Course Outline
Introduction
- Physical security as the foundation for overall security
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards
- Case Study
Infrastructure Exposure Risks
- Servers
- Switches
- Routers
- Cables
- Storage
- Other devices
How Data Gets Compromised
- Capturing data traveling across the network
- Sniffer software
- Plugging into a hub
- Other methods
Server Room Access
- Locks
- Keys
- Key codes
- Log book
Authorization
- Policies and Procedures
- Card access
- Request form
- Approvals
Electronic Access Systems
- Authentication
- Smart card
- Token
- Biometric scan
- Password expiration policies
Computer Room Layout and Design
- Heating, ventilation, and air conditioning (HVAC)
- Doors, windows, and walls
- Electrical Systems
- Raised Floor Systems
- Server Cabinet Systems
- Cables
- Alarms
Assessing Vulnerabilities
- Evaluating the physical layout
- Taking stock of devices
- Temperature control
- Traffic management
- Using the computer room as office space
- Smoking, eating, and drinking policies
Surveillance
- Continuous monitoring
- Camera placement
- Motion detection
- Notification options
Hardware Management and Maintenance
- Workstations
- Rack mount servers
- Case lock down
- Portable devices
Backup Systems
- Disaster recovery
- Securing storage devices
Printers
- On-board memory
- Paper shredders
Communication and Teamwork
- Communicating security policy objectives
- Gaining management support
- Ensuring team member involvement
Follow-up and Evaluation
- Measuring the effectiveness of security measures
- Analyzing long-term impacts
- Addressing vulnerabilities
Keeping Up to Date
- Physical security resources
Summary and Conclusion
Requirements
- A basic understanding of general network and cybersecurity concepts.
- Prior experience in computer room management is beneficial.
Audience
- Security professionals
- Network and hardware engineers
- Technicians
- Facilities managers
- System Administrators
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects