While heating and cooling concerns top the list of environmental controls, data center managers must also be prepared for more serious situations, such as fire, flooding, and electromagnetic interference. Learn the importance of environmental controls for data centers and other physical computing environments. These include using heating, ventilation, and air conditioning (HVAC) systems to monitor and manage temperature and humidity as well as the use of a hot aisle/cold aisle approach.
- [Instructor] While heating and cooling…concerns top the list of environmental…controls, data center managers must…also be prepared for more serious situations…such as fire, flooding, and electromagnetic interference.…Let's take a look at the controls used…to protect against those risks.…Fire is dangerous in any environment…and can be particularly damaging in…a facility filled with electrical equipment.…For this reason, data center managers must…design fire suppression systems that will…extinguish a fire before it grows out of control.…
Let's talk briefly about how fires start.…In order for a fire to burn, it requires…three key ingredients: heat, fuel, and oxygen.…If you can deprive a fire of any one…of these three elements, it will go out.…The most common approach to fighting fires…is the use of water, which deprives…the fire of heat, but water is not…effective against all types of fires…and it can damage electronic equipment.…Fire extinguishers used to fight fires…come rated for different classes of fire.…
Class A fire extinguishers are for typical…
Instructor Mike Chapple has designed the training around the most recent version of CompTIA Security+, SY0-501, which expands coverage of mobile and cloud technologies. By learning about the topics in this course, you'll be prepared to answer questions from the latest exam—and strengthen your own organization's systems and defenses. To join one of Mike's free study groups, visit certmike.com.
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Developing security baselines
- Leveraging standards
- Delivering and measuring user training
- Designing a secure network
- Designing secure systems, from the OS to peripherals
- Secure staging and deployment
- Securing smart devices and embedded systems
- Developing secure software
- Cloud computing and virtualization
- Securing hardware, facilities, data centers, and other physical risks
Skill Level Beginner
1. Security Design
2. User Training
3. Secure Network Design
4. Secure Systems Design
5. Secure Staging and Deployment
Software staging and release4m 51s
6. Embedded System Security
7. Software Development Security
8. Cloud Computing and Virtualization
9. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.