6.1 Course Recap
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:02
Welcome back to I. T. Security Policy Training here on Cyber Harry. This is the course. Recap with myself. Troy Lemaire.
00:11
So
00:12
what type of policies did recover in this training?
00:16
Well, we looked at general policies, which were more about the users in the systems. We looked at network policies, which were more about the endpoint machines.
00:24
You looked at server policies, which are more about the server systems and then application policies. Which arm or about the applications that are in applicator in an organization. And specifically, we looked at Web applications
00:38
some of the policies that fell within each section, general policies we had. Except we use data backup and email policies
00:46
in the network policies we looked at B y o d. Or bring your own device, remote access and wireless security policy
00:52
and then in module for we looked at database credentials, disposal and activity review policy
00:58
application policies. Like said before we looked at application security policy, which really was focused on Web applications, security,
01:08
the links for the sample
01:11
policies that we use. They're here on the screen.
01:15
You'll be able to go to an look at an use if needed,
01:21
and again as always, questions or clarification. Reach me on Cyberia message. My user name is at trial A mayor and I want to sincerely thank you for taking this class on Cyberia. Hope you learned a lot in regards to I t security policy.
01:34
Thank you for your time.
Similar Content