Students study key structure elements and terms of written information protection policy and review typical policy contents. Students develop the related standards, procedures, and guidelines for implementing the policy. Students evaluate the tools needed to select, develop, and apply a security program that meets business goals.
Sign UpExplore our available course intakes, designed to fit your schedule with flexible start dates. Whether you're studying online or in-class, each session is structured to provide a clear learning pathway.