Computer Room Security and Maintenance Training Course
Course
In City Of London
Description
-
Type
Course
-
Location
City of london
Network security begins at the physical level. In this instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
Assess their organization's security risk, as it relates to computer server rooms
Set up control and monitoring systems to restrict physical access to infrastructure
Design access policies for different members
Effectively communicate security policies with team members
Audience
Security professionals
Network and hardware engineers
Technicians
Facilities managers
System Administrators
Format of the Course
Part lecture, part discussion, exercises and hands-on practice.
Note
To request a customized training for this course, please contact us to arrange.
Facilities
Location
Start date
Start date
Reviews
Subjects
- Network Training
- Team Training
- Systems
- Design
- Network
- Server
- Access
- Monitoring
Course programme
Introduction
Physical security as the foundation for overall security
Overview of Computer Room Security and Maintenance Practices
Data Center and Server Room Standards
Case Study
Infrastructure Exposure Risks
Servers
Switches
Routers
Cables
Storage
Other devices
How Data Gets Compromised
Capturing data traveling across network
Sniffer software
Plugging into a hub
Other
Server Room Access
Locks
Keys
Key codes
Log book
Authorization
Policies and Procedures
Card access
Request form
Approvals
Electronic Access Systems
Authentication
Smart card
Token
Biometric scan
Password expiration policies
Computer Room Layout and Design
Heating, ventilation, and air conditioning (HVAC)
Doors, windows and walls
Electrical Systems
Raised Floor Systems
Server Cabinet Systems
Cables
Alarms
Assessing Vulnerabilities
Evaluating the physical layout
Taking stock of devices
Temperature
Traffic
Using computer as office space
Smoking, eating, and drinking
Surveillance
Continuous monitoring
Camera placement
Motion detection
Notification options
Hardware Management and Maintenance
Workstations
Rack mount servers
Case lock down
Portables
Backup Systems
Disaster recovery
Making storage devices inaccessible
Printers
On-board memory
Paper shredders
Communication and Teamwork
Communicating security policy objectives
Getting management buy-in
Getting team member on board
Follow-up and Evaluation
Measuring Effectiveness of Security Implementation
Analyzing Effects Over Time
Patching the Holes
Keeping Up to Date
Physical Security Resources
Summary and Conclusion
Computer Room Security and Maintenance Training Course
