Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Information Security Policy and Management

Course Cover
compare button icon

Course Features

icon

Duration

2 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

5 hours per week

icon

Teaching Type

Self Paced

Course Description

Information Security policies are intended to assist individuals in an organization to adopt behaviors that reduce the likelihood of a digital security breach. This course will teach you how to navigate and create information security policies for your company. The reasons why organisations have Information Security Policies will be discussed. These could include the detection and prevention of misused data, computer systems and applications. You will also examine the Information Security Management System, which is a system that manages sensitive information to ensure its security. Learn the fundamental principles of access control. This includes password security issues and control architecture models. You'll also learn about biometrics, which is a method of authenticating people through unique biological characteristics. The process of preparing an organisation for, detecting, responding to, and recovering from natural or man-made threats to its information security assets will be covered in contingency planning (CP). You'll also learn about incident response, the process an organization uses to respond and manage cyber-attacks. We'll discuss the objectives of an incident response strategy as well as the stages and the roles of the different teams. The final step is to create an effective plan for incident response.

Course Overview

projects-img

Alumni Network

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Evaluate existing IT governance policies

Evaluate the influence of policy on establishing acceptable bounds for behaviour

Explain self-direction in designing security policies to defend assets within the context of global communication and the web

Explain the role of a security policy and how it protects people, organisations, and information

Target Students

This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them

Course Cover