Computer Room Security and Maintenance Training Course

Course Code

computerroom

Duration

14 hours (usually 2 days including breaks)

Requirements

  • An understanding of general network and cyber security concepts
  • Experience with computer room management is helpful

Audience

  • Security professionals
  • Network and hardware engineers
  • Technicians
  • Facilities managers
  • System Administrators

Overview

Network security begins at the physical level. In this instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.

By the end of this training, participants will be able to:

  • Assess their organization's security risk, as it relates to computer server rooms.
  • Set up control and monitoring systems to restrict physical access to infrastructure.
  • Design access policies for different members.
  • Effectively communicate security policies with team members.

Format of the Course

  • Part lecture, part discussion, exercises and hands-on practice.

Note

  • To request a customized training for this course, please contact us to arrange.

Course Outline

Introduction

  • Physical security as the foundation for overall security

Overview of Computer Room Security and Maintenance Practices

  • Data Center and Server Room Standards
  • Case Study

Infrastructure Exposure Risks

  • Servers
  • Switches
  • Routers
  • Cables
  • Storage
  • Other devices

How Data Gets Compromised

  • Capturing data traveling across network
  • Sniffer software
  • Plugging into a hub
  • Other

Server Room Access

  • Locks
  • Keys
  • Key codes
  • Log book

Authorization

  • Policies and Procedures
  • Card access
  • Request form
  • Approvals

Electronic Access Systems

  • Authentication
  • Smart card
  • Token
  • Biometric scan
  • Password expiration policies

Computer Room Layout and Design

  • Heating, ventilation, and air conditioning (HVAC)
  • Doors, windows and walls
  • Electrical Systems
  • Raised Floor Systems
  • Server Cabinet Systems
  • Cables
  • Alarms

Assessing Vulnerabilities

  • Evaluating the physical layout
  • Taking stock of devices
  • Temperature
  • Traffic
  • Using computer as office space
  • Smoking, eating, and drinking

Surveillance

  • Continuous monitoring
  • Camera placement
  • Motion detection
  • Notification options

Hardware Management and Maintenance

  • Workstations
  • Rack mount servers
  • Case lock down
  • Portables

Backup Systems

  • Disaster recovery
  • Making storage devices inaccessible

Printers

  • On-board memory
  • Paper shredders

Communication and Teamwork

  • Communicating security policy objectives
  • Getting management buy-in
  • Getting team member on board

Follow-up and Evaluation

  • Measuring Effectiveness of Security Implementation
  • Analyzing Effects Over Time
  • Patching the Holes

Keeping Up to Date

  • Physical Security Resources

Summary and Conclusion

Testimonials

★★★★★
★★★★★

Related Categories

Related Courses

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients