CompTIA Healthcare IT Technician

(pearson-HIT-001-complete)/ISBN:978-1-61691-758-6

This course includes
Lessons
TestPrep
Lab

Gain hands-on expertise in CompTIA Healthcare IT Technician (HIT) certification exam by Pearson HIT-001 course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Healthcare IT Technician HIT-001 certification is a vendor and technology-neutral credential designed for IT professionals to implement, deploy, and support healthcare IT systems in various clinical settings.

Here's what you will get

The CompTIA Healthcare IT Technician certification was created due to a growing need for IT in the healthcare IT field. The CompTIA Healthcare IT Technician certification is designed to be a vendor-neutral exam that measures your knowledge of industry-standard technologies and methodologies.

Lessons

11+ Lessons | 375+ Quizzes | 304+ Flashcards | 250+ Glossary of terms

TestPrep

174+ Pre Assessment Questions | 3+ Full Length Tests | 175+ Post Assessment Questions | 300+ Practice Test Questions

Hands-On Labs

71+ LiveLab | 18+ Video tutorials | 20+ Minutes

Here's what you will learn

Download Course Outline

Lessons 1: CompTIA ® Healthcare IT Technician HIT-001 Authorized Cert Guide

Lessons 2: Introduction

Lessons 3: Introducing Healthcare IT

  • The Importance of the HITECH Act
  • Getting to Know Healthcare
  • The Goals of Healthcare IT
  • Chapter Summary
  • Short Answer

Lessons 4: Introducing Data Flow in HIT

  • Learning Support Flow
  • Getting to Know Information Systems
  • Getting to Know HIS
  • Getting to Know the Interface
  • Following the Data Flow
  • Chapter Summary
  • Short Answer

Lessons 5: Regulatory Requirements

  • Identifying Standard Agencies, Laws, and Regulations
  • Learning HIPAA Controls and Compliance Issues
  • Learning Rules of Record Retention and Disposal
  • Learning Legal Best Practices and Documentation
  • Chapter Summary
  • Short Answer

Lessons 6: Organizational Behavior

  • Handling PHI
  • Applying Proper Communication Methods
  • Identifying EHR/EMR Access Roles and Responsibilities
  • Identifying Organizational Structures and Different Methods of Operation
  • Executing Daily Activities
  • Chapter Summary
  • Short Answer

Lessons 7: IT Operations

  • How the Internet or an Intranet Works
  • How a Network Works
  • Managing Network Resources
  • Configuring a Workstation and Peripherals
  • Chapter Summary
  • Short Answer

Lessons 8: Medical Business Operations

  • Understanding the Clinical Environment
  • Supporting Software Used in Healthcare Facilities
  • How a Healthcare Interface Works
  • Chapter Summary
  • Short Answer

Lessons 9: Security

  • What Are We Up Against?
  • Understanding Permission Levels
  • Understanding Physical Security
  • Using Password Best Practices
  • Understanding Encryption Types
  • How to Secure Wireless Networks
  • How to Remotely Access the Facility's Network
  • Securing Backups
  • Disposing of PHI
  • Chapter Summary
  • Short Answer

Appendix A: CompTIA Healthcare IT Technician ACRONYMS

Appendix B: CompTIA Healthcare IT Technician Exam Topics

Hands-on LAB Activities (Performance Labs)

Introducing Healthcare IT

  • Identifying acute care facilities
  • Understanding acuity level index
  • Understanding standard departments of hospitals

Introducing Data Flow in HIT

  • Understanding HIS
  • Understanding types of HL7 messages
  • Understanding functions of an interface engine
  • Identifying primary functions of HIS
  • Identifying the real-time transfer of data
  • Identifying the steps for the EDIS ADT data flow
  • Identifying steps in the pharmacy IS
  • Identifying steps to follow the EDIS data flow

Regulatory Requirements

  • Understanding healthcare clearinghouse
  • Understanding HIPAA rules
  • Understanding penalties defined by the ARRA
  • Understanding types of health information
  • Understanding BBA

Organizational Behavior

  • Configuring the UPS
  • Placing a printer in the hospital
  • Understanding communication methods
  • Identifying PBX system layers
  • Understanding VoIP
  • Understanding organizational structure of a hospital
  • Understanding anesthesiologist

IT Operations

  • Spotting the intranet network
  • Identifying T-carrier line transmission speeds
  • Identifying connectionless communication
  • Describing OSI layers
  • Identifying OSI layer functions
  • Identifying TCP/IP layers
  • Identifying TCP/IP protocol layers
  • Identifying client and server
  • Identifying application layer protocols
  • Connecting a workstation to the LAN and configuring IPv4 properties
  • Identifying 802.11 standards
  • Installation of the Print and Document Services Role
  • Identifying the cable
  • Understanding common TCP/ IP port assignments
  • Implementing virtualization
  • Understanding programming languages
  • Understanding services of cloud computing
  • Identifying Internet protocols and their subtypes
  • Connecting a system to a wireless network
  • Configuring a wireless access point
  • Connecting systems to the Internet through a router
  • Identifying encryption methods
  • Connecting a wireless router to the laptop
  • Connecting Patch Cables between the Patch Panel and Switch Ports
  • Configuring a Local Area Connection's TCP/IP Version 4 properties
  • Displaying the TCP/ IP network configuration values
  • Assigning a new IP address
  • Pinging a URL and identifying network communication
  • Displaying the path to reach a target host
  • Understanding types of power outlets
  • Setting up a surge protected computer system
  • Replacing the Battery of a Smartphone and Inserting a Memory Card
  • Understanding types of communication standards

Medical Business Operations

  • Understanding trauma center levels and qualifications
  • Understanding controlled substance schedules or classifications
  • Naming inpatient departments in the hospital
  • Understanding environments or versions of IS

Security

  • Identifying social engineering attacks
  • Describing malicious threats to networks
  • Understanding permission levels
  • Understanding the key fob
  • Encrypting and decrypting a message
  • Encrypting and decrypting a message using the RSA algorithm
  • Identifying encryption types
  • Identifying VPN protocols
  • Identifying VPN protocols
  • Identifying types of encryption standards
  • Establishing a remote desktop connection