Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.
Learning Objectives
By the end of this course, students should be able to:
- Understand IT Security Policies that need to be implemented.
- Know the difference between different types of IT Security Policies.
- Know the basic format for IT Security Policies
- Lay the groundwork for future classes
Framework Connections
Specialty Areas
- Strategic Planning and Policy
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.