Free
Introduction to IT Security Policy
Every organization should have documented policies to help protect data and other valuable assets. From introducing general policy to diving into network, server, and application security, our IT Security Policy course will equip you with the knowledge and expertise you need to create and implement guiding documentation for your organization.
2
H
23
M
Time
beginner
difficulty
3
ceu/cpe
Course Content
5.1 Application Policy
Module 5: Application Security Policy
3.1 Intro to Network Policies
Module 3: Network Policies Section
4.1 Intro to Server Policies
Module 4: Server Policies Section
2.1 Intro to General Policies
Module 2: General Policies Section
1.1 Introduction to IT Security Policy
Module 1: Introduction
6.1 Course Recap
Module 6: Conclusion
4.2 Database Credentials Policy
Module 4: Server Policies Section
3.2 Acquisition Policy
Module 3: Network Policies Section
2.2 Acceptable Use Policy
Module 2: General Policies Section
1.2 IT Security Policy Fundamentals
Module 1: Introduction
4.3 Disposal Policy
Module 4: Server Policies Section
3.3 BYOD Policy
Module 3: Network Policies Section
2.3 Encryption and Decryption Policy
Module 2: General Policies Section
4.4 Information Logging Policy
Module 4: Server Policies Section
3.4 Remote Access Policy
Module 3: Network Policies Section
2.4 Malicious Software Policy
Module 2: General Policies Section
4.5 Server Security Policy
Module 4: Server Policies Section
3.5 Remote Access Tools Policy
Module 3: Network Policies Section
2.5 Security Incident Policy
Module 2: General Policies Section
4.6 Workstation Policy
Module 4: Server Policies Section
3.6 Wireless Security Policy
Module 3: Network Policies Section
2.6 Disaster Recovery Plan Policy
Module 2: General Policies Section
3.7 Bluetooth Policy
Module 3: Network Policies Section
2.7 Contingency Operations Policy
Module 2: General Policies Section
2.8 Data Backup Policy
Module 2: General Policies Section
Course Description
Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.