CISM 2020: IT Security Policies

CISM    |    Intermediate
  • 14 videos | 1h 21m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 127 users Rating 4.3 of 127 users (127)
IT security policies guide how IT services are deployed and managed in an organization. To achieve certification in information security management, you'll need to demonstrate a clear understanding of what policies exist and where and how to implement them. In this course, you'll explore various types of security policies, starting with those for securing change and patch management. You'll then investigate some network and host security hardening techniques. You'll move on to practice hardening Windows and Linux servers as well as a network printer and passwords. You'll then examine how to detect social engineering scams and deal with malware infections. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how it security policies must align to securing business processes
    Use change management to securely modify network and device configurations in a structured manner
    Use patch management to securely deploy updates in a structured manner
    Identify common hardening techniques for networks and hosts
    Harden a windows server
    Harden a linux server
  • Harden a network printer device
    Harden password usage
    Centrally deploy security settings via group policy
    Recognize various methods by which malicious users attempt to trick victims
    Illustrate phishing email messages
    Identify common types of malware
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 19s
  • 6m 15s
    Upon completion of this video, you will be able to recognize how IT security policies must align with securing business processes. FREE ACCESS
  • Locked
    3.  Change Management for Secure Configurations
    5m 32s
    In this video, you will use change management to modify network and device configurations in a secure and structured manner. FREE ACCESS
  • Locked
    4.  Patch Management for Secure Updates
    5m 37s
    In this video, you will learn how to use patch management to deploy updates securely and in a structured manner. FREE ACCESS
  • Locked
    5.  Hardening Techniques for Networks and Hosts
    5m 54s
    In this video, you will identify common hardening techniques for networks and hosts. FREE ACCESS
  • Locked
    6.  Securing a Windows Server
    11m 15s
    During this video, you will learn how to harden a Windows server. FREE ACCESS
  • Locked
    7.  Securing a Linux Server
    8m 1s
    Learn how to harden a Linux server. FREE ACCESS
  • Locked
    8.  Securing a Network Printer
    6m 31s
    In this video, you will learn how to harden a network printer device. FREE ACCESS
  • Locked
    9.  Implementing Password Policies in Windows
    7m 2s
    During this video, you will learn how to use passwords more securely. FREE ACCESS
  • Locked
    10.  Deploying Security Settings Using Microsoft Group Policy
    6m 34s
    In this video, you will learn how to deploy security settings centrally via Group Policy. FREE ACCESS
  • Locked
    11.  Social Engineering Methods
    5m 51s
    After completing this video, you will be able to recognize various methods that malicious users attempt to trick victims. FREE ACCESS
  • Locked
    12.  Detecting Phishing Scams
    5m 39s
    Upon completion of this video, you will be able to illustrate phishing email messages. FREE ACCESS
  • Locked
    13.  Common Malware Types
    5m 22s
    Find out how to identify common types of malware. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 1s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 12 users Rating 4.9 of 12 users (12)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 85 users Rating 4.6 of 85 users (85)
Rating 4.5 of 37 users Rating 4.5 of 37 users (37)
Rating 4.6 of 198 users Rating 4.6 of 198 users (198)