• No products in the cart.

Information Management Guidelines

Description

Course Overview

Explore security concepts related to information management, data protection and destruction mechanisms, incident management procedures, remote access procedures, physical controls, common threats and defensive mechanisms to protect corporate assets from malicious attacks. The following are the highlights of the course:

  • How to classify business information to ensure its appropriate protection
  • How to share business information in a compliant manner
  • distinguish between confidentiality, integrity, and availability of security objectives
  • identify computer and hardware security policy best practices
  • describe characteristics and best practices for using file encryption and access controls, system patches and antivirus software to protect your corporate computer
  • define incident response and the incident response process
  • define disaster recovery and the disaster recovery plan
  • describe media sanitization and data destruction
  • describe the purpose of data retention