2 hours 23 minutes
Welcome back to I. T. Security Policy Training here on Cyber Harry. This is the course. Recap with myself. Troy Lemaire.
what type of policies did recover in this training?
Well, we looked at general policies, which were more about the users in the systems. We looked at network policies, which were more about the endpoint machines.
You looked at server policies, which are more about the server systems and then application policies. Which arm or about the applications that are in applicator in an organization. And specifically, we looked at Web applications
some of the policies that fell within each section, general policies we had. Except we use data backup and email policies
in the network policies we looked at B y o d. Or bring your own device, remote access and wireless security policy
and then in module for we looked at database credentials, disposal and activity review policy
application policies. Like said before we looked at application security policy, which really was focused on Web applications, security,
the links for the sample
policies that we use. They're here on the screen.
You'll be able to go to an look at an use if needed,
and again as always, questions or clarification. Reach me on Cyberia message. My user name is at trial A mayor and I want to sincerely thank you for taking this class on Cyberia. Hope you learned a lot in regards to I t security policy.
Thank you for your time.