Free online physical security courses with certificate of completion

Free online physical security courses with certificate of completion

Physical Security Operations: Universal Training for Security Professionals

$349.00

This security training course is designed as a professional development training course to enhance your skill set. This series of lessons will take you through what is necessary to infuse physical security into any business or operation and will discuss some of the basic ideas and  philosophies involved in creating a secure environment for a facility, business, or any space.

This dynamic training is offered 100% online and 100% on demand.  Study on your own time and on your own schedule.

More ways to pay!

Free online physical security courses with certificate of completion
Free online physical security courses with certificate of completion

  • Course Details

Course Outline

  1. Introduction to Security and Why Security is Important
  2. Perimeter Security- Policies and Equipment Needed
  3. Keys and Locks - Control Policies
  4. Security Design Programming
  5. CCTV Systems and Equipment Utilized
  6. Intrusion Detection and Protecting Your Areas
  7. Access Control and Management of Entry Points
  8. Lighting Philosophies and Basic Concepts

Course Description

Physical Security Operations: Universal Training for Security Professionals is a professional development training course .  This series of lessons will take you through what is necessary to infuse physical security into any business or operation and will discuss some of the basic ideas and  philosophies involved in creating a secure environment for a facility, business, or any space.

Course Outcome

Security Professionals will have the ability to learn at their own pace and complete sixteen (16) hours of dynamic professional development training to further enhance their security career.

Course Completion

All courses include an end of course examination. Students must pass the exam to receive credit for the training. Certificates will be available online immediately for all students.

Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Overview

Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information.
The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties.

Course Objectives

1. Define Code of Ethics
2. Describe the security concepts
3. Document and operate security controls
4. Describe the asset management process
5. Implement compliance controls
6. Assess compliance controls
7. Describe the change management process
8. Contribute to the security awareness training program
9. Contribute to physical security operations

Syllabus

  • Understand and Comply with Code of Ethics and Security Concepts
    • Module Topics: (ISC)2 Code of Ethics, Organizational Code of Ethics, There are usually three types of controls, managerial (sometimes called administrative), Technical (sometimes called logical), and physical (sometimes called operational), Deterrent, Preventative, Detective, and Corrective Controls. Understand and Comply with Code of Ethics: In (ISC)2 Code of Ethics, you will learn about Code of Ethics, and Code of Ethics Canons. In Organizational Code of Ethics, you will learn about how a code of ethics applies to security practitioners, and applying ethical principles. Understand Security Concepts: In Confidentiality, you will learn about consequences of a breach, and ensuring confidentiality. In integrity, you will learn about consequences of integrity failure, availability, and consequences of availability failures. You will also Non-Repudiation. In Privacy, you will understand core guidelines. In least privilege, you will learn about least privilege and cots Applications. You will understand the concept of separation of duties and defense in depth, examples approaches, and additional controls. In Risk based Controls, you will learn about risk assessment data. Security concepts also covers accountability and authorization.
  • Participate in Asset Management
    • Module Topics: Life Cycle, Hardware/Software, and Data. In life Cycle, you will learn about the waterfall model, it's benefits and drawbacks, requirements gathering and analysis, requirements definition, system design, implementation, integration, testing, deployment of system, maintenance, additional application development methods, system vulnerabilities, secure development, and acquisition practices, OWASP top ten, guidelines for developers, IT asset management (ITAM), device management, continuous diagnostics and mitigation (CDM), hardware, hardware asset management desired state, hardware asset management data, the SSCP's challenge, impact and results. In Data, you will learn about secure information storage, considerations, encryption vulnerabilities, database encryption, data scrubbing, data deduplication, managing encryption keys, consideration, Information Rights Management (IRM), secure output, data retention and disposal, shredders, security levels, destruction of magnetic media, erasure or reformatting, data wiping, degaussing, and disclosure controls: data leakage prevention.
  • Implement and Assess Compliance with Controls & Participate in Change Management Duties
    • Module Topics: Technical Controls, Operational Controls, Managerial Controls, Security Policies, Standards, Guidelines, and Procedures, Implementation and Configuration Management Plan, security Impact Assessment, System Architecture/Interoperability of Systems, Testing Patches, Fixes, and Updates. In technical Controls, you will learn about identification and authentication, logical access controls, public access controls, audit trails. In Operational Controls, you will learn about operational security measures, operational solutions, managerial Controls. In Security Policies, Standards, Guidelines, and Procedures, you will learn about subject-specific security policies, typical policy elements, policy life cycle, components of a security policy, standard guidelines, and procedures.
      Participate in Change Management Duties: In Implementation and Configuration Management Plan, you will learn about release management, release manager, release management policy, release management process, code signing, release management tools, systems assurance and controls validation, configuration management (CM), CM process, CM system goals, operational aspects of CM, hardware inventory, software inventory, configuration lists, configuration management for opening systems, identification, automated configuration management tools, control, accounting, and auditing. You will also understand the concepts of Security Impact Assessment and System Architecture/Interoperability of Systems. In Testing, Patches, Fixes, and Updates, you will learn about patch management, patch management process.
  • Participate in Physical Security Operations & Security Awareness Training
    • Module Topics: Security Awareness Training, Physical Security, Building Security, keys, Locks, and safes, communications and Server Rooms, Restricted and Work Area Security, Utilities and HVAC Considerations, Fire Prevention, Detection, and Suppression. Participate in Physical Security Operations: In Physical Security, you will learn about interior access control elements, and escort and visitor control. In building security, you will learn about doors, perimeter doors, door locks, mantraps, and turnstiles. In Keys, Locks, and Safe, you will learn about types of locks, hi-tech keys, safes, vaults, containers, key control, medeco guide for developing and managing key control. In communications and Server Rooms, you will learn about securing the area, protection from lightning, server rooms, and rack security. In Restricted and Work Area Security, you will learn about restricted work areas, data center security, and the "two- person rule". In Utilities and HVAC Considerations, you will learn about utilities and power uninterruptible power supply, generator, HVAC, air contamination, guidelines, and water issues. In Fire Prevention, Detection, and Suppression, you will learn about fire detection, fire suppression, sprinkler systems, and gas suppression systems.
  • Case Study
  • Exam

Taught by

(ISC)² Education & Training

Reviews

5.0 rating, based on 1 Class Central review

4.8 rating at Coursera based on 178 ratings

Showing Class Central Sort

Start your review of Security Operations and Administration

  • This is a very good opportunity for us to learning something new as very well. I want to more learning from here to improve myself to more powerful in my professional life.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

What is physical security certification?

The Physical Security Professional (PSP) credential demonstrates your knowledge in physical security assessments, application, design, and integration of physical security systems, and implementation of security measures.

Which security course is best?

7 top security certifications you should have in 2022.
CompTIA Security+ (SY0-601) ... .
EC-Council Certified Ethical Hacker (CEHv11) ... .
(ISC)² Certified Information Systems Security Professional (CISSP) ... .
ISACA Certified Information Security Manager (CISM) ... .
ISACA Certified Information Systems Auditor (CISA).

What is best course for security guard?

5 Top Required Courses For A Security Guard Training.
Armed Certificate Course..
Criminal Justice System Course..
Occupation Health and Safety..
Computer Service Technician..
Conflict Resolution and Management..

Can you get a security license online in Florida?

All Security Classes Are Now Available Online Currently, under the Governor of Florida's executive order for COVID19, all our security courses are being conducted ONLINE through Live Virtual Training with one of our security instructors.