Policies and Best Practices

Intermediate
  • 12 videos | 1h 16m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 109 users Rating 4.6 of 109 users (109)
Best practices and guidelines should be implemented to ensure optimal network performance and security. Explore these guidelines, including password policies, data loss prevention techniques, NDAs, and safety procedures and policies

WHAT YOU WILL LEARN

  • Identify privileged user agreements
    Recognize appropriate password policies
    Describe onboarding and offboarding techniques
    Recognize appropriate licensing restrictions
    Describe international export controls
    Describe data loss prevention techniques
  • Deploy remote access policies
    Deploy incident response policies
    Describe appropriate situations to use byod, aup, and nda
    Describe best practices for system life cycles such as asset disposal
    Implement safety procedures and policies
    Incorporate best practice guidelines

IN THIS COURSE

  • 7m 36s
    Find out how to identify privileged user agreements. FREE ACCESS
  • 8m 33s
    After completing this video, you will be able to recognize appropriate password policies. FREE ACCESS
  • Locked
    3.  Onboarding and Offboarding
    5m 20s
    Upon completion of this video, you will be able to describe onboarding and offboarding processes. FREE ACCESS
  • Locked
    4.  Licensing Restrictions
    5m 48s
    Upon completion of this video, you will be able to recognize appropriate licensing restrictions. FREE ACCESS
  • Locked
    5.  International Export Controls
    3m 32s
    After completing this video, you will be able to describe international export controls. FREE ACCESS
  • Locked
    6.  Data Loss Prevention
    9m 11s
    After completing this video, you will be able to describe data loss prevention techniques. FREE ACCESS
  • Locked
    7.  Remote Access Policies
    8m 10s
    In this video, you will learn how to deploy remote access policies. FREE ACCESS
  • Locked
    8.  Incident Response Policies
    5m 51s
    In this video, you will learn how to deploy incident response policies. FREE ACCESS
  • Locked
    9.  BYOD, AUP, and NDA
    7m 42s
    Upon completion of this video, you will be able to describe appropriate situations for using BYOD, AUP, and NDA. FREE ACCESS
  • Locked
    10.  System Life Cycle
    4m 28s
    Upon completion of this video, you will be able to describe best practices for system life cycles, such as asset disposal. FREE ACCESS
  • Locked
    11.  Safety Procedures and Policies
    4m 44s
    In this video, you will learn about safety procedures and policies. FREE ACCESS
  • Locked
    12.  Exercise: Incorporate Best Practice Guidelines
    5m 10s
    In this video, you will learn how to incorporate best practices. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 6 users Rating 4.3 of 6 users (6)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 2240 users Rating 4.6 of 2240 users (2240)
Rating 4.5 of 238 users Rating 4.5 of 238 users (238)
Rating 4.5 of 1527 users Rating 4.5 of 1527 users (1527)