Certificate in Security Management (CSM)

Certificate in Security Management (CSM)

Product Code: تدريب حضوري
Product available in stock : 1000
  • $3,500.00

  • Ex Tax: $3,500.00

Available Options


Tags: Certificate in Security Management (CSM)

Course Methodology

This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that enable all participants to apply the advanced knowledge they gained and demonstrate their skills in security management.

Course Objectives

By the end of the course, participants will be able to:

  • Explain the process of designing procedures
  • Conduct a security survey
  • Explain risk management
  • Describe and understand access control systems
  • Explain management and selection of manpower
  • Apply basic investigation procedures
  • Utilize crisis management techniques

Target Audience

Managers and security staff wishing to develop an understanding of security management techniques and to further their knowledge of the security function, approach, and strategy.

Target Competencies

  • Security management
  • Developing Security policies and procedures
  • Handling Physical security
  • Conducting Risk assessment
  • Incident management
  • Conducting Incident investigation

Security policies and procedures

  • What the policies and procedures cover
  • Who should design the policies and procedures
  • Why security policies are of use to companies
  • Why security procedures are of use to companies

Security operations management

  • What operations management is
  • What are the responsibilities
  • How the remainder of the security team fits in

Perimeter and building security

  • Measures available
  • Developing security on sites
  • Managing security on sites

Introduction to security surveying

  • Understanding the risks
  • Considering security options
  • Communicating results to the client

Security risk management

  • Introduction to security risk management
  • What risk management means
  • Who applies risk management
  • Risk mitigation
  • Risk management continuum

Access Management

  • Types of access systems
  • How the access systems are used
  • Introduction to CCTV
  • Intruder detection
  • Implementing the systems

Manpower selection and development

  • Selecting the right profile
  • Screening of individuals
  • Vetting of individuals
  • On-going professional training

Introduction to investigations

  • Gathering of information
  • Purpose of the investigation
  • Requirements of the investigation
  • Upholding Credibility
  • Keeping Documentation
  • Legal aspects

Crisis management

  • Dealing with a crisis
  • Fall back planning
  • Post incident considerations

Write a review

Note: HTML is not translated!
    Bad           Good