Security Policy Management
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
Discovering the influence of policy, plan, and procedure on digital security and Information Security policies are designed to help individuals within an organization practice behaviors which reduce the risk of a breach of digital security.
This course, explains the key terms and critical concepts of information security, enabling you to successfully navigate and even create company data security policies at work.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Explain the role of a security policy and how it protects people, organizations, and information
- Evaluate the influence of policy on establishing acceptable bounds for behavior
- Evaluate existing IT governance policies
- Explain self-direction in designing security policies to defend assets within the context of global communication and the web
-
COURSE AUDIENCE
This course is made for:
- IT administrators
- Security coordinators
- Compliance managers
- Anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them
-
COURSE OUTLINE
Day One:
- Introduction
- Initiating a Security Policy Program
Day Two:
- Designing a Comprehensive Security Policy Program
- Case Study: Adhering to Industry Regulations
Day Three:
- Implementing Security Policies
- Communicating Security Policies
Day Four:
- Contingency Planning
Day Five:
- Performing Security Testing and Review
Keyword
Training Subject
Training Location