Need Assistance? 01384 442752 (UK)

SECURITY MANAGEMENT BBS207

Duration (approx) 100 hours
Qualification Statement of Attainment

Learn to mitigate injury, damage or loss

  • Learn to make people, places and things more secure.
  • Training for crime prevention or security management,

It's easy to enrol...

1
Select a payment plan:

2
Select a learning method

3

Learn how to avoid injury, damage or loss

  • How to make people, places and things more secure.
  • Training for crime prevention or security management

Course Structure

This course is split into nine lessons as follows:

1. Scope And Nature of Security Operations

  • Introduction
  • Threats
  • What can be threatened
  • Perceived threats
  • Threat versus risk
  • Threat assessment
  • Second line of defence
  • Hierarchy of security controls
  • Home security
  • Plants for security
  • Inside the burglars mind
  • Ethical Issues in security
  • Insurance
  • Social media

2. Low Tech Security Equipment

  • Introduction
  • Gates and doors
  • Latches
  • Locks
  • Safes
  • Vaults
  • Safe types
  • Vault types
  • Alarms
  • Lighting
  • Signs and Security cameras
  • Placement
  • Single versus combination use
  • Piracy and theft
  • Weapons

3. Security Equipment Technology

  • Lighting
  • Alarms
  • Wired systems
  • Wireless systems
  • Monitored systems
  • Unmonitored systems
  • Triggers - types, motion, sound, laser triggers
  • What is triggered
  • Fire and other alarm systems
  • Smoke detectors
  • Heat detectors
  • Carbon monoxide detectors
  • Locating detectors
  • Security cameras - inside or out
  • Closed circuit or stand alone cameras
  • Specific camera types  - PTZ, boxed, fixed, bullet, turret etc
  • Motion detection/activation
  • Thermographic imaging
  • Doorbells

4. Security Personnel

  • Types of security personnel
  • Using security personnel
  • Fixed position security
  • Security patrols
  • Security dogs -pet dogs, guard dogs
  • Security Equipment Installers

5. Risk Assessment and Protocols

  • Being proactive, not reactive
  • Evaluating risk
  • What is risk assessment
  • Risk mitigation
  • Risk assessments at a premises
  • Electronic risk assessment
  • Security protocols 
  • Burglar profile
  • Burglar security measures
  • Shoplifting and security measures
  • Arson and security measures

6. Applications – Property Protection – land and buildings

  • Protecting land and buildings
  • Perimeter fencing
  • Automatic gates
  • Window bars
  • Protecting commercial properties
  • Burglars and intruders
  • Terrorism
  • Reducing fire risk
  • Security lighting
  • Protecting land

7. Applications – Property Protection -cars, art, valuables

  • Need and level of protection
  • Worth of an item
  • Level of risk exposure
  • What the valuable is
  • How conspicuous is it
  • Where/how is it kept
  • Cost of protection
  • Pets and livestock
  • Highly valuable items
  • Protecting valuables

8. Applications – Personal Protection

  • What is personal protection
  • Why personal protection is needed
  • Types of harm
  • Situational risk management
  • Types of threats
  • Operators working within a management system
  • Situational crime prevention
  • Personal protection of oneself
  • When threatened from a known individual
  • Gender based violence
  • Bullying, racism and discrimination
  • Devices & equipment for protection

9. Applications – Commercial property and events

  • Commercial property protection
  • Inventory
  • Preventing theft and tampering
  • Offices
  • Factories
  • Shopping centres
  • Events protection
  • Contingency and emergency planning
  • Rules and regulations
  • Crowd control
  • Traffic & transport
  • Adult activities and children
  • Theft and vandalism

 

Explore How to Reduce Threats to Persons and Property

Security management is all about reducing threats. 
Threats come in all shapes and forms. THey may involve intentional criminal activity, but they can also involve unintentional damage to property or person.

A person’s body can be threatened due to violence, but a person may also be threatened in other ways. In some cases, a threat can be defamatory or cause considerable economic loss. Whilst threat is most often thought of, and arguably acted out, in the physical sense, it can also be relatively intangible. For example, the threat of fraud or identity theft. Most frequently, a threat will involve stealing or damaging property. 
For example –

  • A threat to the security of our home
  • A threat to buildings, land, gardens, walls, and aspects of our property. For example, thieves may steal lead from windows in buildings to sell on.
  •  Vehicle theft

Stealing or damaging - 

  • Personal possessions kept within the home, e.g., computers, televisions, mobile devices, etc. 
  • Business or commercial items and equipment, including specialist equipment, e.g., sewing machines, robotic machinery, etc.
  • Personal or professional valuables such as jewellery, business documents and the like
  • Money or money dispensing facilities such as bank fronts or automatic teller machines
  • Art, antiques, or collectables
  • Pets or livestock

The list of items which may be stolen or damaged is virtually endless. Much of the time, the security of these items can be improved through considering potential threats from a situational perspective. Whilst this practice can be limited by factors such as age, experience, security-related interactions, understanding the perceived threat can be the beginning to improve security. 

Courses can be started anytime from anywhere in the world!