Computer Room Security and Maintenance Training Course

Course

In City Of London

Price on request

Description

  • Type

    Course

  • Location

    City of london

Network security begins at the physical level. In this instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
Assess their organization's security risk, as it relates to computer server rooms
Set up control and monitoring systems to restrict physical access to infrastructure
Design access policies for different members
Effectively communicate security policies with team members
Audience
Security professionals
Network and hardware engineers
Technicians
Facilities managers
System Administrators
Format of the Course
Part lecture, part discussion, exercises and hands-on practice.
Note
To request a customized training for this course, please contact us to arrange.

Facilities

Location

Start date

City Of London (London)
See map
Token House, 11-12 Tokenhouse Yard, EC2R 7AS

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

Subjects

  • Network Training
  • Team Training
  • Systems
  • Design
  • Network
  • Server
  • Access
  • Monitoring

Course programme

Introduction
Physical security as the foundation for overall security

Overview of Computer Room Security and Maintenance Practices
Data Center and Server Room Standards
Case Study

Infrastructure Exposure Risks
Servers
Switches
Routers
Cables
Storage
Other devices

How Data Gets Compromised
Capturing data traveling across network
Sniffer software
Plugging into a hub
Other

Server Room Access
Locks
Keys
Key codes
Log book

Authorization
Policies and Procedures
Card access
Request form
Approvals

Electronic Access Systems
Authentication
Smart card
Token
Biometric scan
Password expiration policies

Computer Room Layout and Design
Heating, ventilation, and air conditioning (HVAC)
Doors, windows and walls
Electrical Systems
Raised Floor Systems
Server Cabinet Systems
Cables
Alarms

Assessing Vulnerabilities
Evaluating the physical layout
Taking stock of devices
Temperature
Traffic
Using computer as office space
Smoking, eating, and drinking

Surveillance
Continuous monitoring
Camera placement
Motion detection
Notification options

Hardware Management and Maintenance
Workstations
Rack mount servers
Case lock down
Portables

Backup Systems
Disaster recovery
Making storage devices inaccessible

Printers
On-board memory
Paper shredders

Communication and Teamwork
Communicating security policy objectives
Getting management buy-in
Getting team member on board

Follow-up and Evaluation
Measuring Effectiveness of Security Implementation
Analyzing Effects Over Time
Patching the Holes

Keeping Up to Date
Physical Security Resources

Summary and Conclusion

Computer Room Security and Maintenance Training Course

Price on request