Implement Policies to Mitigate Risk
The student will learn how to implement security policies, protecting data, incident response, providing realistic and timely training to their customer base. Students will learn how to implement security policies as well as implement different security controls including technical, administrative, and physical. Other policies include Acceptable Use Policy (AUP), Mandatory vacations, separation of duties, job rotation, clean desk policy, background checks, NDA, exit interviews, onboarding and offboarding. Other topics will be data retention, incident response, introduction to forensics, Order of Volatility and some of the tools with Kali Linux including Autopsy and the Sleuth kit as well as the dd utility.