Time
2 hours 23 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:02
Welcome back to I. T. Security Policy Training here on Cyber Harry. This is the course. Recap with myself. Troy Lemaire.
00:11
So
00:12
what type of policies did recover in this training?
00:16
Well, we looked at general policies, which were more about the users in the systems. We looked at network policies, which were more about the endpoint machines.
00:24
You looked at server policies, which are more about the server systems and then application policies. Which arm or about the applications that are in applicator in an organization. And specifically, we looked at Web applications
00:38
some of the policies that fell within each section, general policies we had. Except we use data backup and email policies
00:46
in the network policies we looked at B y o d. Or bring your own device, remote access and wireless security policy
00:52
and then in module for we looked at database credentials, disposal and activity review policy
00:58
application policies. Like said before we looked at application security policy, which really was focused on Web applications, security,
01:08
the links for the sample
01:11
policies that we use. They're here on the screen.
01:15
You'll be able to go to an look at an use if needed,
01:21
and again as always, questions or clarification. Reach me on Cyberia message. My user name is at trial A mayor and I want to sincerely thank you for taking this class on Cyberia. Hope you learned a lot in regards to I t security policy.
01:34
Thank you for your time.

Introduction to IT Security Policy

Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Instructed By

Instructor Profile Image
Troy LeMaire
IT Security Officer at Acadian Ambulance
Instructor