Home 0P3N Blog End User Physical Security
Ready to Start Your Career?
Create Free Account
Adnan Khans profile image
By: Adnan Khan
July 16, 2020

End User Physical Security

By: Adnan Khan
July 16, 2020
Adnan Khans profile image
By: Adnan Khan
July 16, 2020

At the height of technology advancement and automated technology, it is easy to get complacent about the security aspect. Whether it is the distraction caused by social media or it is in our human nature to be psychologically manipulated by social engineering methods, as an End User, we may end up assuming we have less of a part to play for physical security.

The Course Instructor, Corey Holzer, diligently presents the significance of Physical Security in this course and focuses on security organizations, employees, and assets. The End User Physical Security course represents safety measures for networks and the safeguarding of hardware and software. Completing this course improves the much-needed knowledge and awareness in this field.

This course encourages us to be familiarised with our surroundings and be prepared for potential security breaches.

Practicality of this course:

The instructor revealed that in 2018, US Businesses combinedly lost $50 Billion in theft, disaster, loss, and property destruction. This shocking statistic is a testimony for many businesses worldwide, who are enduring financial loss and reputation damages. Some of the practicality for this course are listed below:

  • Knowledge of this course would benefit anyone who complies with the General Data Protection Regulation (GDPR) and Compliance.
  • Awareness of data breach vulnerabilities - Data Protection and Protecting Personal Identifiable Information affects all End Users.
  • It allows us to recognize unanticipated threats or disasters that we are usually unprepared for, such as a Hurricane, Fire, Flood, Bombs, theft, or an active shooter on the premises.
  • Need to protect the tangible and intangible assets of an organization.

 
Enroll In The "End User Physical Security" Course Today >>

 

This course appeals to (but not limited to):

  • End Users – General Employees.
  • Anyone who is not a security practitioner.
  • Cyber Security -Enthusiast, beginner.
  • Building Security personnel.
  • Reception/Concierge personnel.
  • Fire Marshall.
  • Part of orientation/learning for a new hire in a company.

Areas this course covers:

This course helps us recognize our responsibilities and the security measures available to us.

  • Comprehend the objectives of physical security
  • Consider Internal- Exterior Security of the facility
  • Unprecedented Threats
  • Recovery & business continuity

Prerequisites:

  • No Prior knowledge is required. The course progresses at a steady pace and is easy to follow through.

Course Agenda:

  • Introduction to Physical security
  • Physical Security from the Perimeter to the Front Door
  • Building Access and Internal Security
  • Closing the Loop- includes areas such as Business Recovery and Continuity plan to safeguard the business and the End Users in case of a disaster.

The course covers some remarkable security areas.

  • Defense- in- depth (layer security): Engagement of various security methods coordinately safeguards the assets in-depth, averting an adversary to gain privileged access.
  • Military term- Avenue Approach: Harnessing unique avenues to find a goal
  • Access Control Protocol: Similar to Network security, using strict monitoring of incoming and outgoing traffic.
  • Secure Open Space: Challenge un-invited presence will deter the adversary, creating a pattern of a routine patrol.
  • Augmenting security: Some measures, such as Low- light sensors, Infra-red sensors, motion sensors, enhanced security.

You will find it useful to reflect on the pros and cons of Physical Security mentioned in the course.

alt_text
  • Recognize suspicious packages: (Post 9/11 attack, reported incidence of suspicious posts)
  • Leaving the building: Avoid making yourself a target and hide name badges and id cards; denies the adversary the chance to duplicate badges
  • Designated Sensitive and restricted areas: Utilizing double doors, with no recording devices allowed
  • Some of the dos and don'ts outlined in the course as below:
alt_text
  • Disaster recovery and Business Continuity to resume the disrupted services as quickly as possible with minimal barriers. Take unexpected threats such as Hurricanes, Fires, Floods, Bombs, theft, and Active Shooters.

Final remarks:

Overall, this is very insightful and refreshing learning on End User Physical Security.

Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry