Course Outline
Introduction
- Physical security as the foundation for overall security
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards
- Case Study
Infrastructure Exposure Risks
- Servers
- Switches
- Routers
- Cables
- Storage
- Other devices
How Data Gets Compromised
- Capturing data traveling across network
- Sniffer software
- Plugging into a hub
- Other
Server Room Access
- Locks
- Keys
- Key codes
- Log book
Authorization
- Policies and Procedures
- Card access
- Request form
- Approvals
Electronic Access Systems
- Authentication
- Smart card
- Token
- Biometric scan
- Password expiration policies
Computer Room Layout and Design
- Heating, ventilation, and air conditioning (HVAC)
- Doors, windows and walls
- Electrical Systems
- Raised Floor Systems
- Server Cabinet Systems
- Cables
- Alarms
Assessing Vulnerabilities
- Evaluating the physical layout
- Taking stock of devices
- Temperature
- Traffic
- Using computer as office space
- Smoking, eating, and drinking
Surveillance
- Continuous monitoring
- Camera placement
- Motion detection
- Notification options
Hardware Management and Maintenance
- Workstations
- Rack mount servers
- Case lock down
- Portables
Backup Systems
- Disaster recovery
- Making storage devices inaccessible
Printers
- On-board memory
- Paper shredders
Communication and Teamwork
- Communicating security policy objectives
- Getting management buy-in
- Getting team member on board
Follow-up and Evaluation
- Measuring Effectiveness of Security Implementation
- Analyzing Effects Over Time
- Patching the Holes
Keeping Up to Date
- Physical Security Resources
Summary and Conclusion
Requirements
- An understanding of general network and cyber security concepts
- Experience with computer room management is helpful
Audience
- Security professionals
- Network and hardware engineers
- Technicians
- Facilities managers
- System Administrators
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.