Free
Introduction to IT Security Policy
Every organization should have documented policies to help protect data and other valuable assets. From introducing general policy to diving into network, server, and application security, our IT Security Policy course will equip you with the knowledge and expertise you need to create and implement guiding documentation for your organization.
2
H
23
M
Time
beginner
difficulty
3
ceu/cpe
Course Content
6.1 Course Recap
Module 6: Conclusion
1.1 Introduction to IT Security Policy
Module 1: Introduction
2.1 Intro to General Policies
Module 2: General Policies Section
3.1 Intro to Network Policies
Module 3: Network Policies Section
4.1 Intro to Server Policies
Module 4: Server Policies Section
5.1 Application Policy
Module 5: Application Security Policy
1.2 IT Security Policy Fundamentals
Module 1: Introduction
2.2 Acceptable Use Policy
Module 2: General Policies Section
3.2 Acquisition Policy
Module 3: Network Policies Section
4.2 Database Credentials Policy
Module 4: Server Policies Section
2.3 Encryption and Decryption Policy
Module 2: General Policies Section
3.3 BYOD Policy
Module 3: Network Policies Section
4.3 Disposal Policy
Module 4: Server Policies Section
2.4 Malicious Software Policy
Module 2: General Policies Section
3.4 Remote Access Policy
Module 3: Network Policies Section
4.4 Information Logging Policy
Module 4: Server Policies Section
2.5 Security Incident Policy
Module 2: General Policies Section
3.5 Remote Access Tools Policy
Module 3: Network Policies Section
4.5 Server Security Policy
Module 4: Server Policies Section
2.6 Disaster Recovery Plan Policy
Module 2: General Policies Section
3.6 Wireless Security Policy
Module 3: Network Policies Section
4.6 Workstation Policy
Module 4: Server Policies Section
2.7 Contingency Operations Policy
Module 2: General Policies Section
3.7 Bluetooth Policy
Module 3: Network Policies Section
2.8 Data Backup Policy
Module 2: General Policies Section
Course Description
Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.