Course Outline
Introduction
- Physical security as the cornerstone of comprehensive security measures for government
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards
- Case Study
Infrastructure Exposure Risks
- Servers
- Switches
- Routers
- Cables
- Storage Devices
- Other Network Components
How Data Gets Compromised
- Intercepting data in transit across the network
- Use of sniffer software
- Connecting to a hub
- Other Methods
Server Room Access Control
- Locks and Keys
- Key Codes
- Log Books
Authorization Protocols
- Policies and Procedures for Government
- Card Access Systems
- Request Forms
- Approval Processes
Electronic Access Systems
- Authentication Mechanisms
- Smart Card Technology
- Token-Based Authentication
- Biometric Scanning
- Password Expiration Policies for Government
Computer Room Layout and Design Standards
- Heating, Ventilation, and Air Conditioning (HVAC) Systems
- Doors, Windows, and Walls
- Electrical Infrastructure
- Raised Floor Systems
- Server Cabinet Systems
- Cable Management
- Alarm Systems
Assessing Vulnerabilities in Physical Security for Government
- Evaluating the Physical Layout
- Inventory of Devices and Equipment
- Temperature Control
- Traffic Flow Analysis
- Ensuring Computer Rooms Are Not Used as Office Space
- Prohibiting Smoking, Eating, and Drinking
Surveillance and Monitoring Systems
- Continuous Monitoring for Government
- Strategic Camera Placement
- Motion Detection Technology
- Notification Options
Hardware Management and Maintenance Practices
- Workstations
- Rack-Mounted Servers
- Case Lock-Down Procedures
- Portable Devices
Backup Systems for Government
- Disaster Recovery Plans
- Securing Storage Devices
Printers and Security
- On-Board Memory Management
- Use of Paper Shredders
Communication and Teamwork in Security for Government
- Communicating Security Policy Objectives
- Gaining Management Support
- Engaging Team Members
Follow-up and Evaluation of Security Measures for Government
- Measuring the Effectiveness of Security Implementation
- Analyzing Long-Term Effects
- Addressing Identified Vulnerabilities
Keeping Up to Date with Physical Security for Government
- Physical Security Resources and Best Practices
Summary and Conclusion
Requirements
- A foundational knowledge of network and cybersecurity principles for government
- Experience in managing data center environments is beneficial
Audience
- Security professionals
- Network and hardware engineers
- Technicians
- Facilities managers
- System administrators
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.