• Apply the basic concept of management to security and explain the specialist role of the security manager
• Plan, develop and organize the human and material resources necessary for the effective operation of a security unit
• Advise on the development of security programs and Standard Operating Procedures
• Monitor and enforce the implementation of security programs and SOPs
• Verify that security personnel can implement security preventive measures
• Advise on the development of emergency plans and manage the security response action necessary in security emergencies involving facilities, terminal buildings, and public access facilities
CONTENT:
Security Risk Management Framework:
• Security Risk Management
• Loss prevention techniques
• Security Surveillance
• Security Management framework – Working the system
• Key Concepts in Physical Security Resource Management
• Building and Perimeter Security
Addressing Issues Faced by Security:
• Determining job requirements and recruitment criteria – Who makes a Good Security Officer
• Motivating staff and providing feedback
• Deploying, briefing and supervising staff
• Assessing staff performance
• Understanding primary threats to physical security
• Conducting Risk (RA) and Vulnerability (SVA) Assessments
Access Control and Physical Monitoring:
• Electronic Intruder Detection
• Security Contingency Planning
• Physical Security Asset Acquisition
• CCTV Operations
• Operation and Maintenance of Physical Security Resources
• Situational Awareness
Overview of Security Planning and Investigations:
• Security and Emergency Planning documentation
• Responding to major security emergencies
• Security Policies and Procedures
• Defining Proposed Resource Outcomes and Cost-Effectiveness
• Considering Life-Cycle, Warranty and Preventive Maintenance
• Industry Investigation Techniques
Information Security:
• Finding the balance between public facilitation and security measures
• Security Management Systems (SMS)
• Close Protection Basics
• Determining Resource Support
• Physical Security/Information Technology Integration
Methodology
The training methodology integrates lectures, interactive discussions, collaborative group exercises, and illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical experience, emphasizing the application of learned techniques. This approach ensures that attendees return to their professional environments equipped with both the competence and self-assurance to effectively implement the acquired skills in their responsibilities.
DATE:
1ST BATCH: 25th – 28th Mar, 2025
2ND BATCH: 29th July – 1st Aug, 2025
3RD BATCH: 18th – 21th Nov, 2025
25, Queen street, Alagomeji Bus Stop, Yaba, Lagos