• Classroom
  • Online, Self-Paced
Course Description

Upon successful completion of this exam a candidate will have the ability to demonstrate how data being used by an app should be secured, the environment in which an app will be deployed, and the acceptable level of risk for an app. The candidate will demonstrate the app vetting process in detail. candidate's will also understand the development of system threat models for mobile devices and the resources that are accessed through the mobile devices. Additionally, the candidate will gain a high level of knowledge of the transactions and code set standards, identifier standards, privacy rule, security rule, enforcement rule, and breach notification rule as stated in the HIPAA administrative simplification regulations.

Learning Objectives

Successful completion of this exam will demonstrate the candidate's ability to comprehend mobile device threat models and implement security standards within mobile devices in order to protect its data. The candidate shall be able to demonstrate the app vetting process in detail upon completion.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.