Vulnerability Assessment/Risk Analysis...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & R3SME [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerou...
Safe-haven Design and Construction
A safe-haven is a structure or protected area, that provides protection from man-made or natural threats, for both short and long periods of time. It usually serves as a fall back position in case of emergencies. Effective design components; i.e., air requirements and waste management, capacity limits, use of electronic media and other technologies will be examined in detail.
Protecting People, Facilities and Information
This workshop has been especially developed for the decision makers, so that they can formulate policy that translates into plans and procedures that provide for the safety and well-being of personnel. Course curriculum focuses on protecting personnel, the facilities they work in and the information systems they use. Students will learn what constitutes suspicious behavior, how and what to report, Counter-surveillance techniques, what actions...
Designing Secure Buildings
A workshop designed to familiarize students with design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Window Systems, Lighting, Vehicle Barrier Selection, Electronic Secur...
Security Criteria Development
This workshop focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.