Certified in Cybersecurity (CC): Security Best Practices & Security Awareness

placeholder

“A mature and successful organization will follow guidance and best practices to better secure all resources. Stakeholders at every level must understand their roles and responsibilities for contributing to a secure environment.

In this course the learner will begin by exploring common security policies including acceptable use policies (AUPs) and remote access policies. You will then review the processes of configuration and change management. Finally you will explore security awareness programs and topics and the security awareness trAIning life cycle.

This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.”