New Skills

New Training: Identify Policies and Best Practices

by Team Nuggets
New Training: Wired Connectivity and Performance Issues picture: A
Follow us
Published on March 17, 2021

In this 13-video skill, CBT Nuggets trainer Anthony Sequeira teaches you about organizational polices and best practices, such as user agreements, password policies, data loss prevention practices, and Bring Your Own Device (BYOD) polices. Watch this new networking training.

Watch the full course: CompTIA Network+

This training includes:

  • 13 videos

  • 55 minutes of training

You’ll learn these topics in this skill:

  • Identify Policies & Best Practices: Privileged User Agreement

  • Identify Policies & Best Practices: Password Policy

  • Identify Policies & Best Practices: On-boarding and Off-boarding

  • Identify Policies & Best Practices: Licensing Restrictions

  • Identify Policies & Best Practices: International Export Controls

  • Identify Policies & Best Practices: Data Loss Prevention

  • Identify Policies & Best Practices: Remote Access Policies

  • Identify Policies & Best Practices: Incident Response Policies

  • Identify Policies & Best Practices: Bring Your Own Device (BYOD)

  • Identify Policies & Best Practices: Acceptable Use Policy (AUP)

  • Identify Policies & Best Practices: Non-disclosure Agreements (NDA)

  • Identify Policies & Best Practices: System Life Cycle

  • Identify Policies & Best Practices: Safety Procedures and Policies

What is a Bring Your Own Device (BYOD) Policy?

Bring Your Own Device (BYOD) policies are those that relate to employees bringing their own devices to work and using these devices to connect to the organization's networks and access-controlled systems, which then allows them to access confidential and potentially sensitive data.

BYOD has become especially prevalent in the age of COVID-19, as more organizations have allowed their employees to work from home and connect to their networks and computer systems from there. While some organizations officially support BYOD, others do not.

BYOD policies address how IT departments secure personal devices and the access levels that they provide them. They also strive to educate employees on the best practices for using these devices without potentially compromising an organization's systems. The elements of a BYOD policy can include what types of devices are approved, data ownership policies (including its securing), and what levels of IT support it will grant to personal devices, if any.


Download

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.


Don't miss out!Get great content
delivered to your inbox.

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522