Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Introduction to IT Security Policy

via Cybrary

Description

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Tags

Syllabus

  • Module 1: Introduction
    • 1.1 Introduction to IT Security Policy
    • 1.2 IT Security Policy Fundamentals
  • Module 2: General Policies Section
    • 2.1 Intro to General Policies
    • 2.2 Acceptable Use Policy
    • 2.3 Encryption and Decryption Policy
    • 2.4 Malicious Software Policy
    • 2.5 Security Incident Policy
    • 2.6 Disaster Recovery Plan Policy
    • 2.7 Contingency Operations Policy
    • 2.8 Data Backup Policy
    • 2.9 Email Security Policy
    • 2.10 Unique User Identification Policy
    • 2.11 Password Management Policy
    • 2.12 Password Construction Policy
  • Module 3: Network Policies Section
    • 3.1 Intro to Network Policies
    • 3.2 Acquisition Policy
    • 3.3 BYOD Policy
    • 3.4 Remote Access Policy
    • 3.5 Remote Access Tools Policy
    • 3.6 Wireless Security Policy
    • 3.7 Bluetooth Policy
  • Module 4: Server Policies Section
    • 4.1 Intro to Server Policies
    • 4.2 Database Credentials Policy
    • 4.3 Disposal Policy
    • 4.4 Information Logging Policy
    • 4.5 Server Security Policy
    • 4.6 Workstation Policy
  • Module 5: Application Security Policy
    • 5.1 Application Policy
  • Module 6: Conclusion
    • 6.1 Course Recap

Online Course


Introduction to IT Security Policy

via Cybrary
Affiliate notice

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

  • Module 1: Introduction
    • 1.1 Introduction to IT Security Policy
    • 1.2 IT Security Policy Fundamentals
  • Module 2: General Policies Section
    • 2.1 Intro to General Policies
    • 2.2 Acceptable Use Policy
    • 2.3 Encryption and Decryption Policy
    • 2.4 Malicious Software Policy
    • 2.5 Security Incident Policy
    • 2.6 Disaster Recovery Plan Policy
    • 2.7 Contingency Operations Policy
    • 2.8 Data Backup Policy
    • 2.9 Email Security Policy
    • 2.10 Unique User Identification Policy
    • 2.11 Password Management Policy
    • 2.12 Password Construction Policy
  • Module 3: Network Policies Section
    • 3.1 Intro to Network Policies
    • 3.2 Acquisition Policy
    • 3.3 BYOD Policy
    • 3.4 Remote Access Policy
    • 3.5 Remote Access Tools Policy
    • 3.6 Wireless Security Policy
    • 3.7 Bluetooth Policy
  • Module 4: Server Policies Section
    • 4.1 Intro to Server Policies
    • 4.2 Database Credentials Policy
    • 4.3 Disposal Policy
    • 4.4 Information Logging Policy
    • 4.5 Server Security Policy
    • 4.6 Workstation Policy
  • Module 5: Application Security Policy
    • 5.1 Application Policy
  • Module 6: Conclusion
    • 6.1 Course Recap