This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
SA Physical Security
Physical Security Awareness teaches office employees how to identify and respond to physical threats, including badge misuse, unauthorized visitors, secure zones, document protection, and social engineering, ensuring workplace safety.
Who Should Take This
All staff members who work in corporate office settings, from entry‑level personnel to mid‑level managers, benefit from this awareness training. They need to understand basic security protocols, recognize suspicious activity, and know how to report incidents promptly to protect people, assets, and confidential information.
What's Included in AccelaStudy® AI
Course Outline
74 learning goals
1
Access Control and Badge Security
3 topics
Badge and credential management
- Recognize the importance of wearing your access badge visibly at all times and why badges must not be shared, loaned, or left unattended.
- Describe the immediate steps to take when your access badge is lost or stolen, including reporting to security, requesting deactivation, and obtaining a replacement.
- Identify common badge cloning and duplication techniques that attackers use and recognize why protecting your badge from unauthorized scanning matters.
- Explain the purpose of multi-factor physical access controls combining badge tap with PIN or biometric verification for high-security areas.
- Describe the risks of leaving badges in visible locations (car dashboards, restaurant tables) where they can be photographed or stolen.
Tailgating and piggybacking prevention
- Recognize tailgating and piggybacking as physical security threats where unauthorized individuals follow authorized personnel through secured doors.
- Describe the social engineering tactics tailgaters use, including carrying boxes, holding phones, feigning urgency, and exploiting courtesy to bypass access controls.
- Explain the correct procedure for challenging someone without a visible badge, including polite confrontation techniques, redirecting to reception, and reporting the incident.
- Analyze a scenario where a person without a badge asks to be let through a secured door to determine the appropriate response and escalation path.
- Recognize that holding doors for others, even colleagues you recognize, undermines access control logging and creates accountability gaps in the audit trail.
After-hours and weekend access
- Recognize the heightened security risks during after-hours access, including reduced staffing, disabled security features, and increased vulnerability to social engineering.
- Describe the additional procedures for after-hours building access, including sign-in requirements, lone worker notifications, and ensuring doors are secured upon departure.
2
Visitor Management and Escorts
3 topics
Visitor registration and identification
- Recognize why all visitors must sign in at reception, display a visitor badge, and be logged in the visitor management system before entering secure areas.
- Describe the information typically collected during visitor registration, including name, company, host employee, purpose of visit, and expected departure time.
- Identify the visual differences between employee badges, visitor badges, and contractor badges and recognize when someone is wearing the wrong badge type for their location.
- Explain why visitor badges should be collected and returned at departure to prevent reuse and unauthorized future access.
Escort and supervision requirements
- Recognize which areas require visitor escorts and understand that unescorted visitors in restricted areas should be reported immediately.
- Describe your responsibilities as a host employee, including meeting visitors at reception, escorting them at all times, and ensuring they sign out upon departure.
- Explain the security risks of leaving visitors unattended, including unauthorized access to sensitive areas, data theft, and installation of surveillance devices.
- Analyze a scenario where a contractor claims they have authorization to access a restricted area without an escort and determine the correct verification and response procedure.
- Describe the correct procedure for handing off visitor escort responsibilities to another employee when you need to leave temporarily.
Delivery and maintenance personnel
- Recognize the security protocols for receiving deliveries, including verifying delivery personnel identity, restricting delivery access to designated areas, and inspecting packages.
- Describe how maintenance and cleaning staff access should be managed, including scheduled access windows, supervision requirements, and restricted area protocols.
3
Secure Areas and Restricted Zones
2 topics
Zone classification and access levels
- Recognize the different security zones in a typical office environment, including public areas, general work areas, restricted areas, and high-security zones.
- Describe the purpose of server rooms, network closets, and data center facilities and explain why access to these areas is strictly limited to authorized personnel.
- Identify the physical security indicators that mark restricted zones, including signage, different colored badge readers, mantrap entries, and security cameras.
- Explain the principle of least privilege as applied to physical access and why employees should only have access to areas required for their job function.
- Describe how to request temporary access to a restricted area when needed for a specific project and the approval workflow involved.
Secure area behaviors
- Recognize behaviors that violate secure area policies, including propping doors open, sharing access codes, and photographing restricted areas.
- Describe the correct procedure for reporting a secured door that is propped open, malfunctioning, or appears tampered with.
- Explain why photography and recording restrictions exist in certain areas and how unauthorized images can expose sensitive information, layouts, or security measures.
- Analyze a scenario where an employee discovers a propped-open door to a server room and determine the immediate actions required and correct reporting procedure.
4
Document and Information Security
4 topics
Clean desk policy
- Recognize the components of a clean desk policy, including locking screens, securing documents, clearing whiteboards, and locking cabinets before leaving your workspace.
- Describe how visible sensitive documents, sticky notes with passwords, and unlocked screens create opportunities for visual data theft by passersby and visitors.
- Explain the end-of-day security routine including logging off workstations, securing portable devices, storing documents in locked drawers, and verifying no sensitive materials are exposed.
- Analyze a photograph of a workspace to identify clean desk policy violations and rank them by the severity of potential data exposure.
- Identify the risks of leaving laptops, tablets, and phones on desks in open-plan offices, even within the secure perimeter, and describe proper secure storage options.
Document disposal and shredding
- Recognize which types of documents require secure disposal through shredding, including those containing PII, financial data, intellectual property, and internal communications.
- Describe the difference between cross-cut shredding and strip-cut shredding and explain why cross-cut provides adequate protection while strip-cut does not.
- Identify proper disposal methods for different media types, including paper shredding, hard drive destruction, secure e-waste recycling, and optical disc disposal.
- Explain the risks of dumpster diving and how improperly disposed documents can be reconstructed by attackers to gain access credentials, organizational charts, or financial information.
- Describe the secure bin collection process, including locked shredding bins, third-party shredding services, and certificates of destruction for auditing compliance.
Whiteboard and meeting room security
- Recognize the risks of leaving sensitive information on whiteboards, flip charts, or shared screens in meeting rooms after meetings conclude.
- Describe the proper procedure for securing meeting rooms after sensitive discussions, including erasing boards, collecting printouts, and checking for forgotten devices.
- Explain the risks of conducting sensitive discussions in glass-walled meeting rooms where lip reading and screen content can be observed from outside.
Printer and copier security
- Recognize the risks of leaving printed documents unattended in shared printer output trays where anyone passing by can read or take them.
- Describe secure printing features (pull printing, badge-release printing) and explain how they prevent sensitive documents from sitting in open output trays.
- Explain why copiers and multifunction printers store copies of scanned documents on internal hard drives and the data security implications when these devices are decommissioned.
5
Physical Social Engineering and Unauthorized Devices
3 topics
USB drop attacks
- Recognize USB drop attacks where malicious USB drives are deliberately left in parking lots, lobbies, and common areas to tempt employees into plugging them into corporate computers.
- Describe how malicious USB devices can automatically execute malware, install keyloggers, or exfiltrate data the moment they are connected to a computer.
- Explain the correct procedure for handling a found USB drive, including not connecting it to any device and turning it in to IT security for analysis.
- Identify other physical attack devices disguised as everyday objects, including USB cables with embedded chips, rogue charging stations, and fake network devices.
Impersonation and pretexting
- Recognize common physical impersonation tactics where attackers pose as delivery personnel, maintenance workers, IT technicians, or new employees to gain building access.
- Describe how pretexting attacks use fabricated scenarios (fire inspections, vendor audits, emergency repairs) to create urgency and bypass normal security procedures.
- Explain how to verify the identity and authorization of someone claiming to need access, including contacting the supposed employer, checking with facilities, and requesting work orders.
- Analyze a scenario where someone in a uniform requests immediate access to a restricted area for an emergency repair and determine the correct verification and escalation steps.
- Identify psychological manipulation techniques attackers use to overcome employee resistance, including authority pressure, reciprocity, and social proof.
Unauthorized recording and surveillance
- Recognize common covert recording devices including hidden cameras, audio recorders, and modified everyday objects used for corporate espionage.
- Describe the risks of unauthorized recording devices in meeting rooms, executive offices, and break areas where sensitive business discussions occur.
- Explain the procedure for reporting suspected unauthorized surveillance devices, including not touching the device and immediately notifying security.
- Identify the risks of employees using personal smart devices with always-on voice assistants or cameras in areas where confidential discussions take place.
6
Reporting and Response
3 topics
Reporting suspicious activity
- Recognize types of physical security events that should be reported, including unfamiliar people in restricted areas, propped doors, unusual packages, and signs of forced entry.
- Describe the reporting channels for physical security concerns, including security desk phone numbers, reporting apps, email addresses, and when to call emergency services.
- Explain why prompt reporting of physical security incidents matters, even for events that seem minor, and how delayed reporting hampers investigation and response.
- Analyze a series of seemingly minor physical security observations to determine whether they collectively indicate a coordinated social engineering or reconnaissance attempt.
- Describe how to document a physical security observation accurately, including noting time, location, description of the person or event, and any actions you took.
Emergency procedures and evacuation
- Recognize the importance of knowing your building's evacuation routes, assembly points, and floor warden contacts before an emergency occurs.
- Describe the security considerations during building evacuations, including securing laptops, locking sensitive areas if time permits, and accounting for visitors.
- Explain how attackers can exploit emergency situations (fire alarms, evacuations) to bypass security controls and access unattended areas.
- Identify the security protocols for re-entering the building after an evacuation, including badge verification and checking for unauthorized access during the absence.
Building a security-conscious culture
- Describe how individual physical security behaviors collectively determine the organization's overall physical security posture and vulnerability to attack.
- Explain the concept of security fatigue and how routine complacency with badge checks, door holds, and visitor procedures gradually weakens physical security defenses.
- Synthesize physical security awareness principles to evaluate an office floor plan and identify the most significant physical security gaps and recommend practical improvements.
- Synthesize visitor management, badge security, and tailgating prevention concepts to create a comprehensive reception area security protocol for a new office.
Scope
Included Topics
- Physical security awareness for general corporate employees, covering tailgating and piggybacking prevention, badge policies, and access control awareness.
- Visitor management procedures, escort requirements, and sign-in and sign-out protocols for guests and contractors.
- Secure areas including server rooms, data centers, executive suites, and restricted zones with appropriate access levels.
- Document disposal practices including shredding, secure recycling, and handling of printed confidential materials.
- Clean desk policy compliance, secure storage of sensitive materials, and end-of-day security routines.
- USB drop attacks, unauthorized device detection, and physical social engineering tactics targeting employees.
- Practical scenario-driven training focused on everyday physical security decisions employees encounter in office environments.
Not Covered
- Physical security system design, installation, or administration including CCTV systems, alarm systems, and access control hardware.
- Facilities management, building code compliance, fire suppression system design, or HVAC security.
- Executive protection, personal security details, or threat assessment methodologies for high-value individuals.
- Penetration testing of physical security controls or red team physical intrusion techniques.
- Security guard training, patrol procedures, or law enforcement coordination beyond basic reporting.
SA Physical Security is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified