Computer Room Security and Maintenance
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
Network security begins at the physical level. In this instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
This instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Assess their organization’s security risk, as it relates to computer server rooms.
- Set up control and monitoring systems to restrict physical access to infrastructure.
- Design access policies for different members.
- Effectively communicate security policies with team members.
-
COURSE AUDIENCE
This course is made for :
- Technicians
- Security professionals
- Network and hardware engineers
- System Administrators
- Facilities managers
-
COURSE OUTLINE
Day One
Overview of Computer Room Security and Maintenance Practices
- Data Center and Server Room Standards
- Case Study
Infrastructure Exposure Risks
- Servers
- Switches
- Routers
- Cables
- Storage
- Other devices
How Data Gets Compromised
- Capturing data traveling across network
- Sniffer software
- Plugging into a hub
- Other
Day Two
Server Room Access
- Locks
- Keys
- Key codes
- Log book
Authorization
- Policies and Procedures
- Card access
- Request form
- Approvals
Day Three
Electronic Access Systems
- Authentication
- Smart card
- Token
- Biometric scan
- Password expiration policies
Computer Room Layout and Design
- Heating, ventilation, and air conditioning (HVAC)
- Doors, windows and walls
- Electrical Systems
- Raised Floor Systems
- Server Cabinet Systems
- Cables
- Alarms
Day Four
Surveillance
- Continuous monitoring
- Camera placement
- Motion detection
- Notification options
Hardware Management and Maintenance
- Workstations
- Rack mount servers
- Case lock down
- Portables
Day Five
Backup Systems
- Disaster recovery
- Making storage devices inaccessible
Printers
- On-board memory
- Paper shredders
Communication and Teamwork
- Communicating security policy objectives
- Getting management buy-in
- Getting team member on board