UFC-DOD Minimum Antiterrorism Standards...
UFC – Minimum Antiterrorism Standards for DOD Buildings: This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense...
Security for Architects and Engineers
(SAE) Security for Architects and Engineers – This 2-day course explores principles developed over the last twenty years in the “social behavior” arena. The same concepts that effect positive social engineering are duplicated in designing inhabited spaces to cause people to do what you want them to do. Students will learn to design “from the curb inward” and incorporate overlapping threat prevention principles. We...
Physical Security Engineering Convergen...
With electronic technologies quickly converging in the physical security vertical it is paramount to understand; first, the basics of physical security, ssecondly, how this new technology will effect the physical security landscape of the future, and thirdly, how the correct physical security environment can actually enhance the technology's effectiveness. Every good physical security program starts with assessing and quantifying criticality,...
Interagency Security Committeee: Risk A...
The Interagency Security Committee (ISC) developed the ISC Risk Management Process to ensure that security becomes an integral part of the planning, design, and construction of new federal office buildings and major modernization projects. The criteria considers security in all building systems and elements. In this 3-day workshop we cover the risk management process for federal facilities and security industry best practices in protecting pro...
Vulnerability Assessment and Risk Analy...
(VAR) Vulnerability Assessments and Risk Analysis Methodologies – A variety of five qualitative and quantitative methodologies are discussed in detail. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. Three full days of field evaluations assessing lighting, electric systems, drinkin...
Identity, Credentials and Access Manage...
Identity, Credential and Access management (ICAM) – The Federal Identity, Credentialing and Access Management (ICAM) architecture provides Federal, State, Local, Tribal Agencies and the private industry with a consistent approach for managing the vetting and credentialing of individuals requiring access to information systems and facilities. On May 21, 2019 the Office of Management and Budget, (OMB) released M-19-17 Titled: Enabling Miss...
Security Criteria Development: Exceedin...
CANCELED
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
B.L.A.C.K. Collaborative Leadership Ski...
The five pillars of the B.L.A.C.K Collaborative Leadership Skills Training method are discussed during this 2-day course. Companies, groups and teams of people manifest the same characteristics as individuals and therefore, experience the same problems, albeit on a different scale. Results driven, “the bottom line” and ICT are the key words within which any (major) organization operates these days. Even though people are considered...
Drills and Exercise Planning and Development
Geared for those who must evaluate training plans, drills and other operational factors during extreme conditions. A series of table-top and field evaluations are designed and tested. Exposes students to DOD Combat Training type stress. Upon completion student will be able to design, development and conduct live, virtual and constructive (LVC) drills and exercises that conform to the Post Katrina Management Reform Act (Public Law 109-29, Oct 4...
Planning Electronic Security Systems fo...
This course was developed with the asset owner in mind. Students will learn how to design CCTV systems for different types of secure areas, compounds and installations. Students will be able to design their own intrusion detection (IDS) and access control systems (ACS) for sensitive compartmented Information facilities (SCIF) and secure vaults, limited access or controlled areas, and high value storage areas. Students will ultimately combine c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.