PURPOSE
To familiarize the participants with the counter terrorism world and threat environment and the implications it has on the security work. The trainees will gain a familiarity with the threats and a “Tool-Box” and knowledge base for preforming their security task in a counter-terrorism context both in routine and emergency.
COURSE STRUCTURE
- 4 Sessions of 3 hours each.
- Once a week
- 12 Hours total
AUDIENCE
- Security Operators
- Security Managers
- Security Volunteers
- Shift Managers
ISSUES ADDRESSED
- Red Team Exercises
- Understanding the threat
- The Cycle of Attack
- The attacker’s mindset
- Pre-attack intelligence collection
- The threats and modus operandi – past, current and future
- Security proactivity – believing there is a threat
- Case studies
- Recognition and response
- The basics of body language
- White level inspections
- Security irregularity reporting
- Security liaison and correspondence with neighbouring entities
- Physical security systems understanding what they provide and what they don’t provide
EXPECTED OUTCOMES
EXPECTED END RESULTS
By the end of the training program, trainees will have the knowledge and understanding of the threat, its nature and drives. The trainees will be able to update their security activities to be relevant to the terror context and drive them to security proactivity by understanding the importance of their role in deterring the assailants. The training program will assist in them becoming a ’Hunter’ rather than a ‘Fisherman’.
- Will understand the cycle of a terror attack and their role in disruption
- Will learn the span of the adversaries’ threats with a focus on crowded places threats
- Will gain appreciation of the consequences of various threats
- Will be acquainted with the fundamentals of blast and its impact
- Will gain basic guidelines in recognizing suspicious activities and objects
- Will understand the importance of clear reporting and gain the tools to do so
- Will understand the basic concepts of “threat oriented” security
- Will learn to utilize the security procedures in the CT context
- Will understand the importance of proactive security in the CT world
- Will be able to look at a site through the potential attacker’s perspective (a true eye opener)
- Will experience ‘Hands On’ exercises
- Will learn to speak the ‘language’ of the industry, helping them in conveying the security message
- Will understand the real capabilities if physical protection
- Will understand their role in emergency
- Will experience security dilemmas
Our Participants Speak...
The instructor’s knowledge, experience and anecdotes provide context to the objectives he aims to deliver. Despite the Australian threat environment differing from those overseas, the methodology and techniques remain relevant and current. The risk assessment process in broken down into simple steps and identifies to the ‘real’ risks, not those highlighted by the hype of the media or government.
Highly recommend the training and I’m certainly interested in other material MIP has to offer.
Brilliantly relevant with an approach to likelihood that makes a lot of sense and cuts through the indecision often associated with undertaking risk assessments in relation to terrorism. So many stories and videos that made it all very real.
Excellent introduction into Methodologies & Techniques in security planning. The course provided an excellent base on which to build my abilities to conduct an assessment.
The training exceed my initial expectations. What I learned will have a huge impact on how I now look at and do my job. I wish I had more time in a day to be able to get everything done aI thought about and wrote down during the course. I would love to attend any future courses that may be arranged. I learned so much and enjoyed the week and appreciated the knowledge and expertise of the Instructor.