Get in Touch

Course Outline

Introduction

  • Physical security as the foundation for overall security.

Overview of Computer Room Security and Maintenance Practices

  • Data Center and Server Room Standards.
  • Case Study.

Infrastructure Exposure Risks

  • Servers.
  • Switches.
  • Routers.
  • Cables.
  • Storage.
  • Other devices.

How Data Gets Compromised

  • Capturing data traveling across network.
  • Sniffer software.
  • Plugging into a hub.
  • Other methods.

Server Room Access

  • Locks.
  • Keys.
  • Key codes.
  • Log book.

Authorization

  • Policies and Procedures.
  • Card access.
  • Request form.
  • Approvals.

Electronic Access Systems

  • Authentication.
  • Smart card.
  • Token.
  • Biometric scan.
  • Password expiration policies.

Computer Room Layout and Design

  • Heating, ventilation, and air conditioning (HVAC).
  • Doors, windows, and walls.
  • Electrical Systems.
  • Raised Floor Systems.
  • Server Cabinet Systems.
  • Cables.
  • Alarms.

Assessing Vulnerabilities

  • Evaluating the physical layout.
  • Taking stock of devices.
  • Temperature.
  • Traffic.
  • Using computer rooms as office space.
  • Smoking, eating, and drinking.

Surveillance

  • Continuous monitoring.
  • Camera placement.
  • Motion detection.
  • Notification options.

Hardware Management and Maintenance

  • Workstations.
  • Rack mount servers.
  • Case lock down.
  • Portables.

Backup Systems

  • Disaster recovery.
  • Making storage devices inaccessible.

Printers

  • On-board memory.
  • Paper shredders.

Communication and Teamwork

  • Communicating security policy objectives.
  • Getting management buy-in.
  • Getting team member on board.

Follow-up and Evaluation

  • Measuring Effectiveness of Security Implementation.
  • Analyzing Effects Over Time.
  • Patching the Holes.

Keeping Up to Date

  • Physical Security Resources.

Summary and Conclusion

Requirements

  • A solid understanding of general network and cyber security concepts.
  • Experience with computer room management is advantageous.

Target Audience

  • Security professionals.
  • Network and hardware engineers.
  • Technicians.
  • Facilities managers.
  • System Administrators.
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories