Course Outline

Introduction

  • Physical security as the foundation for overall security

Overview of Computer Room Security and Maintenance Practices

  • Data Center and Server Room Standards
  • Case Study

Infrastructure Exposure Risks

  • Servers
  • Switches
  • Routers
  • Cables
  • Storage
  • Other devices

How Data Gets Compromised

  • Capturing data traveling across network
  • Sniffer software
  • Plugging into a hub
  • Other

Server Room Access

  • Locks
  • Keys
  • Key codes
  • Log book

Authorization

  • Policies and Procedures
  • Card access
  • Request form
  • Approvals

Electronic Access Systems

  • Authentication
  • Smart card
  • Token
  • Biometric scan
  • Password expiration policies

Computer Room Layout and Design

  • Heating, ventilation, and air conditioning (HVAC)
  • Doors, windows and walls
  • Electrical Systems
  • Raised Floor Systems
  • Server Cabinet Systems
  • Cables
  • Alarms

Assessing Vulnerabilities

  • Evaluating the physical layout
  • Taking stock of devices
  • Temperature
  • Traffic
  • Using computer as office space
  • Smoking, eating, and drinking

Surveillance

  • Continuous monitoring
  • Camera placement
  • Motion detection
  • Notification options

Hardware Management and Maintenance

  • Workstations
  • Rack mount servers
  • Case lock down
  • Portables

Backup Systems

  • Disaster recovery
  • Making storage devices inaccessible

Printers

  • On-board memory
  • Paper shredders

Communication and Teamwork

  • Communicating security policy objectives
  • Getting management buy-in
  • Getting team member on board

Follow-up and Evaluation

  • Measuring Effectiveness of Security Implementation
  • Analyzing Effects Over Time
  • Patching the Holes

Keeping Up to Date

  • Physical Security Resources

Summary and Conclusion

Requirements

  • An understanding of general network and cyber security concepts
  • Experience with computer room management is helpful

Audience

  • Security professionals
  • Network and hardware engineers
  • Technicians
  • Facilities managers
  • System Administrators
  14 Hours
 

Number of participants


Starts

Ends


Dates are subject to availability and take place between 09:30 and 16:30.
Open Training Courses require 5+ participants.

Testimonials (2)

Related Courses

CISA - Certified Information Systems Auditor

  28 Hours

Related Categories