Security Policies

Course Information

Students study key structure elements and terms of written information protection policy and review typical policy contents. Students develop the related standards, procedures, and guidelines for implementing the policy. Students evaluate the tools needed to select, develop, and apply a security program that meets business goals.

Intake F25 SEM

Start Date Sep 09 / 2025

End Date

Prerequisite(s):

None

Computer Software Requirements:

n/a

Chats:

No

Group Work:

n/a