Learn to Better Manage Security
Both Property and personal
Lesson Structure
There are 9 lessons in this course:
-
Scope And Nature of Security Operations
-
Introduction
-
Threats
-
What can be threatened
-
Perceived threats
-
Threat versus risk
-
Threat assessment
-
Second line of defence
-
Hierarchy of security controls
-
Home security
-
Plants for security
-
Inside the burglars mind
-
Ethical Issues in security
-
Insurance
-
Social media
-
Low tech Security Equipment
-
Introduction
-
Gates and doors
-
Latches
-
Locks
-
Safes
-
Vaults
-
Safe types
-
Vault types
-
Alarms
-
Lighting
-
Signs and Security cameras
-
Placement
-
Single versus combination use
-
Piracy and theft
-
Weapons
-
Security Equipment Technology
-
Lighting
-
Alarms
-
Wired systems
-
Wireless systems
-
Monitored systems
-
Unmonitored systems
-
Triggers - types, motion, sound, laser triggers
-
What is triggered
-
Fire and other alarm systems
-
Smoke detectors
-
Heat detectors
-
Carbon monoxide detectors
-
Locating detectors
-
Security cameras - inside or out
-
Closed circuit or stand alone cameras
-
Specific camera types - PTZ, boxed, fixed, bullet, turret etc
-
Motion detection/activation
-
Thermographic imaging
-
Doorbells
-
Security Personnel
-
Types of security personnel
-
Using security personnel
-
Fixed position security
-
Security patrols
-
Security dogs -pet dogs, guard dogs
-
Security Equipment Installers
-
5. Risk Assessment and Protocols
-
Being proactive, not reactive
-
Evaluating risk
-
What is risk assessment
-
Risk mitigation
-
Risk assessments at a premises
-
Electronic risk assessment
-
Security protocols
-
Burglar profile
-
Burglar security measures
-
Shoplifting and security measures
-
Arson and security measures
-
Applications – Property Protection – land and buildings
-
Protecting land and buildings
-
Perimeter fencing
-
Automatic gates
-
Window bars
-
Protecting commercial properties
-
Burglars and intruders
-
Terrorism
-
Reducing fire risk
-
Security lighting
-
Protecting land
-
Applications – Property Protection -cars, art, valuables
-
Need and level of protection
-
Worth of an item
-
Level of risk exposure
-
What the valuable is
-
How conspicuous is it
-
Where/how is it kept
-
Cost of protection
-
Pets and livestock
-
Highly valuable items
-
Protecting valuables
-
Applications – Personal Protection
-
What is personal protection
-
Why personal protection is needed
-
Types of harm
-
Situational risk management
-
Types of threats
-
Operators working within a management system
-
Situational crime prevention
-
Personal protection of oneself
-
When threatened from a known individual
-
Gender based violence
-
Bullying, racism and discrimination
-
Devices & equipment for protection
-
Applications – Commercial property and events
-
Commercial property protection
-
Inventory
-
Preventing theft and tampering
-
Offices
-
Factories
-
Shopping centres
-
Events protection
-
Contingency and emergency planning
-
Rules and regulations
-
Crowd control
-
Traffic & transport
-
Adult activities and children
-
Theft and vandalism