Free

Introduction to IT Security Policy

Every organization should have documented policies to help protect data and other valuable assets. From introducing general policy to diving into network, server, and application security, our IT Security Policy course will equip you with the knowledge and expertise you need to create and implement guiding documentation for your organization.
2
23
M
Time
beginner
difficulty
3
ceu/cpe

Course Content

5.1 Application Policy

4m

Module 5: Application Security Policy
4.6 Workstation Policy

4m

Module 4: Server Policies Section
4.5 Server Security Policy

5m

Module 4: Server Policies Section
4.4 Information Logging Policy

5m

Module 4: Server Policies Section
4.3 Disposal Policy

4m

Module 4: Server Policies Section
4.2 Database Credentials Policy

6m

Module 4: Server Policies Section
4.1 Intro to Server Policies

1m

Module 4: Server Policies Section
3.7 Bluetooth Policy

5m

Module 3: Network Policies Section
3.6 Wireless Security Policy

4m

Module 3: Network Policies Section
3.5 Remote Access Tools Policy

4m

Module 3: Network Policies Section
3.4 Remote Access Policy

6m

Module 3: Network Policies Section
3.3 BYOD Policy

8m

Module 3: Network Policies Section
3.2 Acquisition Policy

7m

Module 3: Network Policies Section
3.1 Intro to Network Policies

2m

Module 3: Network Policies Section
2.12 Password Construction Policy

7m

Module 2: General Policies Section
2.11 Password Management Policy

7m

Module 2: General Policies Section
2.10 Unique User Identification Policy

5m

Module 2: General Policies Section
2.9 Email Security Policy

7m

Module 2: General Policies Section
2.8 Data Backup Policy

4m

Module 2: General Policies Section
2.7 Contingency Operations Policy

4m

Module 2: General Policies Section
2.6 Disaster Recovery Plan Policy

5m

Module 2: General Policies Section
2.5 Security Incident Policy

5m

Module 2: General Policies Section
2.4 Malicious Software Policy

7m

Module 2: General Policies Section
2.3 Encryption and Decryption Policy

6m

Module 2: General Policies Section
2.2 Acceptable Use Policy

10m

Module 2: General Policies Section
Course Description

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Troy LeMaire

I am currently the IT Security Officer for a regional Ambulance Company in the US. I have spent the last 15+ years with the responsibility of IT Security in my job roles. These roles have been in the healthcare and banking industry. I have been fortunate enough to lead an IT department while opening a green field hospital and lead an IT department for a bank that grew 300% in 5 years through acquisition.

I earned my MBA from Tulane, I also have my Bachelors in Management, and received my Associates degree in Pharmacy Technology from the US Air Force. I spent 5 years in the Air Force and was a Pharmacy Technician. While in the Air Force I was stationed at Nellis Air Force Base and the US Air Force Academy

In addition to teaching and being an IT Security Officer, I enjoy live music as well as duck hunting and traveling. Spending time with my family and all of the adventures that involves, have been opportunities to make great memories.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Introduction to IT Security Policy Certificate of Completion