Time
2 hours 33 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hello and welcome to CyberRays. Physical security for end users. Course.
00:06
This lesson will be a course introduction and overview.
00:11
I have three learning objectives for this lesson.
00:15
First, I want to talk with you about who the target audiences and the prerequisites you're expected to have. As part of this course,
00:24
I will tell you a little bit about myself, is your instructor
00:27
and we'll also cover a course overview and outlined the objectives that I will address in this course.
00:38
The target audience is you the end user.
00:41
I'm not talking to the people who plan or implement a physical security plan within your company. I'm talking to the people whom that physical security plan is designed to protect.
00:55
As such, there really are no prerequisites for this course.
00:59
This course is foundational in nature, and I don't expect you to have any prior knowledge or experience.
01:08
So who am I? Why my name is Corey holds her. I have 30 years of i t experience between the private sector and the government sector
01:19
and in many of my positions, I've had the responsibility
01:22
to provide
01:23
a physical security plan when it comes to the I T component of the business,
01:30
I hope, my PhD from Purdue University and cybersecurity and a master's in networking and communications. And since 2014 I've been a certified information systems security professional,
01:44
one domain of which is physical security.
01:51
So therefore, course objectives that I have. First, I want you to understand important security considerations when it comes to developing a physical security plan within your company.
02:02
I want to show you how standards are enforced and trained.
02:07
I want you to understand what modern physical security measures are used in practice, so that when you see them in your business, you know what purpose they serve.
02:17
And I also want to talk to you about the roles and responsibilities you have as an end user in your company to support the physical security plan.
02:31
The course itself will break down into four modules.
02:35
The first, the one we're in. Now we're gonna look at ancient and modern security practices. I want you to understand that while the methods of
02:44
implementing physical security may have changed, the concepts behind them and the purpose have remained the same will also discuss
02:53
the physical security policy for your company and why it's so important as part of the physical security posture.
03:00
Module two, we're gonna look outside the buildings. We're gonna look at all the measures that can be implemented that will give the physical security professionals as much advance notice is possible of any adversary or natural condition that might be a threat to the physical security of the company.
03:22
In Module three will walk through the interior of the business will talk about things like receiving visitors, receiving packages, inventory as well as physical security measures that are employed to protect the more sensitive areas within your building
03:42
in Module four will look at your roles and responsibilities, and we'll discuss the concepts of disaster recovery and business continuity.
03:52
These aren't traditionally thought of when it
03:54
comes to physical security, but they are very important because
04:00
protecting you, the end user from disasters,
04:03
will be an important part of that physical security plan.
04:14
In summary, we discussed three areas in this lesson. First we discussed the target audience and the prerequisites of the audience I told you a little bit about myself is the instructor
04:26
and we finished up with a course over you and covered the objectives that I have for this course.
04:31
Thank you. And I look forward to seeing you in the next lesson.

Up Next

End User Physical Security

This course will introduce you to physical security and why it is important. We’ll do some time travel and go back in time to discuss ancient physical security methods.

Instructed By

Instructor Profile Image
Corey Holzer
Information Systems Engineer
Instructor