New Training: Identify Policies and Best Practices
In this 13-video skill, CBT Nuggets trainer Anthony Sequeira teaches you about organizational polices and best practices, such as user agreements, password policies, data loss prevention practices, and Bring Your Own Device (BYOD) polices. Watch this new networking training.
Watch the full course: CompTIA Network+
This training includes:
13 videos
55 minutes of training
You’ll learn these topics in this skill:
Identify Policies & Best Practices: Privileged User Agreement
Identify Policies & Best Practices: Password Policy
Identify Policies & Best Practices: On-boarding and Off-boarding
Identify Policies & Best Practices: Licensing Restrictions
Identify Policies & Best Practices: International Export Controls
Identify Policies & Best Practices: Data Loss Prevention
Identify Policies & Best Practices: Remote Access Policies
Identify Policies & Best Practices: Incident Response Policies
Identify Policies & Best Practices: Bring Your Own Device (BYOD)
Identify Policies & Best Practices: Acceptable Use Policy (AUP)
Identify Policies & Best Practices: Non-disclosure Agreements (NDA)
Identify Policies & Best Practices: System Life Cycle
Identify Policies & Best Practices: Safety Procedures and Policies
What is a Bring Your Own Device (BYOD) Policy?
Bring Your Own Device (BYOD) policies are those that relate to employees bringing their own devices to work and using these devices to connect to the organization's networks and access-controlled systems, which then allows them to access confidential and potentially sensitive data.
BYOD has become especially prevalent in the age of COVID-19, as more organizations have allowed their employees to work from home and connect to their networks and computer systems from there. While some organizations officially support BYOD, others do not.
BYOD policies address how IT departments secure personal devices and the access levels that they provide them. They also strive to educate employees on the best practices for using these devices without potentially compromising an organization's systems. The elements of a BYOD policy can include what types of devices are approved, data ownership policies (including its securing), and what levels of IT support it will grant to personal devices, if any.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.