
This series addresses two aspects of managing network security: providing physical security for the network and protecting the network from physical disasters.
Course Highlights
![]() |
List several physical security risks |
![]() |
Describe what is meant by tailgating |
![]() |
Describe physical security and its importance |
![]() |
Outline the layers of physical security that can prevent a physical security risk |
![]() |
List the key physical security risk countermeasures |
![]() |
Outline how security principles can be applied to the design of your facility and site |
![]() |
Recognize how to implement security controls to tighten facility and site security |
![]() |
Recognize how to implement internal and perimeter security controls |
![]() |
List various physical security standards |
![]() |
Recognize the need for securing assets against natural disasters |
![]() |
List the key considerations to be kept in mind when planning natural disaster risk mitigation |
![]() |
Define an emergency action plan and lists its minimum requirements |
![]() |
Explain how an effective emergency action plan is vital to managing natural disaster risk |
![]() |
Illustrate using an example how to draft an emergency action plan |
Cancellation Policy
All BICSI Connect courses are nonrefundable and nontransferable.
Frequently Asked Questions
Who Should Attend?
This course is ideal for all ICT professionals.
Technical Requirements
-
Operating Systems:
-
Windows: Windows 10 or later
-
Mac: macOS 11 (Big Sur) or later
-
Mobile Devices:
-
iOS: iOS 14 or later
-
Android: Android 10 or later
-
-
-
Browsers (latest versions recommended):
-
Google Chrome
-
Mozilla Firefox
-
Microsoft Edge
-
Safari
-
-
Internet Requirements: A stable high-speed internet connection