CompTIA Healthcare IT Technician Certification
ILT, WEBEX, VIRTUAL
The CompTIA Healthcare IT Technician will provide students with the knowledge and skills required to implement, deploy, and support Health IT systems in various clinical settings. Successful candidates will understand regulatory requirements, healthcare terminology/acronyms, and possess a basic understanding of practice workflow while adhering to code of conduct policies and security best practices.
Who Should Attend
Upon successful completion of this course, students will be able to:
- define and describe concepts and terminology that are fundamental to your understanding of the use of IT in a healthcare environment.
- describe the medical environment including its organization, stakeholders, and the most significant technologies.
- leverage core medical concepts to describe the use of IT in the medical workplace.
- describe the essential elements of computing including hardware, software, networking, and change control.
- provide IT support and solve IT problems in the medical workplace.
- integrate security best practices into your daily healthcare IT workflow.
The typical student for this course is an experienced IT professional in a role such as desktop support technician, network administrator, systems administrator, or database administrator, who is looking for opportunities within the healthcare industry or may already be working within the healthcare industry. Such students want to prove through certification that they have the knowledge and skills required to implement, deploy, and support healthcare IT systems.
Students should have experience and comfort with the following concepts and tasks:
- Computer and networking terminology.
- The functional components of a computer and a network (both wired and wireless).
- Installing and troubleshooting Microsoft WindowsXP and Windows 7.
- Installing and troubleshooting software, hardware, and networking components.
- Working with computer peripherals.
- Setting up, maintaining, and troubleshooting mobile devices.
- Computer and network security best practices.
Module 1: Regulatory Requirements
- Identify standard agencies, laws, and regulations.
- Explain and classify HIPAA controls and compliance issues.
- Summarize regulatory rules of record retention, disposal, and archiving.
- Explain and interpret legal best practices, requirements, and documentation.
Module 2: Organizational Behavior
- Use best practices for handling PHI in the workplace.
- Identify EHR/EMR access roles and responsibilities.
- Apply proper communication methods in the workplace.
- Identify organizational structures and different methods of operation.
- Given a scenario, execute daily activities while following a code of conduct.
Module 3: IT Operations
- Identify commonly used IT terms and technologies.
- Demonstrate the ability to setup a basic PC workstation within an EHR/EMR environment.
- Given a scenario, troubleshoot and solve common PC problems.
- Install and configure hardware drivers and devices.
- Compare and contrast basic client networks and tools.
- Setup basic network devices and apply basic configuration settings.
- Given a scenario, troubleshoot and solve common network problems.
- Explain the features of different backup configurations and the associated maintenance practices.
- Classify different server types, environments, features, and limitations.
- Compare and contrast EHR/EMR technologies and how each is implemented.
Module 4: Medical Business Operations
- Identify commonly used medical terms and devices.
- Explain aspects of a typical clinical environment.
- Identify and label different components of medical interfaces.
- Determine common interface problems and escalate when necessary.
- Explain the basics of document imaging.
- Given a scenario, determine common clinical software problems.
- Describe change control best practices and its system-wide effects.
Module 5: Security
- Explain physical security controls.
- Summarize the different encryption types and when each is used.
- Apply best practices when creating and communicating passwords.
- Classify permission levels based on roles.
- Identify different remote access methods and security controls.
- Recognize wireless security protocols and best practices.
- Implement best practices in secure disposal of electronic or physical PHI.
- Implement backup procedures based on disaster recovery policies.
- Identify common security risks and their prevention methods.