CISM 2020: IT Security Policies


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

IT security policies guide how IT services are deployed and managed in an organization. To achieve certification in information security management, you'll need to demonstrate a clear understanding of what policies exist and where and how to implement them.

In this course, you'll explore various types of security policies, starting with those for securing change and patch management. You'll then investigate some network and host security hardening techniques.

You'll move on to practice hardening Windows and Linux servers as well as a network printer and passwords. You'll then examine how to detect social engineering scams and deal with malware infections.

This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.



Expected Duration (hours)
1.4

Lesson Objectives

CISM 2020: IT Security Policies

  • discover the key concepts covered in this course
  • recognize how IT security policies must align to securing business processes
  • use change management to securely modify network and device configurations in a structured manner
  • use patch management to securely deploy updates in a structured manner
  • identify common hardening techniques for networks and hosts
  • harden a Windows server
  • harden a Linux server
  • harden a network printer device
  • harden password usage
  • centrally deploy security settings via Group Policy
  • recognize various methods by which malicious users attempt to trick victims
  • illustrate phishing email messages
  • identify common types of malware
  • summarize the key concepts covered in this course
  • Course Number:
    it_spcism2020_08_enus

    Expertise Level
    Intermediate