Nurse charting on iPad

Cybersecurity Training for Healthcare Professionals

This course provides healthcare professionals with essential knowledge and practical guidance on online security, digital safety, and patient privacy in healthcare environments. As technology becomes increasingly integrated into daily care, frontline staff must understand how routine actions — such as using work devices, managing passwords, sending messages, and documenting care — can either protect or expose sensitive patient information. This course explains common risks such as phishing, malware, system leaks, and privacy breaches in clear, relatable terms and connects them directly to real-world responsibilities.

Through narrative instruction, examples, and case-based scenarios, learners will develop skills to use work technology appropriately, protect their digital identity, recognize suspicious activity, communicate securely, and uphold patient confidentiality in both facility and home health settings. The course emphasizes professional accountability, ethical responsibility, and compliance with privacy regulations, helping nurses support patient trust, organizational integrity, and safe, compliant care.

Objectives

Upon completion of this course, participants should be able to:

  1. Explain appropriate and inappropriate use of work devices and systems.
  2. Describe risks of “system leaks” (accidental or intentional exposure of patient information).
  3. Demonstrate best practices for passcodes/passwords and account access.
  4. Identify secure vs. unsecure messaging methods and safe communication habits.
  5. Apply privacy principles (including “minimum necessary”) to daily work situations.

Curriculum

Chapter 1: Work Devices, Personal Use, and Why “Small” Choices Create Big Risk

  • What Counts as “Personal Use”
  • Understanding System Leaks and Data Breaches
  • Safe Workstation and Tablet Practices
Chapter 2: Passcodes, Passwords, and Protecting Your Digital Identity
  • Why Passcodes and Passwords Are So Important
  • Creating and Protecting Strong Credentials
  • Locking Screens and Logging Out
Chapter 3: Recognizing Threats - Phishing, Malware, and Common System Leak Triggers
  • What Is Phishing?
  • Malware: What Happens After the Click
  • Warning Signs of Suspicious Messages
  • What to Do If You Click Something Suspicious
Chapter 4: Secure Messaging and Safe Communication
  • What Does “Secure Messaging” Mean?
  • “Minimum Necessary” in Communication
  • Safe Communication Practices
Chapter 5: Privacy, Confidentiality, and Protecting Patient Trust
  • Privacy Is Part of Caring
  • What Is Protected Health Information (PHI)?
  • Protecting Privacy in Facilities
  • Protecting Privacy in Home Health
  • Social Media: Why There Are No Exceptions
  • References

Price: $12.00

Contact Hour: 1

Nurse charting on iPad

Course Author

Author photo for Kendall Moore

Kendall Moore

Kendall is a 2022 Magna Cum Laude graduate from Tyler Junior College with an Associate Degree in Nursing and completed Pacific College of Health and Science’s RN-to-BSN in Holistic Nursing program in 2026, also graduating Magna Cum Laude.

In addition to her academic and professional accomplishments, Kendall serves as the Chief Operating Officer of Pedagogy Education, where she oversees the company’s day-to-day operations and contributes as an educational course author. Her combination of leadership experience, clinical knowledge, and passion for holistic health reflects her ongoing commitment to advancing both patient care and healthcare education.

Read Full Bio

Course Accreditation

See our Accreditation Statements page to view our accreditation information.