Physical Security 1 Day

The physical security of computers and their resources in the 1960s and 1970s was not as challenging as it is today because computers were mostly mainframes that were locked away in server rooms, and only a handful of people knew what to do with them anyway.

Today, a computer sits on almost every desk in every company and transported everywhere in the form of laptop, smart phone and convenient mobile devices. As a result, easy access to devices, valuable data and other information resources is spread throughout the environment. Companies have several wiring closets and server rooms, and remote and mobile users take computers and resources out of the facility.

Properly protecting these computer systems, networks, facilities, and employees has become an overwhelming task to many companies.

This course helps learners to addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information.

If you do not have proper physical security, it does not matter how good your network security is - someone can still obtain access to sensitive information.


Course Content

Introduction to Physical Security


The Planning Process


Protecting Assets


Internal Support Systems


Perimeter Security


and more...

1. Anyone who is required to develop a broad and deep knowledge and understanding of physical security in relation to information and computer security.
2. Physical security officers, physical security managers, IT consultants, managers, security policy writers, security officers.
3. information security officers, network administrators, security device administrators, security engineers.
4. Security professionals whose positions require CISSP certification
1. Employing tools, technologies and activities to enhance a practical understanding of Physical Security.
2. Discusses various aspects and controls of physical security.
3. Reinforcing key areas of the (ISC)2® CBK® through practice questions and review sessions.
4. Strategically focus your preparation for CISSP Certification