Course curriculum

    1. Welcome!

    2. Course Objectives

    1. Learning Objectives

    2. Cybersecurity Definitions (Part 1)

    3. Cybersecurity Definitions (Part 2)

    4. Cybersecurity Introduction (Part 1)

    5. Cybersecurity Introduction (Part 2)

    6. Cybersecurity Introduction (Part 3)

    7. Cybersecurity Introduction (Part 4)

    8. Cybersecurity Introduction (Part 5)

    9. Cybersecurity Regulations and Guidance: US (Part 1)

    10. Cybersecurity Regulations and Guidance: US (Part 2)

    11. Cybersecurity Regulations and Guidance: US (Part 3)

    12. Cybersecurity Regulations and Guidance: US (Part 4)

    13. Cybersecurity Regulations and Guidance: US (Part 5)

    14. Cybersecurity Regulations and Guidance: US (Part 6)

    15. Cybersecurity Regulations and Guidance: US (Part 7)

    16. Cybersecurity Regulations and Guidance: US (Part 8)

    17. Cybersecurity Regulations and Guidance: US (Part 9)

    18. Cybersecurity Regulations and Guidance: US (Part 10)

    19. Cybersecurity Regulations and Guidance: US (Part 11)

    20. Cybersecurity Regulations and Guidance: US (Part 12)

    21. Cybersecurity Regulations and Guidance: US (Part 13)

    22. Cybersecurity Regulations and Guidance: EU (Part 1)

    23. Cybersecurity Regulations and Guidance: EU (Part 2)

    24. Cybersecurity Regulations and Guidance: EU (Part 3)

    25. Cybersecurity Regulations and Guidance: EU (Part 4)

    26. Cybersecurity Regulations and Guidance: EU (Part 5)

    27. Cybersecurity Regulations and Guidance: EU (Part 6)

    28. Cybersecurity Regulations and Guidance: EU (Part 7)

    29. Cybersecurity Regulations and Guidance: EU (Part 8)

    30. Cybersecurity Regulations and Guidance: EU (Part 9)

    31. Cybersecurity Regulations and Guidance: EU (Part 10)

    32. Cybersecurity Regulations and Guidance: Other (Part 1)

    33. Cybersecurity Regulations and Guidance: Other (Part 2)

    34. Cybersecurity Regulations and Guidance: Other (Part 3)

    35. Cybersecurity Regulations and Guidance: Other (Part 4)

    36. Cybersecurity Regulations and Guidance: Other (Part 5)

    37. Cybersecurity Regulations and Guidance: Other (Part 6)

    38. Cybersecurity Regulations and Guidance: Other (Part 7)

    39. QUIZ - CYBERSECURITY REGULATIONS

    1. Learning Objectives

    2. Design and Development (Part 1)

    3. Design and Development (Part 2)

    4. Design and Development (Part 3)

    5. Design and Development (Part 4)

    6. Design and Development (Part 5)

    7. Design and Development (Part 6)

    8. Design and Development (Part 7)

    9. Design and Development (Part 8)

    10. Design and Development (Part 9)

    11. Design and Development (Part 10)

    12. Design and Development (Part 11)

    13. Design and Development (Part 12)

    14. Design and Development (Part 13)​

    15. Design and Development (Part 14)

    16. Design and Development (Part 15)

    17. Design and Development (Part 16)

    18. Design and Development (Part 17)​

    19. Design and Development (Part 18)​

    20. Design and Development (Part 19)

    21. Design and Development (Part 20)

    22. Design and Development (Part 21)

    23. QUIZ - DESIGN AND DEVELOPMENT

    24. Software Development (Part 1)

    25. Software Development (Part 2)

    26. Software Development (Part 3)

    27. Software Development (Part 4)

    28. Software Development (Part 5)

    29. Software Development (Part 6)

    30. Software Development (Part 7)

    31. Software Development (Part 8)

    32. Software Development (Part 9)​

    33. Software Development (Part 10)

    34. Software Development (Part 11)

    35. Software Development (Part 12)

    36. Software Development (Part 13)

    37. Software Development (Part 14)

    38. Software Development (Part 15)

    39. Software Development (Part 16)

    40. Software Development (Part 17)

    41. Software Development (Part 18)

    42. Software Development (Part 19)

    43. Software Development (Part 20)

    44. Software Development (Part 21)

    45. Software Development (Part 22)

    46. Software Development (Part 23)

    47. QUIZ - SOFTWARE DEVELOPMENT

    1. Learning Objectives

    2. Secure Product Development Framework (SPDF) (Part 1)

    3. Secure Product Development Framework (SPDF) (Part 2)

    4. Secure Product Development Framework (SPDF) (Part 3)

    5. Secure Product Development Framework (SPDF) (Part 4)

    6. Secure Product Development Framework (SPDF) (Part 5)

    7. Secure Product Development Framework (SPDF) (Part 6)

    8. Secure Product Development Framework (SPDF) (Part 7)

    9. Secure Product Development Framework (SPDF) (Part 8)

    10. Secure Product Development Framework (SPDF) (Part 9)

    11. Secure Product Development Framework (SPDF) (Part 10)

    12. Secure Product Development Framework (SPDF) (Part 11)

    13. PRACTICE DEVICE – DESIGN REQUIREMENTS

    14. PRACTICE DEVICE - DQS ANSWER REVIEW

    15. QUIZ - SPDF

    1. Learning Objectives

    2. Cybersecurity Risk Management (CRM) Basics (Part 1)

    3. Cybersecurity Risk Management (CRM) Basics (Part 2)

    4. Cybersecurity Risk Management (CRM) Basics (Part 3)

    5. Cybersecurity Risk Management (CRM) Basics (Part 4)

    6. Threat Modeling (Part 1)

    7. Threat Modeling (Part 2)

    8. Threat Modeling (Part 3)​

    9. Threat Modeling (Part 4)​

    10. Threat Modeling (Part 6)

    11. Threat Modeling (Part 7)

    12. Threat Modeling (Part 8)

    13. Threat Modeling (Part 9)

    14. Threat Modeling (Part 10)​

    15. Threat Modeling (Part 11)

    16. Threat Modeling (Part 12)​

    17. Threat Modeling (Part 13)

    18. Threat Modeling (Part 14)

    19. Threat Modeling (Part 15)

    20. Threat Modeling (Part 16)

    21. Threat Modeling (Part 17)

    22. Threat Modeling (Part 18)

    23. Threat Modeling (Part 19)

    24. PRACTICE DEVICE – THREAT MODEL

    25. PRACTICE DEVICE - DQS ANSWER REVIEW

    26. QUIZ – THREAT MODEL

    1. Learning Objectives

    2. Network Diagram (Part 1)

    3. Network Diagram (Part 2)

    4. Network Diagram (Part 3)

    5. Cybersecurity Architecture (Part 1)

    6. Cybersecurity Architecture (Part 2)

    7. Cybersecurity Architecture (Part 3)

    8. Cybersecurity Architecture (Part 4)

    9. Cybersecurity Architecture (Part 5)

    10. Cybersecurity Architecture (Part 6)

    11. Cybersecurity Architecture (Part 7)

    12. Cybersecurity Architecture (Part 8)

    13. Cybersecurity Architecture (Part 9)

    14. Cybersecurity Architecture (Part 10)

    15. Cybersecurity Architecture (Part 11)

    16. Cybersecurity Architecture (Part 12)

    17. ​ Cybersecurity Architecture (Part 13)

    18. PRACTICE DEVICE – NETWORK DIAGRAM & SECURITY ARCHITECTURE

    19. PRACTICE DEVICE - DQS ANSWER REVIEW

    20. QUIZ – NETWORK DIAGRAM & SECURITY ARCHITECTURE

About this course

  • $3,500.00
  • 359 lessons
  • 3 hours of video content
  • Downloadable content

Medical Device Cybersecurity Risk Management (CRM)

CRM for medical devices is the systematic process of identifying, analyzing, evaluating, and controlling risks related to cyber attacks, data breaches, and unauthorized access to medical device systems. Global regulators have emphasized CRM as essential for ensuring patient safety and product functionality. Medical devices increasingly contain software, wireless connectivity, and cloud interfaces, which expand their attack surface and potential vulnerabilities. A successful cyber attack could compromise device operation, corrupt patient data, enable unauthorized modifications to treatment parameters, or create patient safety hazards.

  • Analyze and apply regulatory requirements for cybersecurity in medical devices across multiple jurisdictions and integrate these requirements into design controls and product development processes.

  • Implement a Secure Product Development Framework (SPDF) that integrates cybersecurity considerations throughout the entire design control process, including threat modeling, security architecture development, and risk management activities.

  • Conduct comprehensive threat modeling using established methodologies to systematically identify security vulnerabilities, threats, and assets within medical device systems.

  • Execute cybersecurity risk assessments using standardized approaches to evaluate threats, vulnerabilities, and impacts through the CIA triad.

  • Design layered security architectures with effective risk control measures including authentication, authorization, encryption, evidence capture systems, trusted input validation, and patient record integrity protection.

  • Develop multi-layered cybersecurity evaluation strategies including penetration testing, vulnerability assessments, fuzz testing, and code reviews to validate security control effectiveness.

  • Create and maintain Software Bills of Materials (SBOMs) to ensure supply chain transparency, manage third-party software risks, and support vulnerability management.

  • Integrate cybersecurity into Software Development Life Cycle (SDLC) processes, including proper configuration management, traceability, and problem resolution.

  • Establish postmarket cybersecurity management processes including coordinated vulnerability disclosure, stakeholder communication, secure update mechanisms, and participation in Information Sharing Analysis Organizations (ISAOs).

Discover your potential, starting today