Introduction to IT Security Policy, available from Cybrary, can equip you with the knowledge and expertise to be able to create and implement IT Security Policies in your organization.
Learning Objectives
By the end of this course, students should be able to:
- Understand IT Security Policies that need to be implemented.
- Know the difference between different types of IT Security Policies.
- Know the basic format for IT Security Policies
- Lay the groundwork for future classes
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):