تفاصيل الدورة
Why Attend
This course will provide participants with an insight into the fundamentals of managing modern and effective security operations.
It will address a wide variety of topics such as security policies and procedures, risk management, access management and investigation, to enable all participants to understand the principles of security and risk management.
The course will provide practical and up-to-date security management skills and techniques that can be implemented within each participant's organization and security team.
Course Methodology
This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that enable all participants to apply the advanced knowledge they gained and demonstrate their skills in security management.
Course Objectives
- Explain the process of designing procedures
- Conduct a security survey
- Explain risk management
- Describe and understand access control systems
- Explain management and selection of manpower
- Apply basic investigation procedures
- Utilize crisis management techniques
Target Audience
Target Competencies
- Security management
- Developing Security policies and procedures
- Handling Physical security
- Conducting Risk assessment
- Incident management
- Conducting Incident investigation
Course Outline
- Security policies and procedures
- What the policies and procedures cover
- Who should design the policies and procedures
- Why security policies are of use to companies
- Why security procedures are of use to companies
- Security operations management
- What operations management is
- What are the responsibilities
- How the remainder of the security team fits in
- Perimeter and building security
- Measures available
- Developing security on sites
- Managing security on sites
- Introduction to security surveying
- Understanding the risks
- Considering security options
- Communicating results to the client
- Security risk management
- Introduction to security risk management
- What risk management means
- Who applies risk management
- Risk mitigation
- Risk management continuum
- Access Management
- Types of access systems
- How the access systems are used
- Introduction to CCTV
- Intruder detection
- Implementing the systems
- Manpower selection and development
- Selecting the right profile
- Screening of individuals
- Vetting of individuals
- On-going professional training
- Introduction to investigations
- Gathering of information
- Purpose of the investigation
- Requirements of the investigation
- Upholding Credibility
- Keeping Documentation
- Legal aspects
- Crisis management
- Dealing with a crisis
- Fall back planning
- Post incident considerations
الموقع
Security أسئلة ذات صلة
- Cyber Security Diploma Inspire London College83 درهم
2,449 درهممدة الدورة التدريبية: 80 Hours - Reverse Aging & Longevity Study 36588 درهممدة الدورة التدريبية: 1 Hour