New Training: Identify Policies and Best Practices
| new skills - Team Nuggets

New Training: Identify Policies and Best Practices

In this 13-video skill, CBT Nuggets trainer Anthony Sequeira teaches you about organizational polices and best practices, such as user agreements, password policies, data loss prevention practices, and Bring Your Own Device (BYOD) polices. Watch this new networking training.

Watch the full course: CompTIA Network+

This training includes:

  • 13 videos
  • 55 minutes of training

You’ll learn these topics in this skill:

  • Identify Policies & Best Practices: Privileged User Agreement
  • Identify Policies & Best Practices: Password Policy
  • Identify Policies & Best Practices: On-boarding and Off-boarding
  • Identify Policies & Best Practices: Licensing Restrictions
  • Identify Policies & Best Practices: International Export Controls
  • Identify Policies & Best Practices: Data Loss Prevention
  • Identify Policies & Best Practices: Remote Access Policies
  • Identify Policies & Best Practices: Incident Response Policies
  • Identify Policies & Best Practices: Bring Your Own Device (BYOD)
  • Identify Policies & Best Practices: Acceptable Use Policy (AUP)
  • Identify Policies & Best Practices: Non-disclosure Agreements (NDA)
  • Identify Policies & Best Practices: System Life Cycle
  • Identify Policies & Best Practices: Safety Procedures and Policies

What is a Bring Your Own Device (BYOD) Policy?

Bring Your Own Device (BYOD) policies are those that relate to employees bringing their own devices to work and using these devices to connect to the organization's networks and access-controlled systems, which then allows them to access confidential and potentially sensitive data.

BYOD has become especially prevalent in the age of COVID-19, as more organizations have allowed their employees to work from home and connect to their networks and computer systems from there. While some organizations officially support BYOD, others do not.

BYOD policies address how IT departments secure personal devices and the access levels that they provide them. They also strive to educate employees on the best practices for using these devices without potentially compromising an organization's systems. The elements of a BYOD policy can include what types of devices are approved, data ownership policies (including its securing), and what levels of IT support it will grant to personal devices, if any.

Download

Download

Ultimate Networking Cert Guide

A 97-page guide to every Cisco, Juniper, F5, and NetApp certification, and how they fit into your career.

By submitting this form you agree that you have read, understood, and are able to consent to our privacy policy.

LEARNING ON MOBILE

Learn anytime anywhere with our mobile apps.

I have read and understood the privacy policy and am able to consent to it.

© 2021 CBT Nuggets. All rights reserved. Terms | Privacy Policy | Accessibility | Sitemap | 1550 Valley River Drive, Eugene, OR 97401 | 541-284-5522
CBT Nuggets