Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Critical Infrastructure & High Value Assets Protection
Protective Services
Security - Investigation - Consulting - Homeland Security Training and Certification Institute
Security
C4SEM-SEC-100 Introduction to Security Disciplines
24 Clock Hours
This course provides comprehensive instruction regarding the fundamentals and foundations of security disciplines for each of these objectives: Support; Prevention; Detection; Response; and Recovery. It includes a review of Homeland Security Presidential Decision Directive (HSPD)-7.
Objectives:
-
Explain and discuss potential threats
-
Explain and discuss how to establish comprehensive plans, policies, and procedures to thwart potential threats
-
Explain and discuss the fundamental principles of physical security
-
Explain and discuss the fundamental principles of personnel security
-
Explain and discuss the fundamental principles of information technology security
-
Explain and discuss the fundamental principles of operations Security
-
Explain and discuss the fundamental principles of information security
-
Explain and discuss the fundamental principles of communication security
C4SEM-SEC-101 Potential Terrorist Targets
24 Clock Hours
This course examines both traditional and non-traditional targets for terrorist attacks, as well as the identification of facility vulnerabilities, the ability to make recommendations relative to the most appropriate form of countermeasure, and the development of comprehensive security policies and plans.
Objectives:
-
Explain and discuss the critical infrastructure categories
-
Explain and discuss the meaning of credible threat
-
Explain and discuss why terrorists choose certain targets
-
Describe and discuss terrorist tactics and targeting
-
Describe the classes of targets and the tactics applied against those targets
-
Discuss the most likely scenarios of terrorist attacks against critical infrastructure targets
-
Discuss the benefits of vulnerability assessment and viable countermeasures
C4SEM-SEC-102 Risk Assessment-Critical Infrastructure Protection
24 Clock Hours
This course provides an introduction to Homeland Security Presidential Decision Directive (HSPD)-20. It identifies the vulnerabilities associated with the infrastructure of a facility, as well as its model relationships within the community. In addition to classroom instruction, this course includes an exercise (field or tabletop), consisting of an assessment of a facility and completion of a written vulnerability assessment.
Objectives:
-
Define the term Risk Assessment
-
Define the following terminology:
-
Asset
-
Risk
-
Threat
-
Vulnerability
-
Countermeasure
-
-
Explain and discuss various countermeasure strategies
-
Explain and discuss target hardening
-
Define critical infrastructure
-
Discuss types of threats to critical infrastructure
-
Explain why various targets are attractive to terrorists
-
Explain why various security measures impact the critical infrastructure plan
-
Give examples of routine patrol and its potential impact on terrorism
-
Identify how to gather and report intelligence about reporting terrorist activity on a target
-
Discuss the benefits of the vulnerability assessment and viable countermeasures
C4SEM-SEC-103 Prevention of Terrorist Attack against a Facility
24 Clock Hours
This course reviews the fundamentals of the physical security of a critical infrastructure and provides strategies and techniques for proper planning that are required for conducting a physical security vulnerability assessment. Emphasis is placed on the perception and viable assumptions of threat levels based on valid and reliable information and the likelihood of a location becoming a potential target based on its weaknesses or vulnerabilities. In addition, it provides students with an introduction to the utilization of the different types of physical security devices, such as intrusion detection systems (IDS), Alarm systems, locks, closed-circuit television (CCTV) cameras, and systems, types of fencing/barriers, HVAC, a proxy or biometric access control, bomb blast mitigation and to address perimeter security and facility vulnerability.
Objectives:
-
Explain and examine the different access controls with a particular focus on developing technologies and the emergence of biometric, retinal scan systems as a means to enhance physical security and address a facility’s vulnerabilities
-
Discuss various types of CCTV, as well as the different methods used to capture and store the captured video images
-
Explain the importance of IDs as a component of risk assessment by enhancing physical security and addressing a facility’s vulnerabilities
-
Discuss the variety and different types of fences, with a focus on the importance of fencing as a component of risk mitigation by enhancing physical security and addressing a facility’s vulnerabilities
-
Explain and discuss the importance of glazing as a component of risk mitigation by enhancing physical security and addressing a facility’s vulnerabilities
-
Discuss the various types and means of physical security improvements required to prevent a terrorist from targeting a facility’s HVAC system
-
Explain and discuss the vulnerabilities of an HVAC system to a chemical or biological agent attack
-
Discuss the various types of physical barriers that can be used to control pedestrian and or vehicular traffic, thus improving security measures and addressing a facility’s perimeter vulnerabilities
-
Explain the variety of new technologies and construction options that can be used to mitigate the impact of an explosive device
C4SEM-SEC-104 Security Checkpoints-Vehicle Inspections
24 Clock Hours
This course studies and examines principles associated with Vehicle Borne Improvised Explosive Devices (VBIEDs) and the methodology and techniques used to screen vehicles and address vulnerabilities and operational risks including the use of technology, tactics, and procedures for vehicle security checkpoints and an intensive inspection of a vehicle or truck.
Explosive Devices, effects of explosives; and types of initiation systems.
Objectives:
-
Explain and discuss what to look for when performing a general vehicle inspection
-
Explain virtual inspection, ID check, and, the purpose of an interview
-
Explain and discuss the typical questions that can be asked during an interview
-
Explain the behavior indicators from an interview
-
Explain and discuss fight/flight physical and auditory manifestations
-
Explain and discuss what to be aware of when doing an undercarriage search of a vehicle
-
Explain and discuss what to be aware of when doing an exterior search of a vehicle
-
Explain and discuss what to be aware of when doing an interior search of a vehicle
-
Discuss the four general rules to avoid injury
-
Explain and discuss protocols and strategies when responding to suspected VBIEDs
C4SEM-SEC-105 Cyber Terrorism -Security
24 Clock Hours
This course provides an examination and study of the risk and vulnerabilities associated with information technologies. This course is a blended learning approach that balances classroom lectures and hands-on exercises in the examination of the use of the Internet by Islamist terrorist groups for recruitment, communication, intelligence gathering, funding, and pre-operational surveillance. It also utilizes case studies that involve the targeting of information technologies by these groups.
Objectives:
-
Define the term cyber terrorism
-
Explain and discuss some dangers of the Internet
-
Explain and discuss various targets of our electronic infrastructure
-
Explain and discuss the vulnerabilities associated with Open Source
-
Describe best practices for Computer and Physical Security
-
Demonstrate and discuss examples of terrorists' use of the Internet
-
Discuss the principle of combating cyberterrorism
-
Explain and discuss how to preserve and collect critical evidence logs
-
Discuss the primary use to assist law enforcement in resolving an event and apprehending perpetrators
C4SEM-SEC-106 Terrorism against Transportation
24 Clock Hours
This course evaluates the overall security transportation system and provides an introduction to the methods that terrorist groups have used to target transportation facilities and passenger-bearing craft, as well as the threats associated with protecting bridges and underwater tunnels from terrorist attacks. In addition, this course studies the challenges associated with securing ports, and terminals, particularly about the receipt, storage, and distribution of commercial containers, and also introduces the student to the major law enforcement agencies tasked with monitoring, regulating, and investigating these various industries.
Objectives:
-
Define Transportation Security
-
Explain and discuss the limitations and vulnerabilities of the current systems
-
Explain and discuss current risk mitigation strategies
-
Explain international coordination activates