Time
2 hours 23 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello and welcome to I t Security policy here on Cyber Eri.
00:04
This is Module three. Network policies were gonna do the introduction of everything that's covered inside of module three
00:10
and this is being taught by myself. Troy Lemaire.
00:15
So the learning objective for this training is gonna be to understand what policies fit into network policy section as well as understanding what policies air. Actually, in the network policy section
00:28
what type of policies fit into network policy section.
00:31
Well, whenever we're looking at policies, your acquisition policy, which is a policy about how you acquire equipment or any type of acquisition of another company or anything like that the B Y o d. Policy, which is the bring your own device policy
00:47
remote access policy and root access tools, policies. And this is separated out because your remote access governs how you gonna be able to connect in remotely for somebody and the tools that are allowed to be used. You want to spell those out differently so that as your tools adjust if need be, you could go just that policy. Only
01:06
the new wireless security policy. If you do have a wireless security inside of your organization and then the Bluetooth policy. If you do allow Bluetooth to occur inside of your organization,
01:18
So if you are looking at any of these policies, you can go straight to them and don't have to go through all the courses inside of Module three. If you're interested in, say, the remote access policy, you can go straight to that video and watch it as well as watching the road access tools. It's up to you how you wanna proceed by going through. All the videos are just going straight to the one that most interests you
01:40
little brief electric today. But what we discussed is what policies fit into the network policy section, as well as what policies are actually in the network policy section.
01:49
If you have any questions or clarifications, as always, you can reach me on cyber a message. My user name is at trial mayor and thank you for attending this training

Up Next

Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
IT Security Officer at Acadian Ambulance
Instructor