Course Methodology
This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that enable all participants to apply the advanced knowledge they gained and demonstrate their skills in security management.
Course Objectives
By the end of the course, participants will be able to:
- Explain the process of designing procedures
 - Conduct a security survey
 - Explain risk management
 - Describe and understand access control systems
 - Explain management and selection of manpower
 - Apply basic investigation procedures
 - Utilize crisis management techniques
 
Target Audience
Managers and security staff wishing to develop an understanding of security management techniques and to further their knowledge of the security function, approach, and strategy.
Target Competencies
- Security management
 - Developing Security policies and procedures
 - Handling Physical security
 - Conducting Risk assessment
 - Incident management
 - Conducting Incident investigation
 
Security policies and procedures
- What the policies and procedures cover
 - Who should design the policies and procedures
 - Why security policies are of use to companies
 - Why security procedures are of use to companies
 
Security operations management
- What operations management is
 - What are the responsibilities
 - How the remainder of the security team fits in
 
Perimeter and building security
- Measures available
 - Developing security on sites
 - Managing security on sites
 
Introduction to security surveying
- Understanding the risks
 - Considering security options
 - Communicating results to the client
 
Security risk management
- Introduction to security risk management
 - What risk management means
 - Who applies risk management
 - Risk mitigation
 - Risk management continuum
 
Access Management
- Types of access systems
 - How the access systems are used
 - Introduction to CCTV
 - Intruder detection
 - Implementing the systems
 
Manpower selection and development
- Selecting the right profile
 - Screening of individuals
 - Vetting of individuals
 - On-going professional training
 
Introduction to investigations
- Gathering of information
 - Purpose of the investigation
 - Requirements of the investigation
 - Upholding Credibility
 - Keeping Documentation
 - Legal aspects
 
Crisis management
- Dealing with a crisis
 - Fall back planning
 - Post incident considerations