COURSE DESCRIPTION
Strategic plan design and implementation of information system in healthcare using technical IT and mechanisms based on the principles of Information Security including data confidentiality, data integrity, and availability. This course focuses on applying relevant technologies to secure the electronic protected health information (e-PHI) in healthcare information system at the enterprise level of organization such as security solution, data encryption, hashing, system redundancy, load balancing, failover, backup, restoration, and disaster recovery. Moreover, the course will cover the basic concept of RDBMS and database design including the fundamental of SQL Commands practicing.
Prerequisites
Graduate in Bachelor degree in Health sciences, computer sciences, and ICT
LO : Learning Outcome
LO1: Define Information system and technology in public health and healthcare organization
LO2: Describe strategic planning, analysis, design, implementation, maintenance and monitoring of health information system.
LO3: Describe basic concepts of programming language and its methodologies.
LO4: Demonstrate basic skills of design and implementation as well as capabilities for working in various aspects of IT fields.
LO5: Demonstrate skills of database design and manipulation including administration using DBMS tools and SQL languages.
Course Features
- Lectures 27
- Quizzes 4
- Duration 30 hours
- Skill level All levels
- Language English
- Students 76
- Certificate No
- Assessments Yes
Curriculum
- 4 Sections
- 27 Lessons
- 8 Weeks
- Week 1: Introduction e-PHI and CIA11
- 2.1Course Overview
- 2.2Course Syllabus
- 2.3Weekly activities
- 2.4Introduction to e-PHI and CIA
- 2.5Reading Assignment 1.1: e-PHI and CIA
- 2.6Confidentiality
- 2.7Reading Assignment 1.2 : Confidentiality
- 2.8Discussion Board of Week #1
- 2.9Quiz of Week 1 Introduction e-PHI and CIA60 Minutes20 Questions
- 2.10The Assignment of Week #1 Introduction to e-PHI and CIA
- 2.11Course Evaluation Week 1
- Week 2: Data Integrity10
- 3.1Weekly activities
- 3.2Data Integrity
- 3.3Reading Assignment 2.1 : Integrity
- 3.4System Availability Techniques and Mechanism I (High Availability and RAID system)
- 3.5System Availability Techniques and Mechanism II (Load Balancing and Failover)
- 3.6Reading Assignment 2.2 : System Availability Techniques and Mechanism
- 3.7Discussion Board of Week #2
- 3.8Assignment of Week #2
- 3.9Quiz of Week #21 Hours20 Questions
- 3.10Course Evaluation Week 2
- Week 3: System Availability (Cont.)8
- 4.1Weekly activities
- 4.2System Availability Techniques and Mechanism III (Data backup and recovery)
- 4.3Example of IT Infrastructure Servers, Application, Security Solution, etc.
- 4.4Reading Assignment 3.1 : Disaster Recovery Plan (Best Practices)
- 4.5Discussion Board of Week #3
- 4.6Quiz of Week #31 Hours20 Questions
- 4.7Assignment of Week #3
- 4.8Course Evaluation Week 3
- Week 4: Network Segmentation and Guidance for Server Implementation in Security Zones5