Vulnerability Assessment and Risk Analy...
A variety of five qualitative and quantitative methodologies are discussed in detail. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. Three full days of field evaluations assessing lighting, electric systems, drinking water, infrastructure and perimeters are an integral part of this ...
Drills and Exercise Planning and Development
Geared for those who must evaluate training plans, drills and other operational factors during extreme conditions. A series of table-top and field evaluations are designed and tested. Exposes students to armed forces style combat training type stress. Upon completion student will be able to design, development and conduct live, virtual and constructive (LVC) drills and exercises that include “best practices” from a security perspec...
Security Criteria Development: Exceedin...
A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also learn ho...
Vulnerability Assessment and Risk Analy...
(VAR) Vulnerability Assessments and Risk Analysis Methodologies – A variety of five qualitative and quantitative methodologies are discussed in detail. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. Three full days of field evaluations assessing lighting, electric systems, drinkin...
Security Criteria Development: Exceedin...
CANCELED
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
Drills and Exercise Planning and Development
Geared for those who must evaluate training plans, drills and other operational factors during extreme conditions. A series of table-top and field evaluations are designed and tested. Exposes students to DOD Combat Training type stress. Upon completion student will be able to design, development and conduct live, virtual and constructive (LVC) drills and exercises that conform to the Post Katrina Management Reform Act (Public Law 109-29, Oct 4...
Safe-haven and Shelter Design and Const...
Safe-haven and Shelter Design & Construction – Safe-room, panic rooms, evacuation shelters, tornado cellars and collective shelters all provide protection from man-made or natural threats, for both short and long periods of time. They usually serves as a place to repair to during emergency situations; a fall back position in case of emergencies, if you will. Effective design components; i.e., air requirements and waste management, ca...
Designing Secure Buildings: Integrating...
(DSB) Designing Secure Buildings – This 3-day workshop is designed to familiarize students with twenty-one design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Windo...
Security Criteria Development: Exceedin...
(SCD) Security Criteria Development: Exceeding DHS Guidelines – A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into...
Vulnerability Assessments and Risk Anal...
(VAR) Vulnerability Assessments and Risk Analysis Methodologies – A variety of five qualitative and quantitative methodologies are discussed in detail. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. Three full days of field evaluations assessing lighting, electric systems, drinkin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.