HIT + Book cover.jpg
CompTIA Training

CompTIA Healthcare IT Professional



    3 days in classroom or virtual


The CompTIA Healthcare IT Technician Certification is a vendor neutral credential. The CompTIA Healthcare IT Technician exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Healthcare IT Technician will certify that the successful candidate has the knowledge and skills required to implement, deploy, and support Health IT requirements, healthcare terminology/acronyms, and possess a basic understanding of practice workflow while adhering to code of conduct policies and security best practices, in order to support Electronic Health Records (EHR) systems in medical facilities.


     Expert Instructor lead training

     Accredited course material

     Study guide to assist with exam preparation

    (Exam HIT-001) Examination fees included*

    Pass or its on us commitment


The CompTIA Healthcare IT Technician Consist of Training from all 5 Domains

Domain 1.0 – Regulatory Requirements

·   Identify standard agencies, laws, and regulations.





• Medicare

• Medicaid



• Meaningful use

• Eligible provider


·   Explain and classify HIPPA controls and compliance issues.

o   PHI

o   Covered Entity

o   Security

o   HIPPA Security

§  Violations

§  Fines

§  Requirements

o   Release of information

o   Access permissions

·   Summarize regulatory rules of record retention, disposal, and archiving.

o   Documentation requirements

§  Time of storage

o   Types of records

§  Public records

§  Private records

§  Legal health record

o   Methods of record disposal

·   Explain and interpret legal best practices, requirements, and documentation.

o   Waivers of liability

o   Business Associate Agreements

o   Third party vendor review and agreements

Domain 2.0 – Organizational Behavior

    Use best practices for handling PHI in the workplace.

o   PC placement

o   Privacy screens

o   Printer placement

o   Screensavers

o   Time lockout

·   Identify HER/EMR access roles and responsibilities.

o   Medical roles

§  MD

§  RN

§  PA

§  DA

§  PCT

§  MA

§  NUC

§  UA

§  LPN

§  PM

§  Office Manager

§  Staff

o   Technical roles

§  Security administrator

§  Network administrator

§  System administrator

§  Desktop support

§  Database administrator

o   Business Associate Access and Contractor Access

o   Access limitations based on role and exceptions

§  Emergency (break the glass)

o   Access based on sensitive patient data

·   Apply proper communication methods in the workplace.

o   Email

o   IM vs. secure chat

o   EMR system

o   Fax

o   Secure FTP

o   Phone

o   VoIP

·   Identify organizational structures and different methods of operation.

o   Organizational structures:

§  Hospital

§  Private practices

§  Nursing homes

§  Assisted living facilities

§  Home healthcare

§  Hospice

§  Surgical centers

o   Methods

§  Differences in scope of work

§  Availability of resources

§  Formality of procedures

·   Given a scenario, execute daily activities while following a code of conduct.

o   Communicate in a professional fashion

o   Adapt procedural behavior according to different situations and environments

§  Imaging room

§  Procedural room

§  Recovery room

§  Examination room

§  Float room

§  Emergency room

·   Adapt social behavior based on sensitivity of the environment

·   Use proper sanitation steps – follow medical precautionary guidelines

·   Conform to requirements set forth by project manager

Domain 3.0 – IT Operations

·   Identify commonly used IT terms and technologies.

o   Protocol terms:


§  DNS


§  FTP

§  Wireless (802.11x)

§  RDP

o   Devices

§  Switch

§  Domain controller

§  Printer server

§  Industry terms:

§  ASP

§  ISP

§  Client-server model

§  Mainframe

§  Cloud Computing

§  Virtualization

§  Terminal services

§  APIs

§  Fiber

o   Languages

§  XML

§  SQL


§  Flash

§  PHP

§  ASP

·   Demonstrate the ability to setup a basic PC workstation within an HER/EMR environment.

o   Basic installation, configuration and maintenance procedures

o   Basics of operating systems, mouse, keyboard, monitor and applications

·   Given a scenario, troubleshoot and solve common PC problems.

o   Malfunctioning hardware

§  Mouse

§  Printer

§  Power

§  Monitor

§  Cables

o   Software patches/ hotfixes/ updates

o   Documentation

·   Install and configure hardware drivers and devices.

o   Imaging devices:

§  Barcode scanner

§  Document scanner

§  Card/badge scanner

§  Fax printer

§  Camera

§  Signature pads

o   Physical interfaces:

§  USB

§  IEEE 1394


§  Serial

§  Bluetooth

o   Mobile storage devices:

§  Flash drives

§  External hard drives

§  DVDs

§  CDs

§  Tapes

§  SD cards

o   Mobile devices

§  Tablet PCs

§  Smart phones

§  Portable media players

·   Compare and contrast basic client networks and tools.

o   DHCP vs. static IP

o   Adhoc vs. infrastructure

o   Command line prompts

§  Ping

§  Ipconfig

§  Tracert

·   Set up basic network devices and apply basic configuration settings.

o   Wireless access point

§  Security settings


§  Guest network

§  Access point placement

o   Router


§  Port forwarding

o   Internet modem

·   Given a scenario, troubleshoot and solve common network problems.

o   Cabling

o   Power

o   IP settings

o   ISP

o   Interference

o   Signal issues

·   Explain the features of different backup configurations and the associated maintenance practices.

o   Daily

o   Differential

o   Incremental

o   Archive flags

·   Classify different server types, environments, features, and limitations.

o   Database server

o   Application server

o   Interfaces

o   Physical connections

o   Server load and utilization

o   Application services

o   OS and application interoperability

o   Storage space limitations based on application usage and electronic record storage

·   Compare and contrast EHR/EMR technologies and how each is implemented.

o   ASP/ Cloud vs. client-server (locally hosted)

o   Browser vs. installed application vs. terminal/remote access

o   Hardware requirements

Domain 4.0 – Medical Business Operations

    Identify commonly used medical terms and devices.

o   Interfaces

§  HL7

§  E-prescribing

§  CCD

§  CCR

§  ICD10

§  CPT

§  Snowmed



§  E/M codes

o   Devices:

§  Portable x-ray machine

§  MRI

§  Vitals cuff

§  EKG

§  EEG

§  Ultrasound

§  PET

§  CT

§  Vascular/ Nuclear Stress Test

§  Glucose monitor

o   Clinical software and modules:

§  Patient tracking

§  Scheduling

§  Order entry

§  Practice management

§  Billing/coding

§  Tracking/auditing

o   Basic clinical terms:

§  Imaging

§  PCP

§  Stat

§  Acuity

§  Code blue/rapid response

§  Trauma levels

§  Controlled substance (levels)


·   Common medical departments:

o   Inpatient


§  ONC


§  FBC/L&D/Stork/NICU




§  Behavior Health


§  OR/UR

§  ER

o   Outpatient


§  ONC


§  Plastic Surgery

§  ENT

§  Respiratory

§  Physical therapy

§  Cardiovascular

§  Occupational therapy

§  Ambulatory/ Day surgery

§  Radiology

§  Laboratory

§  Ophthalmology

§  Dermatology

§  Nuclear

·   Explain aspects of a typical clinical environment.

o   Basic workflow:

§  Registration

§  Consultation

§  Examination

o   Clinical process:

§  Computerized physician order entry

§  Transcription

§  Dictation

§  Referrals/consults

§  Digital signatures

·   Identify and label different components of medical interfaces.

o   HL7:

§  Standard contents

§  Provider types

§  AL1

§  BLG

§  IN1

§  MSH

§  OBR

§  PID

§  SCH

o   E-prescribing:

§  Medication reconciliation

§  Bedside medication verification

§  Allergy interactions

§  Formulary checking

o   Billing:

§  EMR/HER outbound communication

§  Types of codes

§  Clearinghouse

·   Determine common interface problems and escalate when necessary.

o   HL7:

§  Threads/nodes deactivated

§  Improperly formatted patient demographics

§  Communication link (fax, network, internet)

o   E-prescribing:

§  Improperly formatted patient demographics

§  Improperly formatted script

§  Deactivated medication

§  Controlled substance

§  Communication link )fax, network, internet)

o   Medical devices:

§  Power

§  Network

§  I/O

§  Configuration settings

·   Explain the basics of document imaging.

o   File types:


§  PDF

§  JPG

§  GIF

o   Characteristics:

§  Quality

§  Size

§  Resolution

§  Compression

o   Scanning and indexing:

§  Metadata

§  Storage and retrieval

o   OCR and structured data

·   Given a scenario, determine common clinical software problems.

o   Locate the affected modules or fields

o   Determine file/ data types

o   Escalation procedures to proper support tier

§  Vendor or location application support

·   Describe change control best practices and its system-wide effects

o   Procedural systematic customization

o   Governance board

o   System patching/ updates

o   Appropriate scheduling

o   Change control environments:

§  Development

§  QA/ Test

§  User test

§  Production/live

·   Domain 5.0 – Security

    Explain physical security controls

o   Locations for:

§  Servers

§  Network hardware

§  Printers

§  Scanners

§  Copiers

o   Access:

§  Servers

§  Office

§  Data closet


§  Backups

§  Keyfobs

§  Badges

§  Biometrics

o   Environmental


§  Security lightning

§  Surveillance

§  Fire suppression

§  Personnel

§  Generator

o   Office hardware

§  Locks

§  Door locks

§  Biometrics

§  Privacy screens

§  UPS

·   Summarize the different encryption types and when each is used.

o   Types:

§  SSL

§  DES

§  AES

§  3DES

§  PGP

o   Communication:

§  Email

§  Chat

§  Smart phone

§  Collaboration sites

§  FTP sites

§  Phone

§  VoIP

§  Fax

o   Storage:

§  Flash drives

§  PCs

§  Laptops

§  SD Cards

§  External drives

§  Servers

§  NAS


o   Dissemination of PHI

·   Apply best practices when creating and communicating passwords.

o   Communication of passwords

o   Storage of passwords

o   Password strength (complexity/length)

o   Password reuse

·   Classify permission levels based on roles.

o   Read

o   Write

o   Modify

o   Full access

·   Identify different remote access methods and security controls

o   RDC

o   VPN

o   Remote control applications

o   Terminal emulation

o   L2TP

o   SSH


o   SFTP

·   Recognize wireless security protocols and best practices.

o   WEP

o   WPA

o   WPA2

o   AES


o   SSID naming

o   MAC filtering

o   Site surveys

o   Access point placement

·   Implement best practices insecure disposal of electronic or physical PHI.

o   Secure shredding

o   Degaussing

o   Sanitizing

o   Implement backup procedures based on disaster recovery policies.

o   Deployment, configuration and testing of backups

o   Backup storage:

§  Offsite

§  Courier

§  Onsite

o   Methods of secure transfer

o   Backup inventory

·   Identify common security risks and their prevention methods.

o   Social engineering

o   Phishing

o   Spamming

o   Malware

o   Spyware



    Help desk staff

    IT security professionals

    Networking technicians

    Desktop support technicians

    Storage technicians

    Students looking to gain a better understanding of networks

    Managers with IT

    IT Staff working in a healthcare environment


    There are no specific prerequisites

    Basic understanding of computers and networking is preferred

    2 years or more of IT administration with a focus on healthcare experience is and advantage

    Day to day technical information security experience

    Broad knowledge of security concerns and implementation

Delivery Model:
Add To Cart
HIT + Book cover.jpg