Training Courses, Classes, Seminars and Webinars

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 7635 results Sort by:

Courses

  • 1 Request Info

    Monitoring and Operating a Private Cloud Training Course

    This course focuses on how to monitor and operate a cloud with Microsoft System Center 2012 R2. Topics include how to manage and administer a cloud environment; monitor key infrastructure elements and applications that run within a cloud; an overview of Virtual Machine Manager; using Operations Manager to monitor the services deployed in a cloud; core features of Service Manager; using Orchestrator; integrating of Microsoft System Center 2012 R2 Service Manager; managing a highly available cloud Infrastructure using SQL Server 2012 Always-On, Hyper-V Replica and Azure Site Recovery and how Configuration Manager can be used to provide update management for Virtual Machines.
  • 2 Request Info

    Configuring and Deploying a Private Cloud Training Course

    This course focuses on the skills required to configure and deploy a cloud using Microsoft System Center 2012 R2. Students learn how to plan, configure and deploy a private cloud using Virtual Machine Manager.
  • 3 Request Info

    Managing SQL Business Intelligence Operations Training Course

    This course is aimed at database professionals who manage Business Intelligence (BI) operations. This course looks at various options that provide the ability of business users to analyze data and share their findings, starting with managed BI data sources and expanding to personal and external/public data sources.
  • 4 Request Info

    Analyzing Data with Power BI Training Course

    This course gives students a solid understanding of data analysis with Power BI. Topics include creating visualizations; connecting to Excel files; creating a Power BI dashboard; developing reports using the Power BI desktop App; using DAX syntax; accessing data in Azure SQL Data Warehouses; using the Power BI Mobile App and the Developer API.
  • 5 Request Info

    Performance Tuning and Optimizing SQL Databases Training Course

    This course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases.
  • 6 Request Info

    Supporting and Troubleshooting Windows 10 Training Course

    This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them.
  • 7 Request Info

    Structuring Physician Employment Agreements: Key Stark Law Considerations

    In this session Mr. Wolfe will provide an overview of the Stark Law, including its 2016 changes. He will also discuss best practices for negotiating and drafting physician employment agreements on behalf of health systems, hospitals and medical groups. He will explain key provisions and potential pitfalls in both types of agreements.
  • 8 Request Info

    HIPAA Compliant Patient Engagement - New Rules Webinar

    This webinar focuses on HIPAA Rules for transmitting informational email and text messages to patients over an electronic communications network. You will learn: The information that makes a message subject to HIPAA The "safe harbor" - How Health Care Providers may obtain consent from patients to send PHI in unencrypted email and unencrypted text messages and not be responsible for unauthorized access to the PHI in transmission or when received by the patient What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted email or unencrypted text message The requirements for a Business Associate to be able to communicate by email or text message with a patient on behalf of a Health Care Provider How a Business Associate may protect itself from liability for violating HIPAA Rules about email and text messages in its Business Associate Agreement
  • 9 Request Info

    Webinar On 3-Hour Virtual Seminar on MACRA & MIPS - HIPAA Rules for Text Messaging & Email

    Patient Engagement is widely recognized as essential for improving the quality of healthcare in the United States. Coordination of Care through Patient Engagement is a cornerstone of MACRA and revisions of Federal healthcare payment policy. Certified Electronic Health Record Technology (CEHRT) includes secure patient portals and secure messaging. Encrypted text message and email products are available from vendors. But patients overwhelmingly choose easy-to-use unencrypted email and text messaging systems. Tens of thousands of unencrypted appointment reminders, healthcare instructions, patient satisfaction surveys, health and wellness newsletters and recall reminders are sent every day exposing Healthcare Providers to unnecessary, easily avoidable risks. HIPAA provides a simple, but little known "Safe Harbor" for Healthcare Providers that permits unencrypted email and text message transmissions to a patient.
  • 10 Request Info

    HIPAA Texting and Emailing: Do's and Don'ts

    This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to personal devices. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on multiple HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices.
  • 11 Request Info

    Auditing Physician Contracts Under the New Stark Rules

    Healthcare reform has invigorated the government's focus on healthcare fraud, including enforcement of the Stark Law. Improper design and implementation of physician arrangements can result in penalties, denial of payments, and exclusion from federal health care programs. Thus, ensuring Stark Law compliance will be critical for medical groups, hospitals and health systems looking to manage areas of enterprise risk. Health care organizations should periodically audit their existing arrangements to ensure they are compliant with Stark's technical requirements and key tenets of defensibility (e.g.fair market value, commercial reasonableness, and not taking into account designated health service referrals, etc.) in case their physician compensation arrangements are ever challenged.
  • 12 Request Info

    Webinar On Upcoming Changes with HIPAA - 2018

    This lesson will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order as HIPAA is now fully enforced and the government is not using kid gloves any more. It will also address major changes under the Omnibus Rule and any other applicable updates for 2017 and beyond. There are an enormous amount of issues and risks for covered entities and business associates these days. I will speak on specific experiences from over 17 years of experience in working as an outsourced compliance auditor, expert witness on HIPAA cases, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices.
  • 13 Request Info

    Developing HIPAA Policies and Procedures

    Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. A HIPAA Risk Management plan is your overall policies and procedures manual. If audited or the subject of a compliance review you will be required to show the government you have all the necessary policy and procedure documentation in place to address all the required safeguards. If audited by HHS, being able to demonstrate HIPAA compliance will involve providing many of these policies and procedures. Having a fundamental understanding of a HIPAA compliance helps to know what is required to implement those policies and procedures. If your healthcare practice, business, or organization needs to understand how develop, maintain and modify HIPAA policies and procedures, please join us for this informative and interactive course.
  • 14 Request Info

    HIPAA Training for the Compliance Officer

    This webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2018. Areas also covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. The primary goal is to ensure everyone is well educated on what is myth and what is reality with this law, there is so much misleading information all over regarding the do's and don'ts with HIPAA - I want to add clarity for compliance officers. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors.
  • 15 Request Info

    HIPAA and Health IT - What you Need to Know as a Business Associate

    As defined by the Health Information Portability and Accountability Act (HIPAA), a Business Associate can be any organization or person working in association with or providing services to a Covered Entity who handles or discloses Protected Health Information (PHI) or Personal Health Records (PHR). With certain exceptions, a person or entity that creates, receives, maintains, or transmits PHI for a function or activity regulated by the HIPAA Privacy Rule for a Covered Entity is a Business Associate. The HITECH Act, a recent update made to overall HIPAA regulations require Business Associates to comply with HIPAA mandates regarding the handling and use of health information. As a Business Associate you must comply with a wide-range of regulatory obligations, including certain privacy obligations, security standards, and breach notification requirements.
  • 16 Request Info

    HIPAA - Emailing, Texting, and Personal Devices (myths vs realities)

    This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA/HITECH Security Rule and securing PHI in transmission. I will go through multiple examples and specific scenarios and also offer simple common-sense solutions. Areas covered will be texting, email, encryption, medical messaging, voice data, personal devices, and risk factors. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as years of experience in dealing directly with the Office of Civil Rights HIPAA auditors. I will speak on specific experiences from over 18 years of experience in working as an outsourced compliance auditor, expert witness on multiple HIPAA cases in state law, and thoroughly explain how patients are now able to get cash remedies for wrongful disclosures of private health information.
  • 17 Request Info

    Course On Business Associates 2017 - 5 Top HIPAA Compliance Priorities

    Business Associates organizations that create, receive, maintain or transmit Protected Health Information (PHI) on behalf of a Covered Entity or to provide a service or function involving PHI for a covered Entity are directly liable for compliance with HIPAA law protecting the privacy and security of PHI. If you are a Business Associate you must know exactly what you have to do to comply with HIPAA. But you have two hurdles. First, your HIPAA responsibilities are new so you don't have the HIPAA compliance background and experience of your customers - Covered Entities. Second, you are liable for compliance with the entire HIPAA Security Rule - and parts of the HIPAA Privacy and Breach Notification Rules
  • 18 Request Info

    Webinar on HIPAA Requirements for Safeguarding Protected Health Information

    Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. If audited or the subject of a compliance review you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of a HIPAA compliance. If your healthcare practice, business, or organization needs to understand what is required to protect health records or make sure your current safeguards are adequate and can withstand government scrutiny, please join us for this informative and interactive course.
  • 19 Request Info

    Conducting an Effective Job Safety Analysis (JSA) - Job Hazard Analysis (JHA)

    A Job Safety Analysis (JSA) or Job Hazard Analysis (JHA) is a very effective way to help mitigate health and safety hazards in the workplace. A JSA/JHA is an important element to have in a comprehensive Safety and Health Management System. A JSA/JHA is a 3 step process that helps prevents Employee accidents and injuries. The first step of a JSA/JHA identifies all of the sequential steps of how a job or job task is done. The second step lists all health and safety hazards identified in the job or job process. The third and most important step identifies safety mitigation steps to prevent Employee injuries from occurring on that particular job. This webinar will cover how to effectively create and implement JSAs/JHAs in the workplace to prevent Employee injuries.
  • 20 Request Info

    Webinar On HIPAA Enforcement Activity - Learning from the Mistakes of Others

    Now that the HIPAA rules have been in place for more than a dozen years, the days of advice and counseling have been replaced by a hard-nosed enforcement attitude, where HHS OCR is ready to make health care organizations that violate the rules feel some pain for their actions. If your organization is not ready, the HIPAA rules have new, significantly higher fines, including mandatory minimum fines of $10,000 for willful neglect of compliance. In addition, HIPAA enforcement has taken on a new importance at HHS; officials have publicly stated that enforcement is now a priority, and that means being ready for an audit or compliance review is more important than ever.