Get in Touch

Course Outline

Introduction

  • Physical security as the cornerstone of overall security.

Overview of Computer Room Security and Maintenance Best Practices

  • Data Center and Server Room Standards.
  • Case Study Analysis.

Infrastructure Exposure Risks

  • Servers.
  • Switches.
  • Routers.
  • Cabling.
  • Storage systems.
  • Other connected devices.

How Data Can Be Compromised

  • Intercepting data in transit across the network.
  • Sniffer software tools.
  • Physical connection to network hubs.
  • Other methods.

Server Room Access Control

  • Mechanical locks.
  • Key management.
  • Key code systems.
  • Log books for tracking entry.

Authorization Processes

  • Policies and procedural guidelines.
  • Card-based access control.
  • Request forms for access.
  • Approval workflows.

Electronic Access Systems

  • Authentication methods.
  • Smart cards.
  • Token-based authentication.
  • Biometric scanning.
  • Password expiration policies.

Computer Room Layout and Design Considerations

  • Heating, ventilation, and air conditioning (HVAC) systems.
  • Doors, windows, and wall integrity.
  • Electrical infrastructure.
  • Raised floor systems.
  • Server cabinet systems.
  • Cable management.
  • Alarm systems.

Assessing Vulnerabilities

  • Evaluating the physical layout.
  • Auditing installed devices.
  • Monitoring temperature levels.
  • Analyzing network traffic.
  • Risks associated with using computer areas as office space.
  • Prohibitions on smoking, eating, and drinking.

Surveillance Measures

  • Continuous monitoring protocols.
  • Strategic camera placement.
  • Motion detection technology.
  • Notification options for alerts.

Hardware Management and Maintenance

  • Workstation security.
  • Rack-mounted server management.
  • Case security and locking.
  • Portable device handling.

Backup Systems

  • Disaster recovery planning.
  • Ensuring storage devices remain inaccessible to unauthorized users.

Printers and Output Devices

  • Securing onboard memory.
  • Using paper shredders for sensitive documents.

Communication and Teamwork

  • Communicating security policy objectives clearly.
  • Gaining management support and buy-in.
  • Engaging team members in security efforts.

Follow-up and Evaluation

  • Measuring the effectiveness of security implementations.
  • Analyzing the impact of security measures over time.
  • Identifying and addressing remaining vulnerabilities.

Staying Current

  • Resources for physical security updates.

Summary and Conclusion

Requirements

  • A foundational understanding of general network and cybersecurity concepts.
  • Previous experience with computer room management is advantageous.

Target Audience

  • Security professionals.
  • Network and hardware engineers.
  • Technicians.
  • Facilities managers.
  • System administrators.
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories