Health, Safety & Security / Security

Wishlist

Security Management

HS121

No Schedule Course Found, You can Request Schedule or ask for a proposal to get as in-House for your team. Request eProposale

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that enable all participants to apply the advanced knowledge they gained and demonstrate their skills in security management.

Target Competencies

  • Security management
  • Developing Security policies and procedures
  • Handling Physical security
  • Conducting Risk assessment
  • Incident management
  • Conducting Incident investigation

By the end of the course, participants will be able to:

  • Explain the process of designing procedures
  • Conduct a security survey
  • Explain risk management
  • Describe and understand access control systems
  • Explain management and selection of manpower
  • Apply basic investigation procedures
  • Utilize crisis management techniques

Managers and security staff wishing to develop an understanding of security management techniques and to further their knowledge of the security function, approach, and strategy.

Security policies and procedures

  • What the policies and procedures cover
  • Who should design the policies and procedures
  • Why security policies are of use to companies
  • Why security procedures are of use to companies

Security operations management

  • What operations management is
  • What are the responsibilities
  • How the remainder of the security team fits in

Perimeter and building security

  • Measures available
  • Developing security on sites
  • Managing security on sites

Introduction to security surveying

  • Understanding the risks
  • Considering security options
  • Communicating results to the client

Security risk management

  • Introduction to security risk management
  • What risk management means
  • Who applies risk management
  • Risk mitigation
  • Risk management continuum

Access Management

  • Types of access systems
  • How the access systems are used
  • Introduction to CCTV
  • Intruder detection
  • Implementing the systems

Manpower selection and development

  • Selecting the right profile
  • Screening of individuals
  • Vetting of individuals
  • On-going professional training

Introduction to investigations

  • Gathering of information
  • Purpose of the investigation
  • Requirements of the investigation
  • Upholding Credibility
  • Keeping Documentation
  • Legal aspects

Crisis management

  • Dealing with a crisis
  • Fall back planning
  • Post incident considerations

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that enable all participants to apply the advanced knowledge they gained and demonstrate their skills in security management.

Terms & Conditions

ACTrain reserves the right to alter the Course Schedule without Prior Notification, Fees Quoted are Subject to Terms & Conditions Outlined in ACTrain's Registration Policy

SAVE

With Group Discount

Upcoming Courses