Free

End User Physical Security

This course will introduce you to physical security and why it is important. We’ll do some time travel and go back in time to discuss ancient physical security methods.
2
34
M
Time
beginner
difficulty
3
ceu/cpe

Course Content

Internal Access Controls

8m

Building Access and Internal Security
Badging and Escorting

12m

Building Access and Internal Security
Company Assets

7m

Building Access and Internal Security
Receiving Visitors, Employees and Contractors

5m

Building Access and Internal Security
Reception

8m

Building Access and Internal Security
Countersurveillance

8m

Physical Security from the Perimeter to the Front Door
Open Spaces Surveillance

10m

Physical Security from the Perimeter to the Front Door
Controls for Open Spaces Part 2

10m

Physical Security from the Perimeter to the Front Door
Controls for Open Spaces Part 1

8m

Physical Security from the Perimeter to the Front Door
Perimeter Access Control Measures

8m

Physical Security from the Perimeter to the Front Door
Access Control Policies

7m

Introduction to Physical Security
Modern Physical Security

7m

Introduction to Physical Security
Ancient Physical Security

8m

Introduction to Physical Security
Course Introduction and Overview

5m

Introduction to Physical Security
Closing Remarks

5m

Closing the Loop
Training and Testing

16m

Closing the Loop
Course Description

Students taking the End User Physical Security course will also learn access control policies, physical security for the perimeter to the front door, internal security, and surveillance and countersurveillance measures.

What is physical security? Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism, and terrorism. This course is designed with the end-user in mind and serves as the ideal starting point for anyone looking to enter the cyber security field and ultimately raise their threat awareness. What will I learn? Why physical security matters for computers How to protect against physical attacks How to use physical security controls.

Who is this Course for?

This course is intended for the standard end user employee that is not in a security practitioner role; however, anyone can benefit from taking this course.

Course Goals

By the end of this course, students should be able to:

  • Understand the purpose of Physical Security
  • Understand all of the facets of Physical Security
  • The importance of Physical Security
  • * How Physical Security measures also play a role in Disaster Recovery

    This course is part of a Career Path:
    No items found.

    Instructed by

    Senior Instructor
    Corey Holzer

    My current title is Information Systems Engineer. As part of my quest for self-improvement, I earned multiple degrees including a Ph.D. in Information Security from Purdue (2016); a Master of Science in Networking and Communications Management (2009) and Master in Business Administration (2009) from Keller Graduate School of Management; a Master of Arts (1994) from St. John's University NY. I also hold multiple industry certifications including CISSP, Security+, CNDA, and CEH.

    Growing up in New York City, NY, much of my 13 years of IT work experience in the private sector came while I lived there. My positions included roles from entry-level technician for World Wrestling Entertainment through Lead web developer and Technical Project Manager on several multi-million dollar projects for J. Walter Thompson’s new media division. In 2006, I transitioned over to the public sector. My military career also focuses on Information Technology. In the last 14 years, I filled various technology positions involving systems and network administration, technical project management, and team lead for multiple capability development projects.

    At a young age I discovered my love for technology and computers. It began with figuring out how technology worked by taking it apart. Mom wasn’t happy when she found the remains of my tape recorder in my room. I soon moved on to learning about computers and programming languages. While the term “hacker” has taken on a negative connotation in recent years, I still consider myself a hacker based on the original description of the word when talking about people like Gates and Jobs.

    I first discovered Cybrary last year when I started studying for the CCNA exam. When I learned they needed instructors for various courses, I applied. Mentorship is one of my favorite aspects of the various roles I held in the last few years. Being an instructor affords me more opportunities for mentorship.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a End User Physical Security Certificate of Completion