Get in Touch

Course Outline

Introduction

  • Physical security as the foundation for overall security

Overview of Computer Room Security and Maintenance Practices

  • Data Center and Server Room Standards
  • Case Study

Infrastructure Exposure Risks

  • Servers
  • Switches
  • Routers
  • Cables
  • Storage
  • Other devices

How Data Gets Compromised

  • Capturing data traveling across the network
  • Sniffer software
  • Plugging into a hub
  • Other methods

Server Room Access

  • Locks
  • Keys
  • Key codes
  • Log book

Authorization

  • Policies and Procedures
  • Card access
  • Request form
  • Approvals

Electronic Access Systems

  • Authentication
  • Smart card
  • Token
  • Biometric scan
  • Password expiration policies

Computer Room Layout and Design

  • Heating, ventilation, and air conditioning (HVAC)
  • Doors, windows, and walls
  • Electrical Systems
  • Raised Floor Systems
  • Server Cabinet Systems
  • Cables
  • Alarms

Assessing Vulnerabilities

  • Evaluating the physical layout
  • Taking stock of devices
  • Temperature control
  • Traffic management
  • Using the computer room as office space
  • Smoking, eating, and drinking policies

Surveillance

  • Continuous monitoring
  • Camera placement
  • Motion detection
  • Notification options

Hardware Management and Maintenance

  • Workstations
  • Rack mount servers
  • Case lock down
  • Portable devices

Backup Systems

  • Disaster recovery
  • Securing storage devices

Printers

  • On-board memory
  • Paper shredders

Communication and Teamwork

  • Communicating security policy objectives
  • Gaining management support
  • Ensuring team member involvement

Follow-up and Evaluation

  • Measuring the effectiveness of security measures
  • Analyzing long-term impacts
  • Addressing vulnerabilities

Keeping Up to Date

  • Physical security resources

Summary and Conclusion

Requirements

  • A basic understanding of general network and cybersecurity concepts.
  • Prior experience in computer room management is beneficial.

Audience

  • Security professionals
  • Network and hardware engineers
  • Technicians
  • Facilities managers
  • System Administrators
 14 Hours

Testimonials (4)

Related Categories