January 21 & 22 | 5:30 to 7:30 p.m.
Register now
View programs
This course will focus on establishing the balance between business use and safeguard policies. It will concentrate on preparation of policies based on the different security domains based on business process. This course extends to cover laws governing breach of security policies and response mechanisms. Learners must begin by understanding business process before a security policy can be established. Processes are examined to visualize underlying security weaknesses and vulnerabilities and to assess the frameworks necessary for drafting an appropriate IT Security Policy.
January 21 & 22Explore programs starting in May or SeptemberRegister Now