Friday, February 23, 2018

physical-security banner-30


This is a combination of the Core Level and Advanced Level physical security vulnerability and risk assessment courses.


Step 1:  Explore and learn the components a physical security system.phy-301-402

Before one can "assess or audit" something, one must understand "how it is supposed to work".  Students will learn about exterior and interior protection system components and subcomponentsincluding security policies, procedures, and legal considerations.

Step 2:  Fine tune your risk analysis skills.

Choosing the assessment methodology and planning the assessment is a major consideration because the cost of some assessment programs can run into the tens of thousands of dollars not to mention man-hours. 

An assessment performed by someone who is not well-founded in risk analysis skills will produce an incompetent assessment that will actually insert additional risk because of ill-advised countermeasure recommendations.  Students will learn valuable risk analysis skills conforming to U.S. Department of Homeland Security (DHS) best practices.

Step 3:  Gather, analyze and process the data.

Lost time, lost productivity, sorting through the all the data can all become confusing to the analyst and can actually reduce his or her effectiveness.   Since it is impossible and not economically feasible to protect everything, the most important critical assets and vulnerabilities must be identified, and protection systems must be allocated in order of highest priority.  Students will use economical tools and techniques to break down and screen the risks, vulnerabilities, and consequences. 

They will learn to think critically about "how" they make judgments and reach conclusions and not just about the judgments and conclusions themselves.

Step 4:  Develop findings, protection goals and reports for stakeholders.

The data generated from the security risk and vulnerability assessments must be organized and put into a concise comprehensive report for executive management.  Because despite all the hard work, if the report is flawed, that will be all the decision makers will notice.  Students will learn how to lay-out the risks, vulnerabilities, protection goals and upgrade costs.  They will be able to provide a quality report with convincing arguments and findings, and with countermeasures selections that are reasonable and cost-effective.



Highlights include:

  • Security Policies
  • Executive Protection Assessments
  • U.S. Dept. of Defense- Design Systems Approach
  • Aggressor Tactics
  • Protective Barriers & Building Elements
  • Intrusion Detection Systems
  • Electronic Security Systems design components
  • Physical Security Penetration Testing
  • Performance-based Vulnerability Assessments
  • S.A.N.D.I.A. Physical Protection System Design
  • E.A.S.I. Model Critical Path Analysis
  • Risk Analysis Methodologies and Skills
  • Socratic Questioning Analysis
  • Criticality and Consequence Analysis
  • Threat Analysis & Estimating Probability
  • Asset Target Value Matrices
  • Budgeting Tools and Decision Matrix
  • Cost-Effectiveness Metrics and Executive Reports