know.
00:12:56 - And also, we'll familiarize
ourselves with some languages,
00:12:59 - things that are very common--
00:13:01 - XML, HTML, Flash, maybe a
little bit of database
00:13:05 - language as well.
00:13:06 - We need to be able to
demonstrate the ability to set
00:13:08 - up a basic PC in our EHR
or EMR environment.
00:13:13 - And so we will make sure
that we can do that.
00:13:15 - Obviously, having an A+
background would be
00:13:19 - beneficial to you.
00:13:19 - And CompTIA does recommend that
you have A+ knowledge
00:13:25 - before you come into it.
00:13:26 - It's not a prerequisite.
00:13:27 - But knowing how to solve a
simple PC problems, like how
00:13:31 - to deal with a mouse drivers
and how to troubleshoot
00:13:34 - printers and power supplies
and cabling, those things
00:13:38 - would help.
00:13:39 - But again, I'm going to cover
those things in this Nugget.
00:13:41 - So if you don't have A+
knowledge, that's OK.
00:13:44 - You're in the right place.
00:13:45 - That's why we're here, right?
00:13:46 - We'll also talk about the
importance of having software
00:13:48 - patches and updates and service
packs and hot fixes
00:13:51 - and the importance
00:13:53 - We'll look at installing and
configuring hardware drivers
00:13:57 - and devices.
00:13:58 - We'll contrast and compare
00:14:01 - networks and tools.
00:14:02 - And like I said, we'll be going
through a wide variety
00:14:05 - of different devices here
in my home lab to
00:14:07 - help us learn that.
00:14:09 - We'll look at applying basic
00:14:12 - How do you set up your wireless
router, for example?
00:14:14 - And we'll go ahead.
00:14:15 - And we'll do that here.
00:14:16 - I'll bring in a Cisco Linksys
00:14:20 - And we'll go ahead and set it
up like we would for a small
00:14:24 - private practice.
00:14:25 - We'll look at some of these
features that we need to
00:14:27 - configure on our router,
like DHCP for example.
00:14:30 - We want to look troubleshooting
00:14:32 - problems, like things with
cabling, power problems, the
00:14:36 - right IP addressing settings,
things like that, dealing with
00:14:39 - service providers.
00:14:41 - We'll talk about backups.
00:14:42 - That's important.
00:14:44 - Backup configurations.
00:14:45 - And we'll look at some different
solutions we have,
00:14:47 - different types of backup, and
different software solutions
00:14:50 - that you might want to use from
a practical standpoint in
00:14:53 - your environment.
00:14:54 - We'll classify different types
of servers, different
00:14:57 - environments, as well as some
of the pros and cons.
00:15:00 - And like I said, we'll compare
and contrast EHR and EMR
00:15:04 - technologies and how they're
implemented, like ASP and
00:15:07 - cloud services versus a
locally-hosted client server
00:15:10 - environment.
00:15:12 - Do we want to use just
an ordinary browser?
00:15:15 - Or do we want to have our own
kind of proprietary front-end.
00:15:19 - What about some hardware
00:15:21 - So those are our third domain,
which is IT Operations.
00:15:26 - And from a practical standpoint,
you may want to
00:15:28 - consider, going out there on the
job market in the health
00:15:31 - care environment, if you could
complement this IT health care
00:15:36 - CompTIA certification
with A+ and Network+
00:15:40 - and maybe even Security+.
00:15:42 - That would be quite a tool
kit, quite a resume of
00:15:46 - certifications to walk into when
you're trying to get that
00:15:49 - first IT job in health care or
maybe trying to move up in the
00:15:53 - health care IT industry.
00:15:55 - Something to think about.
00:15:57 - Here in module 4, we're going
to look at Medical Business
00:16:00 - Operations.
00:16:00 - And this is where I'm really
going to rely upon the
00:16:04 - expertise in this subject matter
expert, Shelly Smith,
00:16:07 - who I introduced you to a little
bit earlier in this
00:16:09 - introductory Nugget.
00:16:10 - And she'll keep me honest,
because I haven't dealt with
00:16:14 - everything that we're looking
at here in these different
00:16:17 - medical business operations.
00:16:19 - So she'll make sure that I have
all the bases covered as
00:16:22 - we talk about different
interfaces, medical terms and
00:16:24 - devices, interfaces like HL7,
e-Prescribing, E/M codes,
00:16:30 - those kind of things, different
00:16:32 - portable x-ray machines,
00:16:36 - those kind of things.
00:16:37 - We'll talk about clinical
software and modules and some
00:16:41 - basic clinical terms, like
imaging, STAT, which I've got
00:16:47 - kids in their '20s.
00:16:48 - And they use the word STAT
as in, let's get
00:16:51 - this done in a hurry.
00:16:52 - Let's get it done right away.
00:16:54 - Well, you know what?
00:16:54 - It means the same thing
in the medical field.
00:16:58 - So we'll talk about things like
trauma levels and code
00:17:00 - blue and rapid response.
00:17:02 - We'll talk about different types
of medical departments--
00:17:04 - inpatient versus outpatient.
00:17:07 - We'll look at different
aspects of the typical
00:17:09 - clinical environment, your basic
workflow to register
00:17:13 - patients, consult with patients,
00:17:16 - different clinical processes.
00:17:18 - We'll also see how digital
signatures can come into play
00:17:22 - with that from a security
00:17:24 - I'll just put dig sigs.
00:17:27 - We'll identify and label
different components of
00:17:29 - medical interfaces.
00:17:31 - That will be very important.
00:17:32 - The three main areas here really
are HL7, e-Prescribing,
00:17:37 - and billing.
00:17:37 - So we'll focus on that.
00:17:39 - The same thing with common
interface problems and
00:17:42 - escalation of problems
or to tech support.
00:17:45 - That would be problems and
challenges with HL7, and
00:17:48 - e-prescribing, medical
devices, and billing.
00:17:51 - For example, are we having
communication link problems?
00:17:53 - Are we having network
00:17:55 - We have to make sure that we
have communication flow and a
00:17:58 - constant flow of reliable and
available data when it comes
00:18:01 - to dealing with these things.
00:18:03 - We'll talk about the basics of
document imaging, things that
00:18:06 - you maybe are already
00:18:08 - You know about gif files
and jpg files-- jpegs.
00:18:12 - But what PDFs and TIFFs,
00:18:15 - How are our documents being
represented in image format?
00:18:20 - 4.6 here, different scenarios
here for figuring out
00:18:25 - different clinical software
problems, locating the
00:18:28 - affected modules, escalating
procedures to the proper
00:18:32 - technical support tier.
00:18:34 - We'll also, finally in the
medical business operations
00:18:38 - domain, we'll describe change
control best practices.
00:18:42 - And this is going to be
involving you methodologies
00:18:45 - for change controls.
00:18:46 - Maybe you are implementing an
ITIL implementation, which I
00:18:51 - teach the ITIL version
00:18:54 - You may want to check that
out from CBT Nuggets.
00:18:57 - We'll talk about the procedures
00:19:00 - for updating, for patching, for
upgrading, scheduling, the
00:19:04 - change control mechanisms and
dealing with the governance
00:19:08 - board or steering committees.
00:19:10 - So that's our fourth domain,
Medical Business Operations.
00:19:14 - This is all really interesting
00:19:16 - And you're going to learn so
much about IT and the medical
00:19:19 - business from this CBT Nugget.
00:19:20 - It's really exciting.
00:19:22 - And I am looking
forward to it.
00:19:23 - I've got one more
domain to cover.
00:19:25 - That's really my expertise,
my wheelhouse so to speak.
00:19:28 - And that's security.
00:19:30 - Our final domain, our fifth
domain, is Security.
00:19:32 - And that's so important, because
it's part of the
00:19:34 - entire HIPAA initiative, which
is in tight control of the
00:19:38 - health care industry.
00:19:40 - So we'll start looking at
physical security controls.
00:19:43 - There's three different types
of security controls.
00:19:45 - There's administrative,
which we're going
00:19:47 - to be dealing with.
00:19:48 - There's also logical.
00:19:50 - Those are things like access
controls and file permissions
00:19:54 - and things like that.
00:19:55 - But there's physical
00:19:57 - And that's a really big area,
making sure that you protect
00:19:59 - your servers and your network
hardware and what's being spit
00:20:03 - out on your fax machine or your
printers or your copiers,
00:20:07 - where you're going to
place your devices.
00:20:10 - Are we going to use different
types of authentication
00:20:13 - mechanisms?
00:20:14 - Going beyond just user
names and passwords.
00:20:16 - Are we going to have badges
or key fobs or biometric
00:20:19 - mechanisms?
00:20:20 - What about environmental
00:20:23 - Are we going to have protection
00:20:24 - for our HVAC system?
00:20:25 - Do we have file suppression?
00:20:27 - Do we have a backup generator?
00:20:29 - Those types of things.
00:20:30 - And also, how to physically
00:20:33 - facility with locks--
00:20:35 - door locks, privacy screens,
those types of things.
00:20:37 - We'll also look at
00:20:39 - That's a very important
00:20:41 - Crypto systems are highly
involved for protection of
00:20:44 - confidentiality.
00:20:46 - So we'll look at types
00:20:48 - We'll look at different
communication mechanisms and
00:20:50 - different storage mechanisms and
how we can protect those.
00:20:53 - We'll focus on, specifically,
the dissemination of PHI,
00:20:58 - protected health information.
00:20:59 - Again, remember all of these
things we have to think about
00:21:02 - in the context of health care
and the medical field, very
00:21:07 - specific here.
00:21:08 - Best practices for creating and
00:21:13 - Permission levels based
on a role-based
00:21:15 - access control model.
00:21:17 - Identify different remote
00:21:20 - What about VPNs?
00:21:21 - How do we use those?
00:21:22 - And what types of protocols
are we going to use?
00:21:24 - Are we going to use terminal
emulation to be able to access
00:21:27 - machines remotely?
00:21:29 - We'll also spend quite
a bit of time
00:21:31 - looking on wireless security.
00:21:33 - Now, one of the things here I
need to point out to you is
00:21:36 - wireless is a whole
animal in itself.
00:21:39 - And so I do not have the time
to teach you wireless
00:21:43 - architecture and how wireless
802.11x, x how it works.
00:21:49 - So if you're not familiar with
wireless, you may want to go
00:21:53 - check out one of the
other CBT nuggets.
00:21:55 - For example, let me show you.
00:21:58 - I'm up at the CBT
00:21:59 - I'm looking under the wireless
00:22:02 - I mentioned the CWN.
00:22:04 - I produced all of this
00:22:06 - I'm a wireless specialist.
00:22:07 - I would recommend to you, if
you have no knowledge of
00:22:09 - wireless, because I don't have
the time to teach wireless.
00:22:14 - If you have it in your budget,
or if you have it in your
00:22:17 - licensing, the Wireless# would
be a really good way to go.
00:22:21 - This is kind of the entry-level
00:22:23 - certification.
00:22:24 - So it just talks about an
introduction to the
00:22:27 - characteristics and the
standards, RF fundamentals,
00:22:31 - and other technologies, wireless
client devices, those
00:22:35 - types of things.
00:22:35 - This would be a really
good place to start.
00:22:37 - So I'm not trying to bait
and switch you here or
00:22:40 - do any kind of upsell.
00:22:42 - What I'm saying, however, is
that when I do wireless
00:22:45 - security, I'm going to be
focusing just on the security
00:22:48 - aspect of it.
00:22:49 - And I'm going to work off the
assumption that you have some
00:22:53 - basic fundamental knowledge
of wireless networking.
00:22:56 - So again, in the Network+ you
could get some of that.
00:23:00 - Or you could go do
00:23:02 - Either one of those would
be good additions.
00:23:03 - And the reason why this is
important is because there is
00:23:06 - so much a wireless networking
in hospitals and in clinics
00:23:10 - and in private practice.
00:23:11 - It's such a ubiquitous
technology, because it
00:23:15 - facilitates the use of
hand-held devices and
00:23:18 - proprietary medical devices
and roaming throughout the
00:23:22 - facility and the hospital and
from one building to another
00:23:26 - on the medical campus.
00:23:28 - So it's such an important
00:23:30 - So I don't want you to get
short-changed on that.
00:23:32 - You may want to add that to your
knowledge base to be as
00:23:34 - successful as you can as a
health care IT professional.
00:23:39 - We'll look at best practices in
the secure disposition of
00:23:43 - electronic personal or protected
HI or physical HI,
00:23:49 - things like sanitizing and
shredding and de-gauzing.
00:23:53 - We'll implement backup
00:23:54 - And earlier in this Nugget,
I will give you
00:23:58 - an overview of backup.
00:23:59 - But we'll also go farther
with that and
00:24:01 - look at disaster recovery.
00:24:04 - What are some good methods
of disaster recovery?
00:24:07 - This is such a mission critical
field, such a mission
00:24:10 - critical sector.
00:24:12 - People's lives depend upon us.
00:24:14 - And so this is a really
00:24:16 - area, disaster recovery.
00:24:17 - And we'll finish up this entire
Nugget series identify
00:24:21 - some common security risks
and prevention methods.
00:24:24 - There's some basic things that
are covered in the objectives
00:24:28 - from CompTIA, like social
engineering and the spamming
00:24:32 - and spimming and malware
00:24:35 - But I'll go a little
00:24:37 - And I'll get real, real world
with you and talk about some
00:24:40 - of the most recent things we're
dealing with here from a
00:24:44 - security vulnerability
standpoint, especially as far
00:24:47 - as malware goes.
00:24:48 - So that is pretty much
our five domains.
00:24:51 - Domain 1, Regulatory
Requirements at 13%.
00:24:55 - Domain 2, Organizational
Behavior at 15%.
00:24:58 - IT Operations, domain
3, at 26%.
00:25:03 - Domain 4, Medical Operations
00:25:05 - And finally, a dedicated domain
on security at 21%.
00:25:10 - Well, I'm confident with this
intro Nugget here for the
00:25:13 - CompTIA health care IT
technician Nugget that you've
00:25:17 - got a good idea of what
we're going to do.
00:25:19 - You've got a good idea
of the journey we're
00:25:20 - going to be going on.
00:25:22 - On behalf of myself, Michael
Shannon, and Shelly Smith,
00:25:24 - we're looking forward to helping
you become the most
00:25:27 - successful health care IT
00:25:31 - And so we're ready to dig in,
learning about standard
00:25:36 - agencies, some of the laws we
deal with, and some of the
00:25:38 - regulations.
00:25:39 - And we'll hear from Shelly there
as well really in our
00:25:42 - first content Nugget.
00:25:44 - So I hope this CBT Nugget
was informative for you.
00:25:48 - I want to thank you