Course Outline
Introduction
- Physical security as the foundation for overall security
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards
- Case Study
Infrastructure Exposure Risks
- Servers
- Switches
- Routers
- Cables
- Storage
- Other devices
How Data Gets Compromised
- Capturing data traveling across network
- Sniffer software
- Plugging into a hub
- Other
Server Room Access
- Locks
- Keys
- Key codes
- Log book
Authorization
- Policies and Procedures
- Card access
- Request form
- Approvals
Electronic Access Systems
- Authentication
- Smart card
- Token
- Biometric scan
- Password expiration policies
Computer Room Layout and Design
- Heating, ventilation, and air conditioning (HVAC)
- Doors, windows and walls
- Electrical Systems
- Raised Floor Systems
- Server Cabinet Systems
- Cables
- Alarms
Assessing Vulnerabilities
- Evaluating the physical layout
- Taking stock of devices
- Temperature
- Traffic
- Using computer as office space
- Smoking, eating, and drinking
Surveillance
- Continuous monitoring
- Camera placement
- Motion detection
- Notification options
Hardware Management and Maintenance
- Workstations
- Rack mount servers
- Case lock down
- Portables
Backup Systems
- Disaster recovery
- Making storage devices inaccessible
Printers
- On-board memory
- Paper shredders
Communication and Teamwork
- Communicating security policy objectives
- Getting management buy-in
- Getting team member on board
Follow-up and Evaluation
- Measuring Effectiveness of Security Implementation
- Analyzing Effects Over Time
- Patching the Holes
Keeping Up to Date
- Physical Security Resources
Summary and Conclusion
Requirements
- An understanding of general network and cyber security concepts
- Experience with computer room management is helpful
Audience
- Security professionals
- Network and hardware engineers
- Technicians
- Facilities managers
- System Administrators
Testimonials (5)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely enjoyed the real examples of the trainer.