Course Highlights
  • Explain the role of a security policy and how it protects people, organisations, and information
  • Evaluate the influence of policy on establishing acceptable bounds for behaviour
  • Evaluate existing IT governance policies
  • Explain self-direction in designing security policies to defend assets within the context of global communication and the web
Curriculum

5 Topics
Information Security Policy (ISP)
Information System Governance (ISG)
Information Security Management Systems (ISMS)
Access control
Summary and reflection

4 Topics
What is contingency planning?
Contingency planning
Incident response
Summary and reflection

  Write a Review

Information Security Policy and Management

Go to Paid Course