Our Products
Refine Search
Registration link for gotowebinar will be provided in the Order Confirmation Email.
The science of using mathematics to encrypt
and decrypt data is called cryptography. Cryptography e.. Read More...
$4.95
A Disaster Recovery Plan (DRP) is a formal
document created by an organization that contains detail.. Read More...
$4.95
Encryption is a method
of converting an original message of regular text into encoded text. The tex.. Read More...
$4.95
The primary purpose of a cyber risk
assessment is to keep stakeholders informed and support proper .. Read More...
$4.95
The Federal Information Security
Modernization Act of 2014 (FISMA 2014) updates the Federal Governm.. Read More...
$4.95
The General Data Protection Regulation
(GDPR) is a regulation on data protection and privacy in the.. Read More...
$4.95
The Gramm Leach
Bliley Act (GLBA) is a comprehensive, federal law affecting institutions. The
law .. Read More...
$4.95
HIPAA is the acronym for Health Insurance
Portability and Accountability Act. In this course, we wi.. Read More...
$4.95
HIPAA is the acronym for Health Insurance
Portability and Accountability Act. In this course, we &n.. Read More...
$4.95
On April 18, 2005, the Department of Health
and Human Services (HHS) published a notice of proposed.. Read More...
$4.95
The HIPAA Final Rule was created to
strengthen the privacy and security protections established und.. Read More...
$4.95
This course teaches the concept of HIPAA enforcement and process. We
will discuss how OCR enf.. Read More...
$4.95
In this course, we learn
security challenges in the healthcare
industry and the updates as a.. Read More...
$4.95
The HIPAA Minimum
Necessary standard is derived from confidentiality codes and practices in
common.. Read More...
$4.95
Patient rights outline expectations for
health care and provide each patient with knowledge regardi.. Read More...
$4.95
Showing 106 to 120 of 194 (13 Pages)