1.1 Introduction to IT Security Policy

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 23 minutes
Video Transcription
Hello and welcome to I t Security Policy Training on Cyber Eri
This is macho one the introduction and it'll be taught by myself. Troy Lemaire
So what is this course about this training from Sai Bury? It will cope you with knowledge and expertise so that you can create an implement i t security policies in your organization.
I've gone ahead and broken this up into four sections and each section is gonna have episodes that are gonna cover a specific topic.
Each of the episodes air under 10 minutes, so they're very short in nature, and the topics will cover our general policy network policy, server security and application security.
A good example of why you need policies in an organization. Remote access is something that is usually granted to vendors and third parties that need to connect in and provide support to you by remotely accessing the terminals inside of your network.
Well, if one of those tools that they use it has a vulnerability attached to it than that, vulnerability is automatically attached to your network in your organization. So
if you want to be able to provide a policy to the different departments and staff that says, these are the types of remote access is that we allow. And these are the types of remote access tools that we allow that could be put into a policy that is spread out all the
departments and the employees. And then at that point, if they don't involve I t department win providing remote access, at least they have some guidance and a policy that they can look at to discuss with their vendor or their third party.
But the target audience for this course, if you are a computer science, are a cybersecurity student. You're looking to learn more about I t. Security policies.
If you're a career professional that's looking to make the jump into the I T. Security work,
if you're an engineer and you're looking to improve your understanding of I T. Security,
and if you're a leader who's looking to implement I T. Security policies in your organization, this is a great course for you to be able to take
pre requisites. So if you have a good knowledge of the basic
I T. Terminology,
understanding of network concepts and understanding of server concepts and an understanding of application concepts, then you will understand the material that's inside of this course. If you don't know any of these things are not as knowledge was. You want to be in any of these topics. Cyberia has some great
courses that will help you to be able to have a better understanding of the concepts that are listed on the screen
a little bit about myself. Begin. My name is Troy Lemaire. I'm an I T security officer and also a teacher here on Cyber Eri.
I have about 16 years working with I t Security.
In the last 10 years, I've been working in I t security in the health care and the banking industry.
But the learning objectives of this course
what you will be able to walk away with a good understanding of i t security policies that need to be implemented in an organization. The difference between the different types of i t security policies
Definitely trying to make you understand the basic format of I t security policies and what they're supposed to look like and then laying the groundwork for any future classes that you want to take in regards to I t security.
So we have a pre assessment.
What type of policies do you want to learn more about?
If you want to learn about general policies, which arm or about the user's than the systems?
Or do you want to learn more about network policies? Which is more by the end points?
Do you want to learn more about server policies, which is about the server systems? Or do you want to learn more about the application policies, which is about the applications that are used within an organization?
If you wanna learn about general policies, you gonna want to go to Module two
Some of the policies that are listed in there or acceptable use data Bake up
data backup and evil policies.
If you wanna learn about network policies, you would look at Module three and they have such policies. Is B Y O D. Which is bring your own device. Remote access, which we talked about previously. And then wireless security policy.
Bonjour fours about server policies. And that's
things like database credentials, disposal of equipment and activity review policy.
And then Module five is application policy, and it covers the application security within an organization.
The links on the screen or places that have free templates for you to be able to use
in regards to I t Security and will be referencing these throughout this course.
In summary, the things we learned about today are about the course and what it's what it's gonna be about the target audience of who should be looking at taking this course, the prerequisites
that you need to have before you start this course,
the learning objectives of going through this course and then the pre assessment to know what type of policies you're looking for.
Now, if you have any questions or you need clarification about anything, you can reach me through cyber message.
My username is at Troy Lemaire and I thank you for attending this course.
Up Next
Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By