Jessica Goodwin
b08bea7e-b862-4ef8-80ad-22efc9a57fff
CERTIFICATE OF
FOUNDER OF POLICYWIZARD
2025-03-29
This is to certify that
Has successfully completed the Information Security Policy Writer course by PolicyWizard. To achieve this certificate, they have completed the instructor-led training and practical exercises before passing a multiple-choice examination with a grade of 80% or higher.
STUART WEDGE
PROFICIENCY
CPD hours: 12

Distributed by:

Issued to

Jessica Goodwin

Want to report a typo or a mistake?

Credential Verification

Issue date: March 29, 2025

Expiration date: March 29, 2026

ID: b08bea7e-b862-4ef8-80ad-22efc9a57fff

Issued by

VERIFIED

PolicyWizard

PolicyWizard is a leader in the Information Security Policy space. We champion organisations to use policies to enable their security teams to provide a defined, monitored, and protected space to operate without malicious information interference.

Type

Course

Level

Intermediate

Format

Online

Duration

12 hours

Price

Paid

Description

The holder of this badge completed the Information Security Policy Writer course, a holistic journey into the world of policy development, when used to implement security controls that help organisations to define, monitor, and protect an operational area where they can do business without fear of malicious interference.

Skills

Policy Enforcement

Policy Development

Policy Governance

Risk Management

Risk Governance

Risk Mitigation

Security Management

Security Implementation

Security Policies

Security Analysis

Security Awareness

Security Controls

Information Security

Risk

Human Risk Management

Earning Criteria

Watching

40 videos

Reading

9 topic-specific articles

Assignment

1. Created a risk management methodology. 2. Identified ten possible malicious behaviours within their protection area, assessed them, and recorded the results in the risk register. 3. Created a control register to mitigate the ten risk scenarios. 4. Identified suitable administrative controls and created a Security Policy Framework. 5. Create an Information Security Policy to document the policy decisions.