DQS Certified HIPAA Experts for Security (DCHES)

After the completion of the course candidate can take the Exam. Minimum passing percentage is 70%. There will be 100 questions, comprising of subjective, objective, true/false, fill in the blanks and multiple choice questions. Only successful candidate will be eligible to receive HIPAA Certification for DQS Certified HIPAA Experts for Security (DCHES).

Duration for the Exam will of ONE Hour. After successful completion of the Exam, you will receive the Certificate in Soft Copy and you can print that certificate.

In case you did not complete the Exam successfully, you can take a retake for the Exam for a fee.

Fees

Total Course Duration: 18 hours Number of Total Slides: 500 slides

Total Chapters: 17

Cost of online training and certification test: $399 ($499 with the manual)

Certification Test Only: $100 per attempt

Chapters

Course for DQS Certified HIPAA Experts for Security (DCHES) has been divided into following chapters:

Chapter 1 – HIPAA Basics

  • Overview of HIPAA Laws
  • Know about HIPAA Administrative Simplification Title
  • Know about Non-compliance and different civil and criminal penalties
  • Learn about key organizations associated with administering HIPAA Administrative Simplification provisions
  • Definitions and Terms of HIPAA

Chapter 2 – Overview of Transactions and Code Sets

  • Overview of HIPAA standard transactions
  • Overview of Code Sets
  • Why need HIPAA Standards and Code Sets

Chapter 3 – ANSI X12 and NCPDP transactions

  • Know about ANSI ASC X12 and NCPDP transactions
  • Learn how to examine  ANSI ASC X12 and NCPDP transactions

Chapter 4 – Learn about Code Sets and National Identifiers

  • Learn about approved HIPAA transaction code sets
  • Learn about adopted national identifiers that can be used with HIPAA covered transactions to identify entities or individuals

Chapter 5 – HIPAA and Health Data security and privacy requirements

  • Learn about HIPAA and health information and its exchange
  • HIPAA Privacy Rule and steps for compliance
  • HIPAA Security Rule and steps for compliance
  • What is compliance framework

Chapter 6 – HIPAA Privacy Rule

  • Learn about basic needs, key words, and understand the concepts of privacy

Chapter 7 – HIPAA Security Rule

  • Overview of scope of HIPAA Security Rule.
  • Learn about different Health care related  threats and attacks
  • Learn about security terminology, concepts, and categories
  • Learn about Administrative Safety Implementation specifications
  • Learn about Physical Safety Implementation specifications
  • Learn about Technical Safety Implementation specifications
  • Organizational requirement for HIPAA.
  • Learn about different Policies, Procedures and documentation standards.

Chapter 8 – HIPAA Security Rule – Threats and Options

  • Learn how to identify technical and  electronic threats and risks related to Health care
  • Learn about the safety rules
  • Learn about Safety technology
  • Learn about Electronic security options
  • Learn how to use these to comply with Safety Rule and Privacy Rule requirements provisions

Chapter 9 – Advanced Administrative Safety

  • Learn about need for standards and security awareness and training.
  • Learn about the need for Security Incident Procedures standard
  • Learn about Contingency planning.
  • Learn about Evaluation Standard
  • Learn about Business Associate contracts and other documented arrangements standard.

Chapter 10 – Overview Physical Security

  • Learn about Physical Safety assessment based on the HIPAA Privacy Rule

Chapter 11 – Advanced Physical Safety

  • Learn about Physical Safety
  • Learn about access control for facilities and operations
  • Learn about Nodes use and security standards
  • Learn about Policies, Procedures, Best Practices to ensure appropriate physical security measures to be implemented

Chapter 12 – Physical Safety – Management of Data and Media

  • Learn about Device and Media control

Chapter 13 – Security Technical Safety

  • Learn about Security rules and Technical security
  • Learn about Access Control Standards
  • Learn how to check Audit Control Standard
  • Learn about Integrity Standards
  • Learn about key elements of the Individual or Entity Authentication Standard
  • Learn how to evaluate Transmission Security Standards

Chapter 14 – Security Advanced Technical Safety

  • Learn about  Transmission Security Standard
  • Learn about Transmission Control Protocol / Internet Protocol (TCP / IP) protocol architecture and its components
  • Learn about Firewalls and their role in information protection
  • Learn about Virtual Private Network (VPN)
  • Learn about Wireless Security requirements
  • Learn about different types of Encryptions used  by health care organizations
  • Learn about Windows 7/XP’s Security features

Chapter 15 – Digital Signature and Certificates

  • Learn about Electronic Signature requirements
  • Learn about Digital Signature
  • Learn about Digital certificate
  • Public Key Infrastructure (PKI) and their role in Digital Signatures

Chapter 16 – Security Policy and other Standards

  • Learn how to identify threats and vulnerabilities
  • How these threats and vulnerabilities impact risk management strategies
  • Learn how to develop appropriate security policies
  • Overview of  other standards like ISO 27002 and ISO 27001 standards
  • Learn about factors that affect the development of an enterprise security policy
  • Learn about security policy artefacts that address such areas as acceptable use policies

Chapter 17 – Overview of the American Recovery and Reinvestment Act

  • Overview of American Recovery and Reinvestment Act (ARRA), Title XIII, Subpart D (HITECH)
  • Know about new requirements for Business Associates
  • Know about breach notification requirements
  • Know about new Privacy and Security Requirements
  • Know about Increased Enforcement and Penalties
  • Know about Federal Reporting Requirements
  • Know about Resource Requirements for Federal Reporting
  • Best Practices for Compliance