Course Outline

Introduction

  • Physical security as the foundation for overall security

Overview of Computer Room Security and Maintenance Practices

  • Data Center and Server Room Standards
  • Case Study

Infrastructure Exposure Risks

  • Servers
  • Switches
  • Routers
  • Cables
  • Storage
  • Other devices

How Data Gets Compromised

  • Capturing data traveling across network
  • Sniffer software
  • Plugging into a hub
  • Other

Server Room Access

  • Locks
  • Keys
  • Key codes
  • Log book

Authorization

  • Policies and Procedures
  • Card access
  • Request form
  • Approvals

Electronic Access Systems

  • Authentication
  • Smart card
  • Token
  • Biometric scan
  • Password expiration policies

Computer Room Layout and Design

  • Heating, ventilation, and air conditioning (HVAC)
  • Doors, windows and walls
  • Electrical Systems
  • Raised Floor Systems
  • Server Cabinet Systems
  • Cables
  • Alarms

Assessing Vulnerabilities

  • Evaluating the physical layout
  • Taking stock of devices
  • Temperature
  • Traffic
  • Using computer as office space
  • Smoking, eating, and drinking

Surveillance

  • Continuous monitoring
  • Camera placement
  • Motion detection
  • Notification options

Hardware Management and Maintenance

  • Workstations
  • Rack mount servers
  • Case lock down
  • Portables

Backup Systems

  • Disaster recovery
  • Making storage devices inaccessible

Printers

  • On-board memory
  • Paper shredders

Communication and Teamwork

  • Communicating security policy objectives
  • Getting management buy-in
  • Getting team member on board

Follow-up and Evaluation

  • Measuring Effectiveness of Security Implementation
  • Analyzing Effects Over Time
  • Patching the Holes

Keeping Up to Date

  • Physical Security Resources

Summary and Conclusion

Requirements

  • An understanding of general network and cyber security concepts
  • Experience with computer room management is helpful

Audience

  • Security professionals
  • Network and hardware engineers
  • Technicians
  • Facilities managers
  • System Administrators
  14 Hours
 

Testimonials

Related Courses

CISMP - Certificate in Information Security Management Principles

  21 hours

CISM - Certified Information Security Manager

  28 hours

CISA - Certified Information Systems Auditor

  28 hours

Cybersecurity Fundamentals

  28 hours

Public Key Infrastructure

  21 hours

Building up information security according to ISO 27005

  21 hours

DevOps Security: Creating a DevOps Security Strategy

  7 hours

NB-IoT for Developers

  7 hours

Network Penetration Testing

  35 hours

Security Policy Management

  35 hours

Open Data Risk Analysis and Management

  21 hours

Open Authentication (OAuth)

  7 hours

Honeywell Security System

  14 hours

Security Management

  14 hours

CipherTrust Manager

  21 hours