top of page
IHS Main Logo

Blending Physical and Cyber Security

IMPORTANT: Please select the following affliation. SHSU > College of Criminal Justice > Institute for Homeland Security (IHS) > Critical Infrastructure Security & Resilence (IHS)

4 Hours
$25.00 per Student
Course Length:
Cost: 

Course Description

Understand the scope of cyber – physical security overlap and duplication at critical infrastructure sites and what options are available for organizational convergence. Be familiar with how cyber security hardware, software, and processes can be employed to achieve security management outcomes like those used by physical security.

Course Objectives

  1. Understand cyber and physical security overlap & the available options for organizations/personnel convergence.

  2. Describe how the Global Security Operations Center can be used as a first step for blending cyber and physical security.

  3. Recognize the four options for blending cyber & physical security and each strategies pros and cons.

  4. Explain how Insider threat is the biggest threat to critical infrastructure and how blending cyber and physical security is an effective defense strategy.

  5. Be familiar with how combined cyber & physical security processes can achieve senior security management goals.


Target Audience

The target audience for this course includes professionals responsible for physical security, IT and cybersecurity, risk management, and compliance, as well as those working in critical infrastructure sectors. It also caters to senior executives and government personnel who need to understand the integration of physical and cyber security measures to enhance overall safety and resilience.

Course Length:
Cost: 
$25.00 per Student
4 Hours

IMPORTANT: Please select the following affliation. SHSU > College of Criminal Justice > Institute for Homeland Security (IHS) > Critical Infrastructure Security & Resilence (IHS)

Course Description

Understand the scope of cyber – physical security overlap and duplication at critical infrastructure sites and what options are available for organizational convergence. Be familiar with how cyber security hardware, software, and processes can be employed to achieve security management outcomes like those used by physical security.

Course Objectives

  1. Understand cyber and physical security overlap & the available options for organizations/personnel convergence.

  2. Describe how the Global Security Operations Center can be used as a first step for blending cyber and physical security.

  3. Recognize the four options for blending cyber & physical security and each strategies pros and cons.

  4. Explain how Insider threat is the biggest threat to critical infrastructure and how blending cyber and physical security is an effective defense strategy.

  5. Be familiar with how combined cyber & physical security processes can achieve senior security management goals.


Target Audience

The target audience for this course includes professionals responsible for physical security, IT and cybersecurity, risk management, and compliance, as well as those working in critical infrastructure sectors. It also caters to senior executives and government personnel who need to understand the integration of physical and cyber security measures to enhance overall safety and resilience.

bottom of page