Course Content

Module 1: Introduction

05:17
1.1 Introduction to IT Security Policy
03:25
1.2 IT Security Policy Fundamentals

Module 2: General Policies Section

02:23
2.1 Intro to General Policies
09:55
2.2 Acceptable Use Policy
05:44
2.3 Encryption and Decryption Policy
06:57
2.4 Malicious Software Policy
05:38
2.5 Security Incident Policy
05:35
2.6 Disaster Recovery Plan Policy
04:00
2.7 Contingency Operations Policy
03:30
2.8 Data Backup Policy
06:20
2.9 Email Security Policy
05:19
2.10 Unique User Identification Policy
06:29
2.11 Password Management Policy
06:18
2.12 Password Construction Policy

Module 3: Network Policies Section

01:59
3.1 Intro to Network Policies
06:48
3.2 Acquisition Policy
07:34
3.3 BYOD Policy
05:57
3.4 Remote Access Policy
04:10
3.5 Remote Access Tools Policy
04:14
3.6 Wireless Security Policy
04:43
3.7 Bluetooth Policy

Module 4: Server Policies Section

01:10
4.1 Intro to Server Policies
05:57
4.2 Database Credentials Policy
04:27
4.3 Disposal Policy
05:12
4.4 Information Logging Policy
05:19
4.5 Server Security Policy
03:24
4.6 Workstation Policy

Module 5: Application Security Policy

03:58
5.1 Application Policy

Module 6: Conclusion

01:36
6.1 Course Recap

Course Description

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Introduction to IT Security Policy Certificate of Completion

Verticals