• Online, Self-Paced
Course Description
Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.

Learning Objectives

By the end of this course, students should be able to: ❏ Understand IT Security Policies that need to be implemented. ❏ Know the difference between different types of IT Security Policies. ❏ Know the basic format for IT Security Policies ❏ Lay the groundwork for future classes

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.