A study of information security (IS) performance standards and policy implementation for IS system administrators. The goal is to analyze the application of security policy and security assessment findings to security procedures and processes. Topics include contents of a security policy; general procedures related to secure use of data; general awareness; training and education plans; and general countermeasures and safeguards, including access controls, auditing, management oversight, and configuration management.
After completing this course, students should be able to:
Evaluate and select solutions to support security policy requirements
Develop and implement security procedures and processes to support security policy requirements, including security program measures
Communicate policies, procedures, and processes to organizational stakeholders through a security education, training, and awareness program
Implement continuous change management processes to assess and update security controls' effectiveness
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.