In this video, learn about different types of site and facility designs: wiring closets, server rooms, media storage facilities, evidence storage, data centers, and restricted and work area security such as operations centers.
- [Instructor] Cybersecurity professionals must also ensure…the physical security of facilities under their control.…This includes limiting access to those facilities,…authenticating employees seeking to gain access,…and tracking contractors and other visitors…who access the site.…Let's begin our discussion of physical security…by discussing some of the different types…of facilities that must be protected.…Data centers are the most obvious locations…of concern to cybersecurity professionals.…These secure facilities contain all of the servers,…storage, and other computing resources…needed to run a business.…
Data center access must be strictly limited…to prevent the potential theft of resources and information.…Anyone gaining physical access to a data center…would have the ability to cause significant damage…and disruption to the business.…Not all servers are kept within the relatively safe…confines of a managed data center.…Many businesses only have simple server rooms…that often lack strong security controls.…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- The security triad: confidentiality, integrity, and availability
- Security principles
- Resource security
- Data security
- Security controls
- Assessing security controls
- Security policy
- Physical security
Skill Level Intermediate
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover software licensing. In addition, the following topics were updated: integrity, leveraging industry standards, data encryption, security control selection and implementation, audits and assessments, security policy framework, security policy training and procedures, and ethics.
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. The Security Triad
2. Security Principles
3. Resource Security
4. Data Security
5. Data Security Controls
6. Security Controls
Control frameworks3m 55s
7. Assessing Security Controls
8. Security Policy
9. Awareness and Training
10. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.