Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.
By the end of this course, students should be able to:
❏ Understand IT Security Policies that need to be implemented.
❏ Know the difference between different types of IT Security Policies.
❏ Know the basic format for IT Security Policies
❏ Lay the groundwork for future classes