CISM 2020: IT Security Policies
CISM
| Intermediate
- 14 videos | 1h 21m 53s
- Includes Assessment
- Earns a Badge
IT security policies guide how IT services are deployed and managed in an organization. To achieve certification in information security management, you'll need to demonstrate a clear understanding of what policies exist and where and how to implement them. In this course, you'll explore various types of security policies, starting with those for securing change and patch management. You'll then investigate some network and host security hardening techniques. You'll move on to practice hardening Windows and Linux servers as well as a network printer and passwords. You'll then examine how to detect social engineering scams and deal with malware infections. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how it security policies must align to securing business processesUse change management to securely modify network and device configurations in a structured mannerUse patch management to securely deploy updates in a structured mannerIdentify common hardening techniques for networks and hostsHarden a windows serverHarden a linux server
-
Harden a network printer deviceHarden password usageCentrally deploy security settings via group policyRecognize various methods by which malicious users attempt to trick victimsIllustrate phishing email messagesIdentify common types of malwareSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 19s
-
6m 15sUpon completion of this video, you will be able to recognize how IT security policies must align with securing business processes. FREE ACCESS
-
5m 32sIn this video, you will use change management to modify network and device configurations in a secure and structured manner. FREE ACCESS
-
5m 37sIn this video, you will learn how to use patch management to deploy updates securely and in a structured manner. FREE ACCESS
-
5m 54sIn this video, you will identify common hardening techniques for networks and hosts. FREE ACCESS
-
11m 15sDuring this video, you will learn how to harden a Windows server. FREE ACCESS
-
8m 1sLearn how to harden a Linux server. FREE ACCESS
-
6m 31sIn this video, you will learn how to harden a network printer device. FREE ACCESS
-
7m 2sDuring this video, you will learn how to use passwords more securely. FREE ACCESS
-
6m 34sIn this video, you will learn how to deploy security settings centrally via Group Policy. FREE ACCESS
-
5m 51sAfter completing this video, you will be able to recognize various methods that malicious users attempt to trick victims. FREE ACCESS
-
5m 39sUpon completion of this video, you will be able to illustrate phishing email messages. FREE ACCESS
-
5m 22sFind out how to identify common types of malware. FREE ACCESS
-
1m 1s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.