This course will teach you the risks and consequences of a user action that affects the security of the information system, enable you to explain and justify the constraints imposed by the security policy, and help you understand the main countermeasures in place within the company.