Security

C4SEM-SEC-100 Introduction to Security Disciplines

24 Clock Hours

 

This course provides comprehensive instruction regarding the fundamentals and foundations of security disciplines for each of these objectives: Support; Prevention; Detection; Response; and Recovery. It includes a review of Homeland Security Presidential Decision Directive (HSPD)-7.

Objectives:

  • Explain and discuss potential threats

  • Explain and discuss how to establish comprehensive plans, policies and procedures to thwart potential threats

  • Explain and discuss the fundamental principles of physical security

  • Explain and discuss the fundamental principles of personnel security

  • Explain and discuss the fundamental principles of information technology security

  • Explain and discuss the fundamental principles of operations Security

  • Explain and discuss the fundamental principles of information security

  • Explain and discuss the fundamental principles of communication security

 

Apply Today!

 

 

C4SEM-SEC-101 Potential Terrorist Targets

24 Clock Hours

 

This course examines both traditional and non-traditional targets for terrorist attacks, as well as the identification of facility vulnerabilities, the ability to make recommendations relative to the most appropriate form of countermeasure, and the development of comprehensive security policies and plans.

Objectives:

  • Explain and discuss the critical infrastructure categories

  • Explain and discuss the meaning of credible threat

  • Explain and discuss why terrorists choose certain targets

  • Describe and discuss terrorist tactics and targeting

  • Describe the classes of targets and the tactics applied against those targets

  • Discuss the most likely scenarios of terrorist attacks against critical infrastructure targets

  • Discuss the benefits of vulnerability assessment and viable counter measures

 

Apply Today!

 

 

C4SEM-SEC-102 Risk Assessment-Critical Infrastructure Protection

24 Clock Hours

 

This course provides an introduction to Homeland Security Presidential Decision Directive (HSPD)-20. It identifies the vulnerabilities associated with the infrastructure of a facility, as well as its model relationships within the community. In addition to classroom instruction, this course includes an exercise (field or tabletop), consisting of an assessment of a facility and completion of a written vulnerability assessment.

Objectives:

  • Define the term Risk Assessment

  • Define the following terminology:

    • Asset

    • Risk

    • Threat

    • Vulnerability

    • Countermeasure

  • Explain and discuss various countermeasure strategies

  • Explain and discuss target hardening

  • Define critical infrastructure

  • Discuss types of threats to critical infrastructure

  • Explain why various targets are attractive to terrorists

  • Explain why various security measures impact the critical infrastructure plan

  • Give examples of routine patrol and its potential impact on terrorism

  • Identify how to gather and report intelligence with regard to reporting terrorist activity on a target

  • Discuss the benefits of the vulnerability assessment and viable counter measures

 

Apply Today!

 

 

C4SEM-SEC-103 Prevention of Terrorist Attack against a Facility

24 Clock Hours

 

This course reviews the basic fundamentals of the physical security of a critical infrastructure and provides strategies and techniques for proper planning that are required for conducting a physical security vulnerability assessment. Emphasis is placed on the perception and viable assumptions of threat levels based on valid and reliable information and the likelihood of a location becoming a potential target based on its weaknesses or vulnerabilities. In addition, it provides students with an introduction to the utilization of the different types of physical security devices, such as intrusion detection system (IDS), Alarm systems, locks, closed-circuit television (CCTV) cameras and systems, types of fencing/barriers, HVAC, proxy or biometric access control, bomb blast mitigation and to address perimeter security and facility vulnerability.

Objectives:

  • Explain and examine the different access controls with a particular focus on developing technologies and the emergence of biometric, retinal scan systems as a means to enhance physical security and address a facility’s vulnerabilities

  • Discuss various types of CCTV, as well as the different methods used to capture and store the captured video images

  • Explain the importance of IDs as a component of risk assessment by enhancing physical security and addressing a facility’s vulnerabilities

  • Discuss the variety and different types of fences, with a focus on the importance of fencing as a component of risk mitigation by enhancing physical security and addressing a facility’s vulnerabilities

  • Explain and discuss the importance of glazing as a component of risk mitigation by enhancing physical security and addressing a facility’s vulnerabilities

  • Discuss the various types and means of physical security improvements required to prevent a terrorist from targeting a facility’s HVAC system

  • Explain and discuss the vulnerabilities of an HVAC system to a chemical or biological agent attack

  • Discuss the various types of physical barriers that can be used to control pedestrian and or vehicular traffic, thus improving security measures and addressing a facility’s perimeter vulnerabilities

  • Explain the variety of new technologies and construction options that can be used to mitigate the impact of an explosive device

 

Apply Today!

 

 

C4SEM-SEC-104 Security Checkpoints-Vehicle Inspections

24 Clock Hours

 

This course studies and examines principles associated with Vehicle Borne Improvised Explosive Devices (VBIEDs) and the methodology and techniques used to screen vehicles and address vulnerabilities and operational risks including the use of technology, tactics and procedures for vehicle security checkpoints and an intensive inspection of a vehicle or truck.

Explosive Devices, effects of explosives; and types of initiation systems.

Objectives:

  • Explain and discuss what to look for when performing a general vehicle inspection

  • Explain virtual inspection, ID check and the purpose of an interview

  • Explain and discuss the typical questions that can be asked during an interview

  • Explain the behavior indicators from an interview

  • Explain and discuss fight/flight physical and auditory manifestations

  • Explain and discuss what to be aware of when doing an undercarriage search of a vehicle

  • Explain and discuss what to be aware of when doing an exterior search of a vehicle

  • Explain and discuss what to be aware of when doing an interior search of a vehicle

  • Discuss the four general rules to avoid injury

  • Explain and discuss protocols and strategies when responding to suspected VBIEDs

 

Apply Today!

 

C4SEM-SEC-105 Cyber Terrorism -Security

24 Clock Hours

This course provides an examination and study of the risk and vulnerabilities associated with information technologies. This course is a blended learning approach that balances classroom lecture and hands-on exercises in the examination of the use of the Internet by Islamist terrorist groups for the purpose of recruitment, communication, intelligence gathering, funding and pre-operational surveillance. It also utilizes case studies that involve the targeting of information technologies by these groups.

Objectives:

  • Define the term cyber terrorism

  • Explain and discuss some dangers of the Internet

  • Explain and discuss various targets of our electronic infrastructure

  • Explain and discuss the vulnerabilities associated with Open Source

  • Describe best practices for Computer and Physical Security

  • Demonstrate and discuss examples of terrorists use of the Internet

  • Discuss principle of combating cyber terrorism

  • Explain and discuss how to preserve and collect critical evidence logs

  • Discuss the primary use to assist law enforcement in resolving an event and apprehending perpetrators

 

Apply Today!

 

C4SEM-SEC-106 Terrorism against Transportation

24 Clock Hours

 

This course evaluates the overall security transportation system and provides an introduction to the methods that terrorist groups have used to target transportation facilities and passenger-bearing craft, as well as the threats associated with protecting bridges and underwater tunnels from terrorist attack. In addition this course studies the challenges associated with securing ports, terminals, particularly in reference to the receipt, storage, and distribution of commercial containers, and also introduces the student to the major law enforcement agencies tasked with monitoring, regulating and investigating these various industries.

Objectives:

  • Define Transportation Security

  • Explain and discuss the limitations and vulnerabilities with the current systems

  • Explain and discuss current risk mitigation strategies

  • Explain international coordination activates

 

Apply Today!

© 2010-2019  Center for Security and Emergency Management C4SEM ®  All rights reserved.

Web Master: ename4sale.com

FOLLOW US:

  • w-facebook
  • Twitter Clean
  • White LinkedIn Icon
  • YouTube - White Circle

Veteran Owned Small Business (VOSB) with over 27 years of military and law enforcement experience serving federal, state and local government agencies. Since 2010, C4SEM® has provided military, federal, state, local agencies and private sectors with high-quality, security and investigative services, hands-on training, and technical assistance.

Muncie_Chamber.png
Homeland Security Training and Certification
hiring-veterans.png

ANYTIME - ANYWHERE

ANY LANGUAGE - ANY CULTURE

Build A Strong Team!

001cp.png