Course Outline
Introduction
- Physical security as the foundation for overall security.
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards.
- Case Study.
Infrastructure Exposure Risks
- Servers.
- Switches.
- Routers.
- Cables.
- Storage.
- Other devices.
How Data Gets Compromised
- Capturing data traveling across network.
- Sniffer software.
- Plugging into a hub.
- Other methods.
Server Room Access
- Locks.
- Keys.
- Key codes.
- Log book.
Authorization
- Policies and Procedures.
- Card access.
- Request form.
- Approvals.
Electronic Access Systems
- Authentication.
- Smart card.
- Token.
- Biometric scan.
- Password expiration policies.
Computer Room Layout and Design
- Heating, ventilation, and air conditioning (HVAC).
- Doors, windows, and walls.
- Electrical Systems.
- Raised Floor Systems.
- Server Cabinet Systems.
- Cables.
- Alarms.
Assessing Vulnerabilities
- Evaluating the physical layout.
- Taking stock of devices.
- Temperature.
- Traffic.
- Using computer rooms as office space.
- Smoking, eating, and drinking.
Surveillance
- Continuous monitoring.
- Camera placement.
- Motion detection.
- Notification options.
Hardware Management and Maintenance
- Workstations.
- Rack mount servers.
- Case lock down.
- Portables.
Backup Systems
- Disaster recovery.
- Making storage devices inaccessible.
Printers
- On-board memory.
- Paper shredders.
Communication and Teamwork
- Communicating security policy objectives.
- Getting management buy-in.
- Getting team member on board.
Follow-up and Evaluation
- Measuring Effectiveness of Security Implementation.
- Analyzing Effects Over Time.
- Patching the Holes.
Keeping Up to Date
- Physical Security Resources.
Summary and Conclusion
Requirements
- A solid understanding of general network and cyber security concepts.
- Experience with computer room management is advantageous.
Target Audience
- Security professionals.
- Network and hardware engineers.
- Technicians.
- Facilities managers.
- System Administrators.
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.