Course Outline

Introduction

  • Physical security as the cornerstone of comprehensive security measures for government

Overview of Computer Room Security and Maintenance Practices

  • Data Center and Server Room Standards
  • Case Study

Infrastructure Exposure Risks

  • Servers
  • Switches
  • Routers
  • Cables
  • Storage Devices
  • Other Network Components

How Data Gets Compromised

  • Intercepting data in transit across the network
  • Use of sniffer software
  • Connecting to a hub
  • Other Methods

Server Room Access Control

  • Locks and Keys
  • Key Codes
  • Log Books

Authorization Protocols

  • Policies and Procedures for Government
  • Card Access Systems
  • Request Forms
  • Approval Processes

Electronic Access Systems

  • Authentication Mechanisms
  • Smart Card Technology
  • Token-Based Authentication
  • Biometric Scanning
  • Password Expiration Policies for Government

Computer Room Layout and Design Standards

  • Heating, Ventilation, and Air Conditioning (HVAC) Systems
  • Doors, Windows, and Walls
  • Electrical Infrastructure
  • Raised Floor Systems
  • Server Cabinet Systems
  • Cable Management
  • Alarm Systems

Assessing Vulnerabilities in Physical Security for Government

  • Evaluating the Physical Layout
  • Inventory of Devices and Equipment
  • Temperature Control
  • Traffic Flow Analysis
  • Ensuring Computer Rooms Are Not Used as Office Space
  • Prohibiting Smoking, Eating, and Drinking

Surveillance and Monitoring Systems

  • Continuous Monitoring for Government
  • Strategic Camera Placement
  • Motion Detection Technology
  • Notification Options

Hardware Management and Maintenance Practices

  • Workstations
  • Rack-Mounted Servers
  • Case Lock-Down Procedures
  • Portable Devices

Backup Systems for Government

  • Disaster Recovery Plans
  • Securing Storage Devices

Printers and Security

  • On-Board Memory Management
  • Use of Paper Shredders

Communication and Teamwork in Security for Government

  • Communicating Security Policy Objectives
  • Gaining Management Support
  • Engaging Team Members

Follow-up and Evaluation of Security Measures for Government

  • Measuring the Effectiveness of Security Implementation
  • Analyzing Long-Term Effects
  • Addressing Identified Vulnerabilities

Keeping Up to Date with Physical Security for Government

  • Physical Security Resources and Best Practices

Summary and Conclusion

Requirements

  • A foundational knowledge of network and cybersecurity principles for government
  • Experience in managing data center environments is beneficial

Audience

  • Security professionals
  • Network and hardware engineers
  • Technicians
  • Facilities managers
  • System administrators
 14 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories