Designing and Implementing Security Policies
Pluralsight is not an official partner or accredited training center of EC-Council. In this course you'll develop an understanding of proper functions and how to design your own security policies within business and regulatory requirements.
What you'll learn
Pluralsight is not an official partner or accredited training center of EC-Council. Without IT security policies, organizations have no framework that defines the proper and safe use of IT systems and data. In this course, Designing and Implementing Security Policies, you'll be exposed to security standards bodies, and how to create security policies based on recommendations from these standards bodies. First, you'll learn examples of implementing security settings based on security policy documentation. Next, you'll learn how to determine the finer details of security policies, including the use of specific security controls and the consequences of policy non-compliance. Finally, you'll gain insight on how technical controls can be interpreted and then implemented for policy compliance. By the end of this course, you'll have an understanding of how policy documents are laid out, and how to design and implement security policies within business and regulatory requirements.
Table of contents
- Module Overview, Cyber Law, and Cyber Insurance 5m
- Cyber Insurance Offerings 1m
- International Organization for Standardization (ISO) 5m
- Payment Card Industry Data Security Standard (PCI DSS) 3m
- Review PCI DSS Security Requirements 3m
- PCI DSS Self-Assessment Questionnaire 3m
- Implement PCI DSS Security Requirements 1m
- Health Insurance Portability and Accountability Act (HIPAA) 2m
- Review HIPAA Technical Security Requirements 2m
- Other Privacy and Security Standards 3m
- Module Summary 1m
- Module Introduction 2m
- Security Policy Design Guidelines 6m
- View SANS Institute Policy Templates 4m
- General Security Policy Types 4m
- Network Security Policies 5m
- Configure a Router Network ACL Rule 4m
- Switch Port Configuration 4m
- Network Security Policy Types 8m
- NIDS/NIPS 3m
- Data Security Policies 7m
- Data Encryption and Backups 6m
- Device Security Policies 6m
- Security Policy Implementation 2m
- Module Summary 2m