A customizable HIPAA Security Awareness Training course to guide employees in safeguarding Protected Health Information (PHI).

Audience: All/ End-Users, Learning time: 25-30minutes

Customize this course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

Learn more

Course data

The HIPAA Security Awareness Training course provides an understanding of HIPAA regulations, focusing on their applications at work. The course also helps employees understand the importance of safeguarding Protected Health Information (PHI) through real-world case studies. In addition, best practices for protecting PHI and reporting security breaches are covered.

Section 1: HIPAA Security Breaches – Real Case Studie
This section covers real-world case studies of breaches related to the HIPAA Security and Privacy Rule. Further, these case studies help employees understand the importance of safeguarding Protected Health Information (PHI) and the potential consequences of non-compliance.

Section 2: Introduction to Protected Healthcare Information 

Section 2: Introduction to HIPAA
This section provides employees with an introduction to HIPAA, focusing on its key components. They will understand the fundamentals of HIPAA, including the definition of Protected Health Information (PHI), Electronic Protected Health Information (ePHI), their examples, the HIPAA Security & Privacy Rule, and the significance of safeguarding PHI.

  • What is HIPAA?
  • · HIPAA Security & Privacy Rule
  • · What is PHI?
  • · Examples of PHI
  • · What is ePHI?
  • · Why is Protecting PHI Important
Section 2: Introduction to HIPAA

Section 3: Protecting ePHI
This section consists of six scenario-based challenges based on the best practices in protecting ePHI.

  • Safeguarding ePHI while Working Remotely
  • · Securing Access Credentials to Protect ePHI
  • · Safe Internet Browsing Practices to Protect ePHI
  • · Securing ePHI while Using Emails and Collaboration Platforms
  • · Protecting ePHI while Using AI Apps
  • · Secure Storage and Transfer of ePH
Section 3: Cyberattack against PHI 

Section 4: Reporting Security Breaches 
This section includes examples of HIPAA security breaches and guides employees on effectively reporting such incidents.

  • What is a Security Breach?
  • · Examples of Security Breaches
  • · How to Report a Security Breach
Section 1: Healthcare Threat Landscape

Section 5: Summary and Assessment
This section wraps up the key points covered in the course, followed by an assessment

  • Summary
  • Assessment
Section 5: Summary and Assessment

Have more questions?

Get your questions answered by our team of security awareness experts.

Pick a convenient slot from our calendar.

Image representing schedule a demo