Creating an Information Security Policy

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
Contact
Angela Ayers
Distance Learning and Professional Education
Contact Angela Ayers
404-385-3525
Summaries

Summary Sentence: Creating an Information Security Policy

Full Summary: This course will provide skills in how to determine policy needs and in developing, evaluating, and monitoring information security policies.

Information Security Policy is the fundamental and essential component of sound information security practice, and yet 60% of companies either have no policies or have policies that are out of date. Well formulated policy provides key high level descriptions of goals and expectations that are the basis for developing enterprise security procedures, mechanisms, controls, guidelines and standards needed for a comprehensive and effective information security program. This course provides the foundation skills for building an effective information security policy.

About The Course

This course will provide skills in how to determine policy needs and in developing, evaluating, and monitoring information security policies.

Who Should Attend

Managers, system and network engineers and administrators and consultants who are involved with the creation, review and maintenance of information security policies and procedures.

Prerequisites

Before beginning this course, you should understand and be conversant in the basic concepts of business information systems and information security.

Course Objectives

Information security policy issues, considerations, and recommended practices are addressed at increasing layers of complexity, beginning with the importance of corporate policies and who is responsible for them, followed by the life cycle for developing policies, types ands components of policies and policy maintenance issues including compliance and enforcement. At the successful completion of the course, you will be able to:

- Understand information security policy concepts
- Develop information security policy
- Utilize policy standards
- Maintain and review information security policies
- Plan for training and support

Related Links

Additional Information

In Campus Calendar
No
Groups

Professional Education

Invited Audience
No audiences were selected.
Categories
Career/Professional development
Keywords
creating web pages, html
Status
  • Created By: Eric Huffman
  • Workflow Status: Published
  • Created On: Jul 4, 2006 - 8:00pm
  • Last Updated: Oct 7, 2016 - 9:48pm