Many physical security controls are concentrated around the perimeter of a facility, attempting to deter, prevent, and detect intrusions before an intruder gains access to interior secured areas. Learn how to build a secure physical perimeter through the use of locks, mantraps, video surveillance, fences, lighting, signs, barricades, and protected distribution cabling.
- [Narrator] Many physical security controls…are concentrated around the perimeter of a facility.…Attempting to deter, prevent, and detect intrusions…before an intruder gains access to interior secured areas.…Locks are a familiar type of physical security control.…They restrict access through a door or other locked portal…to those who possess the key required to unlock them.…This key may be a traditional physical key,…or it may use some other authentication factor.…
The locks that you are most familiar with…are called preset locks.…They use a hardware key to lock and unlock them,…and will only work if the correct key…that the lock has been preset to work with, is inserted.…Incorrect keys will not open the lock.…If you use physical keys, you should carefully control them…with a physical key management program…that keeps a strong inventory of keys,…tracking who has which keys…and changes locks when a key is lost or stolen.…
Cipher locks are often used on areas…where many people require access.…They have a physical or electronic keypad,…
Instructor Mike Chapple has designed the training around the most recent version of CompTIA Security+, SY0-501, which expands coverage of mobile and cloud technologies. By learning about the topics in this course, you'll be prepared to answer questions from the latest exam—and strengthen your own organization's systems and defenses. To join one of Mike's free study groups, visit certmike.com.
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Developing security baselines
- Leveraging standards
- Delivering and measuring user training
- Designing a secure network
- Designing secure systems, from the OS to peripherals
- Secure staging and deployment
- Securing smart devices and embedded systems
- Developing secure software
- Cloud computing and virtualization
- Securing hardware, facilities, data centers, and other physical risks
Skill Level Beginner
1. Security Design
2. User Training
3. Secure Network Design
4. Secure Systems Design
5. Secure Staging and Deployment
Software staging and release4m 51s
6. Embedded System Security
7. Software Development Security
8. Cloud Computing and Virtualization
9. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.