1.1 Course Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 7 minutes
Difficulty
Intermediate
Video Transcription
00:00
Hey, everyone, welcome to the Hippo. Introduction course. My name is Ken Underhill, and I will be your instructor for the course.
00:07
So in this video, we're gonna talk about the course. Objectives will also talk about how this course is structured. Some of the other items will be covering, as well as an introduction to myself, your instructor.
00:17
So our main course objectives are to learn what hip it actually is, will learn what the acronym stands for. Worse gonna learn. Like why it's important
00:25
and some of the consequences if we violated Wall. So primarily, talk about the security rule and we'll also touched on it briefly this privacy rule in this course again, this being a more cyber, security focused type of hip. Of course, we're going to be focused on the security rule from it.
00:40
We're also going to get our hands dirty. Well, not really dirty, but we're gonna practice a little bit with the S R. A tools. If you don't know what that is, we'll find out what that is in this course on. It's pretty simple to use. We're gonna go through it step by step,
00:54
so there are no prerequisites for this course I want to stress that so anyone could take this course if you're curious about HIPPA as, like a patient or something if you're a clinician. So if your nurse, doctor et cetera,
01:04
this is a good course for you to kind of make sense of Hippo. If you're still confused on it like I was after many years of hippo training, I was still like, Well, I understand the overall thing, right?
01:14
But I don't understand the intricate details so much
01:17
so hopefully we'll clarify all that stuff in this course.
01:22
Who am I? Well, I I do some work I'm not actually teaching this semester, But I do work a CZ agent professor, I've taught digital forensics. I hold the Masters in cyber Security and Information Assurance, as well as an undergraduate degree information systems in cyber security management. I currently hold to computer related certifications. So by E. C Council. So I hold the
01:42
certified ethical hacker
01:42
certification and the computer hacking forensic investigator certification. So basically, I like to say that I I can hack your computer and then catch myself doing so and obviously I would never hacked your computer
01:53
and then something that a lot of people actually don't know about me. I do as the filming of this video. I do hold on active nursing license. So I was actually a nurse for many years, and I work primarily in pediatrics. If you don't know what that is, that's kids on. And with that, I primarily specialized, like in critical care kids. So
02:12
I worked with kids that had, like, little vent ventilators and tricks
02:15
s so basically they couldn't really breathe properly on. And then it's some other Children with different heart conditions, that sort of stuff. So basically, the kids I work with were critical on dhe. Several times they would do what we call a code where I had to do CPR and resuscitate them. So, um, that's my nursing background, Kind of in a nutshell. I also did, for a little bit of time, cardiology,
02:36
an electrophysiology with adults. But
02:38
kids, they're just love more fun. You know when when they're awake and stuff, they play video games and that sort of stuff. And it's kind of a geek like you know, who doesn't like video games and stuff. So it's just a lot more fun to you know, Hang Hang with kids that are playing video games versus adults that are complaining about the fact they ate a bunch of cheeseburgers and got heart disease. So little die aggression there. But that's it.
02:58
That's my background, is a nurse.
03:00
So what are recovering in this course we'll, of course. Hip, Right. That's the name of the course we're covering an introduction to Hip. But in Marjah one here in the introduction. In this video, of course, we're introducing you to the course. Overall, we're also gonna talk about as I mentioned before what hip is We're gonna learn what it is, why it's important, some of the consequences if you don't actually follow it or if you violate it,
03:21
we're gonna talk about the security rule here. Module one.
03:23
We're going to talk about cyber attacks. We're gonna talk about things like fishing ransomware attacks and then also as kind of a little special surprise for you. What I've done is, uh, Dave could practice, and I have a dual course on the cyber, a site called malware threats. And so what I've done is just grabbed a couple of the lab videos we did in that course, And I've included them in Marjah one here
03:43
so you can just see what a ransomware attack looks like. We've got a couple examples
03:46
for you to kind of understand what that is. If you're not familiar with that,
03:51
I want to talk about the hip, the breach notification rule, some of the requirements around that for organizations. And then we're gonna move into module to where? Well, kind of talk about some generalized key study example. So I just wantto give those so you can understand hip and how it might apply with through different organizations.
04:10
Most people just think of, like, a hot hospital or doctor's office or something,
04:14
or they think of, like, just certain things. Like maybe you showed somebody a patient chart. But there's many ways you could violate hip us. We're just gonna kind of talk through some different scenarios essentially and help you fully understand the different ways that it could be violated.
04:29
And then, of course, the module to we're gonna jump into the S r. A tool. As I mentioned eso.
04:33
Well, I'm not gonna tell you what s R a stands where you're gonna learn that it might heal, too. So make sure you tune in tow to find out what that is. And then macho food. We're just gonna wrap up things so we'll talk about how to do the assessment for this course. All do. It's always I'll go ahead and thank you for completing the course. So just foreshadowing there a little bit for you on that way, you should be good to go.
04:54
All right. So how is this core structure? Well, it's gonna be primarily on demand video. There are gonna be power points. I don't wantto, you know, sneak those by you. It's gonna be quite a few power points, actually, to try toe, convey the information on, and that's mostly, See, you can remember things, but I don't
05:11
try to kill you with information on the slide. My hate doing that. And so I've tried to avoid that here.
05:15
So what? You'll notice that there'll be some bullet points essentially, and then I'll talk quite a bit on different bullet points. Information you need to know
05:24
we're gonna have lab. So basically, the lab is surrounding the S r. A tool. It is broken up to several different videos. So for example, we're gonna be installing the tool, show you how to install it on. Then we'll also walk through using the actual tool itself. As I mentioned, there's an assessment for this course, So we'll talk about what that is in module three again.
05:43
And then I want to mention their supplement of resource Is that kind of touched on it before?
05:46
But I've got several Resource is for you in this course, and so just make sure you click on the resource is option and download all the resource Is So, for example, the step by step lab guide that walks you through everything step by step, as well as a sample report from using the S R. A tool and some other helpful information. So be sure to download those if you have not already.
06:08
So for anyone that's taken any of my previous courses, I always like t o keep the posters, has been questioned on the introduction video. Very, very simple. I like to make it easy. So if you're paying attention at all, so basically, if you have a pulse, he should be able to answer this correctly s So here's a question I hold a license as a physician. Is that true or false?
06:29
All right. So hopefully you were paying attention. If you got that wrong, by the way, your punishment is watching this video again. I have to make sure you get it right. Next time I hold the license as a nurse, not as a physician or doctor is as it's Ah called. A lot of people understand, doctor, and they may not know what a physician is specifically.
06:46
All right, So in this video, we just talked about the overarching course goals of the course objectives. We also talked about who I am. It's your instructor. We talked through the structure of this course itself. So, you know, Is it videos? Is it, lads? What? What is it? And I talked about that structure, and then I also mentioned
07:01
the different things were gonna be learning in each module. So again, macho war. I'm ready to talk through the introduction type of stuff. We'll talk about what HIPPA is. We'll touch on the security rules, cyber attacks. We're gonna talk about the breach notification rule, and then we're gonna move into module to where we'll have some example. Case studies or scenarios,
07:18
and then we'll move into actually using the S R A tool for our hands on lab,
07:21
and then we'll wrap things up in Module three.
Up Next