Vulnerability Assessment and Risk Analy...
(VAR) Vulnerability Assessments and Risk Analysis Methodologies – A variety of five qualitative and quantitative methodologies are discussed in detail. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. Three full days of field evaluations assessing lighting, electric systems, drinkin...
Identity, Credentials and Access Manage...
Identity, Credential and Access management (ICAM) – The Federal Identity, Credentialing and Access Management (ICAM) architecture provides Federal, State, Local, Tribal Agencies and the private industry with a consistent approach for managing the vetting and credentialing of individuals requiring access to information systems and facilities. On May 21, 2019 the Office of Management and Budget, (OMB) released M-19-17 Titled: Enabling Miss...
Planning Electronic Security Systems fo...
This course was developed with the asset owner in mind. Students will learn how to design CCTV systems for different types of secure areas, compounds and installations. Students will be able to design their own intrusion detection (IDS) and access control systems (ACS) for sensitive compartmented Information facilities (SCIF) and secure vaults, limited access or controlled areas, and high value storage areas. Students will ultimately combine c...
Access Control Concepts and Entry Contr...
Like the Maintaining Control Workshop conducted by the US Army Surface Deployment and Distribution Traffic Engineering Agency, this class is intended for government, military and contractor SECURITY or ENGINEERING personnel involved in designing entry control facilities. The curriculum focuses on the design features required for the effective and efficient operation of access control points at installation perimeters and controlled areas from...
Designing Secure Buildings: Integrating...
(DSB) Designing Secure Buildings – This 3-day workshop is designed to familiarize students with twenty-one design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Windo...
Sensitive Compartmented Information Fac...
Sensitive Compartmented Information Facility Design and Construction – After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF), classified storage vaults and open storage spaces which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, ac...
Access Control Concepts and Entry Contr...
Access Control Concepts and Entry Control Facility Design(ECF) – Like the Maintaining Control Workshop conducted by the US Army Surface Deployment and Distribution Traffic Engineering Agency, this class is intended for government, military and contractor SECURITY or ENGINEERING personnel involved in designing entry control facilities. The curriculum focuses on the design features required for the effective and efficient operation of acce...
Security Criteria Development: Exceedin...
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
Sensitive Compartmented Information Fac...
After attending this unclassified class, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent eav...
Inhabited Space: Creating Crime Free Zones
This 2-day course explores principles developed over the last twenty years in the “social behavior” arena. The same concepts that effect positive social engineering are duplicated in designing inhabited spaces to cause people to do what you want them to do. Students will learn to design “from the curb inward” and incorporate overlapping threat prevention principles. We also look at crime and terrorist activity and their...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.