Friday, February 23, 2018

Core Level - Physical Security Vulnerability Assessments

Core Level: Physical Security Vulnerability Assessments

Duration:  1 Day


Due to heightened security threats, organizations around the world are reevaluating their fiduciary and security obligations to their customers, shareholders and employees—strengthening their security systems against unforeseen vulnerabilities.

Security is about risk management. Eliminating or mitigating all risk can be quite costly and at some point may even produce diminishing returns.  Security professionals often find it difficult to make a business case and get management to support and commit resources to protect against something that hasn't happened yet.

It is important to have a thorough understanding  of physical security systems and procedures and to consider all conceivable threats, even the doomsday ones, in order to effectively mitigate them.

Have you conducted a physical security risk and vulnerability assessment this year?

In just ONE DAY students will...


  • Explore the various components of an integrated physical security system.phy301
  • Before one can "assess or audit" something, one must understand "how it is supposed to work".  This one (1) day concentrated course will provide valuable information to all those involved in planning, designing, managing, maintaining, and testing physical security systems.  Students will learn about exterior and interior protection system components and subcomponents including security policies, procedures, and legal considerations.


  • Learn about protection techniques used against traditional and non-traditional threats.
  • Students will learn techniques used by organizations to prepare for and defend against threats including specific building design, countermeasure functions, and strategic protection strategies to deter, delay and defeat an attack and remove the incentives for perpetrators.  Learn about the advantages and disadvantages of various security countermeasures as well as the exploits for them.


  • Learn step-by-step how to conduct a vulnerability assessment, spot performance weaknesses and make no-cost improvements.
  • In order construct a framework for subsequent improvements and countermeasures, conducting a vulnerability assessment is crucial.  Students will learn methodologies and techniques for carrying out a security vulnerability assessment, including those used by the US Department of Defense, and SANDIA National Laboratories.

Topics Include:

  • Planning and Designing Physical Security Systems
  • Security Policies
  • D.O.D. Design Systems Approach
  • Aggressor Offensive Tactics
  • Office and Executive Protection Assessments
  • Protective Barriers and Building Elements
  • IDS and ESS Components
  • Alarm Communication and RF Assessments
  • Vulnerability Analysis Methodologies
  • SANDIA Performance-based PPS design
  • E.A.S.I. Model - Critical Path Analysis