Modern Security Management and Operations Course

Course Overview

The purpose of this training course is to provide delegates with an understanding of the current issues and problems facing the Security Industry at a management level thereby gaining integrated knowledge, skills, and applied competence on the side of the regulatory and legislative control of the management of security. This knowledge will assist delegates in the implementation of the necessary supervisory, managerial and technical knowledge, values, and skills for the more effective and efficient functioning of the provision of security services throughout society at different security workplaces as found in the highly diversified security environment.

Management of security risks applies the principles of risk management to the management of security threats. It consists of identifying threats (or risk causes), assessing the effectiveness of existing controls to face those threats, determining the risks’ consequence(s), prioritizing the risks by rating the likelihood and impact, classifying the type of risk, and selecting an appropriate risk option or risk response

This training course will provide practical and up-to-date security management skills and techniques that can be implemented within each participant’s organization and security team.

This course validates your ability to manage your Security Operations team, suppliers, resources, and business processes in line with current industry standards. You will learn all the necessary security measures in response to dynamic security demands

Course Duration

5 Days

Who Should Attend

This training course is suitable for a wide range of professionals but will greatly benefit:

  • Experienced / Non Experienced Security Managers
  • Civilian Representatives
  • Managers
  • Supervisors
  • Risk Management Staff
  • The course is also designed for other professionals who need to keep up-to-date with the latest trends in security management techniques
Course Level: Foundation

Course Objectives

By the end of this training course, participants will be able to:

  • Apply the basic concept of management to security and explain the specialist role of the security manager
  • Plan, develop and organize the human and material resources necessary for the effective operation of a security unit
  • Advice on the development of security programs and Standard Operating Procedures
  • Monitor and enforce the implementation of security programs and SOPs
  • Verify that security personnel are able to implement security preventive measures
  • Advice on the development of emergency plans and manage the security response action necessary in security emergencies involving facilities, terminal buildings, and public access facilities

Course Outline:

Module 1 -Security Risk Management Framework

  Introductions and Sign In

  • Security Risk Management
  • Loss prevention techniques
  • Security Surveillance
  • Security Management framework – Working on the system
  • Key Concepts in Physical Security Resource Management
  • Building and Perimeter Security

Module 2 - Addressing issues faced by Security

  • Determining job requirements and recruitment criteria – Who makes a Good Security Officer?
  • Motivating staff and providing feedback
  • Deploying, briefing, and supervising staff
  • Assessing staff performance
  • Understanding primary threats to physical security
  • Conducting Risk (RA) and Vulnerability (SVA) Assessments

Module 3 - Access Control and Physical Monitoring

  • Electronic Intruder Detection
  • Security Contingency Planning
  • Physical Security Asset Acquisition
  • CCTV Operations
  • Operation and Maintenance of Physical Security Resources
  • Situational Awareness

Module 4 - Overview of Security Planning and Investigations

  • Security and Emergency Planning documentation
  • Responding to major security emergencies
  • Security Policies and Procedures
  • Defining Proposed Resource Outcomes and Cost-Effectiveness
  • Considering Life-Cycle, Warranty and Preventive Maintenance
  • Industry Investigation Techniques

Module 5 - Information Security

  • Finding the balance between public facilitation and security measures
  • Security Management Systems (SMS)
  • Close Protection Basics
  • Determining Resource Support
  • Physical Security/Information Technology Integration
  • Audit and Review
Course Administration Details
Customized Training

This training can be tailored to your institution needs and delivered at a location of your choice upon request.

Requirements

Participants need to be proficient in English.

Training Fee

The fee covers tuition, training materials, refreshments, lunch, and study visits. Participants are responsible for their own travel, visa, insurance, and personal expenses.

Certification

A certificate from Ideal Sense & Workplace Solutions is awarded upon successful completion.

Accommodation

Accommodation can be arranged upon request. Contact via email for reservations.

Payment

Payment should be made before the training starts, with proof of payment sent to outreach@idealsense.org.
For further inquiries, please contact us on details below:

Email: outreach@idealsense.org
Mobile: +254759708394

Register for the Course

Face to Face Training Schedules


Virtual Trainer-Led Training Schedules


For customized training dates or further enquiries, kindly contact us on +254759708394 or email us at outreach@idealsense.org.