Security Criteria Development: Exceedin...
A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also learn ho...
Physical Security Engineering Convergen...
With electronic technologies quickly converging in the physical security vertical it is paramount to understand; first, the basics of physical security, ssecondly, how this new technology will effect the physical security landscape of the future, and thirdly, how the correct physical security environment can actually enhance the technology's effectiveness. Every good physical security program starts with assessing and quantifying criticality,...
Interagency Security Committeee: Risk A...
The Interagency Security Committee (ISC) developed the ISC Risk Management Process to ensure that security becomes an integral part of the planning, design, and construction of new federal office buildings and major modernization projects. The criteria considers security in all building systems and elements. In this 3-day workshop we cover the risk management process for federal facilities and security industry best practices in protecting pro...
Identity, Credentials and Access Manage...
Identity, Credential and Access management (ICAM) – The Federal Identity, Credentialing and Access Management (ICAM) architecture provides Federal, State, Local, Tribal Agencies and the private industry with a consistent approach for managing the vetting and credentialing of individuals requiring access to information systems and facilities. On May 21, 2019 the Office of Management and Budget, (OMB) released M-19-17 Titled: Enabling Miss...
Planning Electronic Security Systems fo...
This course was developed with the asset owner in mind. Students will learn how to design CCTV systems for different types of secure areas, compounds and installations. Students will be able to design their own intrusion detection (IDS) and access control systems (ACS) for sensitive compartmented Information facilities (SCIF) and secure vaults, limited access or controlled areas, and high value storage areas. Students will ultimately combine c...
Sensitive Compartmented Information Fac...
Sensitive Compartmented Information Facility Design and Construction – After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF), classified storage vaults and open storage spaces which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, ac...
Security Criteria Development: Exceedin...
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
Sensitive Compartmented Information Fac...
After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent...
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing the criminal and terrorist threat to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.