Advance security guard training online free

26
12734

Last Updated on October 19, 2020 by Ranga

This advance security guard training is designed to provide more skills than the basic security knowledge to the candidates. I suggest that you take basic security guard training if you’re new to the security role.

This is a summarization of the advance security guard training if you want to go into detail then click the link in blue and color you would access the full lesson.

Security Guard Training


Module 1: First Aid

  1. BLS – Basic Life Support
  2. Primary Care = Airway, Breathing, Circulation, and Resuscitation
  3. CPR – Cardio Pulmonary Resuscitation
  4. AED – Automated External Defibrillator
  5. A choking casualty that makes no noise is in serious trouble.
  6. If a casualty has been hit on the head and blood from the nose is this May indicate a skull fracture. This is very serious and emergency so should be called immediately.
  7. Do not touch the casualty while the AED is analyzing the heartbeat will interfere with electrical signals.
  8. Be aware of water when using the AED, for example at the pool in a bathroom this Presents an electrocution hazard.
  9. If you think that the casualty has a spinal injury not to move them, Instead, Gently open the jaw to provide airways and seek immediate medical assistance.
  10. What does mean AVPU?

  • A for Alert
  • V for Voice
  • P for Pain
  • U for Unresponsive
  1. POS of first aid;

  • Preserve life
  • Prevent further harm
  • Promote recovery
  1. First Aid is the care given to a casualty until qualified medical personnel takes over.
  2. If the casualty is catastrophic bleeding, this must be treated as a priority.
  3. DRSABCD stands for

  • D = Danger
  • R = Response
  • S =  send for help
  • A = Airway
  • B  = Breathing
  • C = CPR
  • D = Defibrillator
  1. Age range for infant 0 to 1 year
  2. If there is any object stuck in the wound, leave it in place, and don’t remove that.

Module 2: Fire Safety

  1. A fire can double in size every 40 seconds.
  2. Available oxygen in the Air is 21%.
  3. The required for human use of oxygen is 20%.
  4. Required for Fire only 16%.
  5. Fire does not respect anything or anyone.
  6. The average response time within to fire is 10 – IS minutes.
  7. 25% of fires are attributed to smoking cigarettes.
  8. Fire triangle = for a fire to start, three things must be present. These three things form a Combination known as the fire triangle.
  • Heat
  • Fuel
  • Oxygen
  1. There are three methods of controlling a fire.

  • Starving
  • Smothering
  • Cooling
  1. Classes of fire

1- Class A– Solid materials (E.g. Wood, paper fabric plastic)

2- Class B – Liquid (E.g. petrol, oil, grease, diesel, kerosene)

3- Class C– Gas (E.g. methane, butane, and propane)

4- Class D– Metal (E.g. sodium, magnesium, Aluminum, and potassium)

5- Class E – Electrical

  1. There are 4 methods of fire spread

  • Convection
  • Conduction
  • Radiation
  • Direct burning
  1. Firefighting equipment has divided into 2 categories, portable and fixed. The security guard will usually use portable equipment to fight the fire.
  2. Examples of portable extinguisher

    1. Fire extinguisher
    2. The Fire blanket
    3. Fire bucket
  3. Examples of fixed equipment.

  • Sprinkler systems
  • Hose reels
  • Hydrants
  1. CO2 – Carbon Dioxide
  2. DCP – Dry Chern.ca Powder
  3. Never use water on a flammable liquid fire -it will spread the fire.
  4. When using foam to fight fat or oil fires, aim to the side and allow the foam to spread over the base of the fire.
  5. The CO2 is compressed gas.
  6. Never use a fire extinguisher on a person.
  7. Extinguishers control a fire by Smothering or cooling the fire.
  8. All extinguishers have a pressure gauge except for CO2.
  9. The contents of a fire extinguisher are known as the Agent.
  10. Colour code and range of extinguishers
  • Water (Red color) Range 10 to 12 meters.
  • Foam (yellow color) Range 3 meters.
  • C02 (Black color) Range 1 To 3 meters.
  • DCP (Blue color) Range 2 to 6 meters.
  1. The method of use of fire extinguishers is PASS.
  • Pull – pull the safety pin from the lever of the extinguisher
  • Aim – direct the nozzle or spout toward the base of the fire
  • Squeeze – activate the trigger of the extinguisher
  • Sweep – move the stream of extinguisher from side to side
  1. Keep your hands clear of the nozzle when using c02 extinguishers, as the compressed gas is 78 degrees Celsius and will cause serious damage to the skin.
  2. After discovering fire a standard method of

  • Rescue
  • Alert
  • Confine
  • Extinguish
  1. Before attempting to fight a fire ensure that

  • Your escape route is not blocked
  • Active the test burst before approaching the fire.
  • Assume that you will fail and be prepare scape.
  1. When you are going to fight with fire keep 2 routes for your escape.
  2. Assembly point = Designate an area to evacuate in case of an emergency.
  3. Arson = deliberate criminal act of starting the fire.
  4. The primary uses of the fire extinguisher are;

Module 3: Health and Safety – OHS

  1. Identification and reporting of hazards by everybody is the key to achieving health and safety success.
  2. A hazard is something that has the potential to cause harm,
  3. The security guard should always be looking to identify anything that could cause harm.
  4. Categories of hazard are 11.

  • Slips, trips, and falls
  • Falling objects
  • Collision with objects
  • Trapping between objects
  • Manual handling
  • Machinery and Vehicles
  • Electricity
  • Hazardous substances
  • Fire and explosion
  • Noise and vibration
  • Psycho-Social
  1. MSDS– Material Safety Data Sheet.
  2. Near miss – An unplanned, undesired event that has the potential cause Injury, damage, or loss but does not do so.
  3. Risk Assessment – A methodical examination of what could cause harm to people and the evaluation of how hazards could be controlled.
  4. Primary methods of risk assessment.

  • Quantitative
  • Qualitative
  1. Risk – Is the likelihood (chance) of a chance of harm.
  2. Severity -A scale used to describe the consequence of harm taking place.
  3. Risk Calculation – A risk (Likelihood x Severity Risk)
  4. 5 steps of risk assessment are;
  • Identify the hazards
  • Who could be harmful, and how?
  • Evaluate risk and control methods
  • Record and apply the recommendation
  • Review and update if required.
  1. Risk Matrix: A grid of risk score, based on likelihood and severity of hazard causing harm.
  2. Hierarchy of control

  • Eliminate – remove the hazard completely
  • Substitute – replace the source of the hazard
  • Isolate – Guard or control the hazard
  • Administrate – change policy or procedures
  • PPE– Use protective safety equipment
  1. ALARP = Low as Reasonably Practical

There is a concept of reducing existing risk to a level that is as low as reasonably practical (ALARP)

  1. Safety signs and symbols Divided into 5 categories.

    • E = escape and emergency equipment
    • F = fire safety
    • M = mandatory action
    • P = Prohibited
    • W = Warning

Module 4: Security Role and Responsibilities

  1. Ethics: Moral principles that guide a person’s behavior and activities the knowledge of what is right and wrong.
  2. Professionalism – The qualities of a person that can includes
    • Personal appearance
    • Reliability
    • Competence
    • Attitude
  3. There are 4 main points to follow when dealing with a person:

    • Call the police
    • Identify yourself as a security guard
    • Request that the suspect cooperates
    • Inform the suspect of the reason for detaining them
  4. Child – A person who is under 18 years old.
  5. Red handed – Crime directly witnessed by a person
  6. Self-defense – Use of force to protect yourself from harm
  7. The security guard has 2 power’s (Arrest, Self-defense)
  8. Offender – A person that commits a crime, or misdemeanor
  9. 4 D’S of physical security

    • Deter
    • Detect
    • Delay
    • Deny
  10. professionalism Standards of
    • Personal presentation
    • equipment
    • Traits of a professional Security
    • Attitude
  11. Organizational impact of physical security (Benefits to Organizations)

    • improved organizational resilience
    • Peace of mind
    • Improve reputation
  12. Security guards prevent crime simply by doing duty this is known as presenting a hard target.
  13. Security staff should always be aware of the welfare of children and make sure to act in the best interests of children.
  14. The hierarchy of zones is 5.

    • Public Zone
    • Reception Zone
    • Operations Zone
    • Security Zone
    • High-Security Zone
  15. There are 2 types of security.
    1. Public security (police, army, Civil Defense)
    2. Private security (security companies, Training institutes)
  16. Security staff must be prepared to share relevant details and information with the Police when they arrive and take control of an incident.

Module 5: Control room operations

  1. A security control room is a common way to centralize security resources and operation activities.
  2. The area without CCTV coverage is a blind spot.
  3. Map of each location marked on it. With practice and experience,
  4. A clear defined chain of command will reduce confusion and ensure that the passes information across the team flows in a coordinated manner.
  5. Personal Space

    • Close intimate 15cm Spouse and family
    • Intimate 15-45cm
    • Personal 46cm-1.2m Business or casual
    • Social 1.2 – 3.6m Unfamiliar people
    • Public 3.6m +
  6. CCTV Operator duties

  • Daily system checks
  • Live video monitoring
  • Video patrolling
  • Live incident tracking
  • Retrieving recorded images
  1. Security and access control

  • Staff permissions
  • Visitor access control
  • Physical entry control
  1. Technologies and systems that are found in a security control room
    • CCTV
    • Access control and parking management
    • Building management systems
    • Security alarms and sensors
  2. PTZ Cameras means (pan, Tilt, and Zoom)

10, Thermal vision camera (used in heated places)

  1. ANPR cameras (Automatic Number Plate Recognition)
  2. RFID (Radio Frequency Identification)
  3. BMS (Building management systems)
  4. HVAC (Heating, Venting, and cooling)
  5. It is recommended that a CCTV operator monitor the video feeds on a 5- Minute cycle,
  6. Radio types

    • Handheld
    • Vehicle
    • Base station
  7. An area without Radio Coverage is called a black spot.
  8. It is good practice to allow the ongoing radio conversation to finish, rather than interrupting. Only acceptable to intercept when there are safety and security issue that is a priority.
  9. To achieve a clearly ns the following points should be remembered
    • Rhythm
    • Speed
    • Volume and
    • Pitch
  10. Information security – being protected against the unauthorized use of information, including electronic data, and the measures are taken to achieve this.
  11. Information security threats

    • Physical Access
    • Digital Access
  12. Methods of physical information destruction.

    • Burning
    • Pulping
    • Shredding
    • Cross shredding
  1. Digital information destruction

    • Granulation
    • Degaussing
  2. It is vital that the shift hand over is done in an overlapping method, known as relief in place. The incoming Security staff will arrive at individual posts to relieve the Outgoing staff, achieving 100% security coverage at all times.
  3. If a bomb threat is received in the security control room:
    • Signal to others that a bomb threat is in progress according to SOPs (the control room supervisor will arrange for the police to be called)
    • Remain calm and be courteous to the caller
    • Donut interrupt the caller
    • Try to keep the caller talking
    • Complete the bomb threat checklist
    • Evacuate the threatened area according to SOPs
  4. DVR = Digital Video Recorder
  5. NVR = Network Video Recorder
  6. SOPs – Standard Operating Procedures
  7. Control room – Central operations room of a site
  8. CCTV – Closed Circuit Television
  9. Target – Suspect, or person of interest
  10. Monitoring – Continuous viewing of the situation of a target.

Module 6: Patrolling

  1. Taking a tour of the property is called patrol,
  2. The 4 P’s of patrolling

    1. Protection of life
    2. The Protection properties and premises
    3. Protection of loss and waste
    4. Prevention and determine the crime
  3. Methods of patrolling

    1. Walking patrol
    2. Vehicle patrol
    3. Remote technology patrol
  4. Site security plans: patrol maps and patrol instructions can be found in a site’s Security Control Room.
  5. Security patrols can be divided into 3 phases:
    1. Preparation
    2. Conduct
    3. Completion
  6. While on patrol Security guard will complete a series of checks to ensure the safety and security of the site.

Module 7: Observation & Note-taking

  1. Evidence: Evidence is any sample, item, or recording that will support a point of view. A fact – is any detail that can be proven to be true.
  2. An assumption – is an interpretation of a situation without definite proof as security doesn’t believe in assumptions).
  3. When completing entries in the official notebook the following basic principles
    1. clear
    2. concise
    3. consistent
    4. complete
    5.  factual
  4. When writing Notebook remember 5W & 1H.
  5. While on duty, Security staff can make the human sense to assist in the detection of possible risks or dangers.
    1. Sight
    2. Hearing
    3. Taste
    4. Smell
    5. Touch
  6. Humans are able to detect visually in response to 6 characteristics
  • Shape
  • Shadow
  • Surface
  • Spacing
  • Silhouette
  • Movement
  1. The method developed for recording details about peoples is called “A & H”
  • A= Age
  • B= Build (fat, Thin)
  • C= Clothing
  • D= Defining features (Tattoo jeweler etc.)
  • E= Elevation (Height of the person)
  • F= Face
  • G= Gait (how they walk, limp, etc.)
  • H= Hair
  1. The method used to record details vehicles is called “SCRIM”
  • S – Shape (Sedan, SUV, and Truck, etc.)
  • C – Color
  • R – Registration (Plate number and Emirate)
  • I – Identify features (Scratches, dents, etc.)
  • M – Make and model
  1. Security staff should always let the Police handle evidence as to the priority. Only if Circumstances require immediate intervention to preserve the evidence Should Security staff handle any evidence?
  2. The official notebook must be cared for as it holds status as a legal document. Security staff may be required to take statements from witnesses after an incident has occurred.
  3. There are 4 principles of incident scene preservation.

1- Prevent scene contamination

2- Prevent evidence destruction

3- Prevent evidence movement

4- Prevent evidence removal

  1. The following six steps should be followed when physically handle any types of evidence.

  • Collection
  • Securing
  • Preservation
  • Identification
  • Continuity of custody
  • Logging
  1. Many systems are available to assist Security staff in the accurate recording of information at the site;

    • Body Cameras Handheld camera
    • Mobile phone
    • CCTV Footage
    • Audio recorder
    • Drone

Module 8: Traffic management

  1. Traffic – the passage of people or vehicles along designated routes.
  2. A site-specific traffic plan will be produced by the HSE and/or Security manager for that site.
  3. Traffic is divided into 2 categories.

    1. Pedestrian
    2. Vehicles
  4. Security staff must have a strong knowledge of what type of traffic is permitted to Travel along routes within the site, and understand restrictions to properly enforce the traffic management policy.
  5. Parking management is a common part of traffic management at a site, as most traffic will end up parking somewhere within a site,
  6. When directing to traffic Give directions from the front of the vehicle NOT from behind.
  7. There may be occasions when Security staff are required to give manual directions to traffic at a site,
  8. To direct traffic movement, 6 basic maneuvers have been identified e.g. Signals with hands to direct the traffic).

Module 9: Vehicle searching

  1. Search bay – An area specifically designed to is called search bay,
  2. Traffic controller -The person responsible for directing vehicles forward in a queue to be searched or not is called the traffic controller.
  3. Searcher: The person or people responsible for physically inspecting the vehicles is called a searcher.
  4. The security guards can only search for vehicles for consent.
  5. PPE = (Personal protectives equipment.
  6. The driver may refuse the vehicle search in that case security guard should deny the entry or exit of the vehicle.
  7. After the Driver search security guards have to make a report and inform to the supervisor or concern department.
  8. When on as a vehicle searcher, Security staff must inform drivers if a search of the vehicle is the search of the vehicle is required of access to the site or area. This can be achieved through this can achieve verbal communication or sign.
  9. Vehicle search tools

  • Mirror
  • Torch
  • Gloves
  • Traffic cone
  • Lane barrier
  1. Vehicle search technologies
    • Under vehicle camera scanner
    • Complete vehicle x-ray
    • Explosive / Narcotics trace detector
  2. Use of canines for vehicle search (Dogs for search)
  3. Low-risk sites driver may remain in the vehicle.
  4. High-risk sites it’s very important to remove the driver from the vehicle.
  5. Searching with a partner can be very effective as it offers 2 sets of eyes on every/ section of the car.
  6. During the search, if prohibited items or goods found it must be processed as evidence, and the Security guard should take photos of the items in the position found.
  7. Never let a driver put their hands where they cannot be seen. They may be accessing a weapon or removing prohibited items.
  8. Direct the driver to open internal storage compartments, bonnet, and boot and fuel compartment.

Module 10: Person searching

  1. Consent – the agreement given by a person who has been asked if they or their belongings can be searched.
  2. Screening – routine inspection of people and belonging passing through a screening point like a metal detector and x-ray.
  3. Screening point – the point of entry edit or transmission within a site where people are required to be searched.
  4. Physical search: inspection through the hand to people and belongings.
  5. Visual search – visual inspection without physical contact.
  6. The search may be done male to male and female to female after consent.
  7. Self-search – display of item to the Guard.
  8. The aim of the search people at the site or a facility is to protect people, property, and information and preventing prohibited or dangerous items from entering the site.
  9. Part of the person search area zone is five.

    • pre-screening & queue zone
    • packing area
    • Search zone
    • Follow up a search area
    • Repacking and exit zone
    • The search for females should be done in segregated areas.
  10. Tools for searching for people
    • Walk-through metal detector
    • Hand-held metal detector
    • Baggage X-Ray
    • Particle detectors (Explosives, narcotics)
    • Person scanning X-Ray
    • Person thermal scanning
  11. Detection capabilities
    • Pistol – 22cm distance
    • Knife – 15cm distance
    • Razorblade 7cm distance
    • Foil wrapping – 3cm distance
    • Small jeweler – 3cm distance
  1. A separate room or enclosed area can be used if the search requires the removal of the items of clothing or cultural or religious garments,
  2. With an x-ray machine, we can recognize items with color and shape
  3. Colors used for X-Ray display are:

  • Blue – Hard materials including metal, hard plastic,, etc.
  • Orange – Organic materials including rubber, leather, food, explosive liquid, gel, and powder.
  • Green – Light plastic, soft metal alloy
  1. The physical body searching process can be divided (into two steps).

    • Preparation to search
    • Performing the search
  2. Using hands, physically inspect the 8 zones of the person

    • Head, hair, and headwear
    • Collar
    • Right arm
    • Left-arm
    • Front of torso and ways
    • Right groin e.g. Leg Angle and foot
    • Left groin e.g. Leg angle and foot
  3. Four items that canines are trained to detect.
    • Explosive
    • Narcotic
    • Cash
    • Organic materials (food, plant, etc.)

Module 11: Access control

  1. ACP – Access control point
  2. RFID – Radio-frequency identification
  3. There are 3 basic principles of any access control system:

    • Access permission
    • Identity verification
    • Controlled entry
  4. Access control technologies

    1. Mechanical
    2. Electronic
  1. Mechanical access control options

  • Manual barrier
  • Chain barrier
  • Remote barrier
  • Sliding gate
  1. Electronic access control technologies

  • RFID card and reader
  • Passcode access keypad
  • Fingerprint reader
  • Eye scanner
  1. ACP for a site or building will include three specific zones

  • Approach zone
  • Access control zone
  • Response zone
  1. Security staff must ensure that the currently approved policies are followed, and a copy will be kept at the access control point in the security control room.

Module 12: Conflict management

  1. Conflict – a state of disagreement between opposing ideas, people of interest.
  2. Resolution – solving the state of conflict with the outcome agreed on the outcome by all parties.
  3. Sources of conflict

  • Internal work team
  • External sources
  1. One of the most common causes of conflict in the workplace is poor communication.
  2. Communication is divided into two categories

    1. Verbal
    2. Nonverbal
  3. Methods of conflict resolution are 5,
    1. Collaboration method
    2. Compromised method
    3. Competition method
    4. Accommodation strategy
    5. Avoidance strategy
  1. Security staff can use 4 basic steps to deal with a personal conflict between themselves and others.
  2. SLOW Means

    • S= Set the tone
    • L= Listen and acknowledge
    • O= Observe and organize
    • W= Work towards resolution
  1. The HR department is responsible for developing conflict management policies.
Full Lesson 

Module 13: Critical incident response

  1. Critical incident – an incident that may cause serious harm to the people, property,, and information.
  2. Physical intervention – the use of physical force to prevent harm and ensure the safety and security of people, property, or information.
  3. Cordon – A temporary perimeter established or access and exit from an
  4. Critical incidents divided into 2 categories
  • Man-made
  • Natural
  1. A security cordon is sometimes called the secure perimeter.
  2. The Security cordon is known as the 4 C

    1. Confirm
    2. Clear
    3. Cordon
    4. Control
  3. You Bomb threat in three forms.

    1. Received by phone
    2. handwritten note
    3. email
  4. A spacious package or device may be received by delivery or left unattended. Signs of a suspicious device.
  5. Do not use a radio or mobile phone – radio signals may trigger the detonation of a bomb.
  6. Site-specific training drills should be carried out at least every’ 3 months.
  7. A security cordon can be used to control an incident site, and provide greater situational awareness of what is happening both within and outside of the cordon.
  8. When an incident has been resolved, and the area has been deemed safe to re-enter, the security cordon may be collapsed.

Module 14: Cash in transit

  1. CIT – Cash in Transit, the movement of cash, or other valuable items.
  2. CIT Crew – Security staff who have at least I year of experience in general security and are trained in CIT operations
  3. The CIT Crew leader – The member of the CIT crew who is in charge of the task
  4. CIT Container – The box or case in which cash or valuables are transport
  5. The Cash center – Where the collected cash and valuables are stored is called the cash center.
  6. ATM – Automated Teller Machine
  7. Pavement – the area between the Armored vehicle and the point of cash delivery,
  8. CIT has 3 principles for operating

  • Stay safe
  • Do not discuss the work
  • Stay in the vehicle
  1. responsibilities of a C-I-T team is divided into 2 categories

  • Administration
  • Operational

. 10. CIT team have 3 crew members one vehicle

  • Driver
  • Courier
  • Escort
  1. In CIT team escort can be more than one.
  2. The CIT operation can deviate into 2 parts:

  • Vehicle mount
  • Dismount on foot
  1. Parking and unloading from the armored vehicle presents a high risk for accident or
  2. When carrying out a CIT task, crews must be aware of the requirements of legal obligations, equipment and tools required, and logistic consideration.
  3. Drivers should ensure enough room to safely unload.
  4. Escort and courier should remain aware of other traffic using the area.
  5. Crews should take care of passing traffic or other roadside hazards when loading the CIT container.
  6. CIT crews should unload only 1 CIT container per trip to the transfer area.

Module 15: Bank security

  1. OPZ – Outer public zone
  2. IPZ – Inner public zone
  3. PZ – Private zone
  4. ATM – Automated teller machine.
  5. HVAC – Heating, ventilation, and air conditioning.
  6. PIN – Personal Identification Number.
  7. Tiger kidnap – Kidnapping persons loved ones or relatives to force e out a crime to ensure the safety of the kidnapped person.
  8. Throughout history, banks have been seen as attractive targets form due to the potential for a high reward for their crimes.
  9. Banking security zones

  • OPZ – the outer public zone
  • IPZ- the inner public zone
  • PZ – the private zone
  1. The transition between Inner Public Zone and the private zone will always have a form of access control to prevent unauthorized personnel from entering.
  2. Professional and vigilant security staff will deter criminals from targeting the bank.
  3. Bank security staff should cooperate with arriving CIT crew to ensure that
    1. Secure parking is available
    2. Prescreen and approach to bank
    3. Inspect all three zone for potential threat
    4. CIT crew inspect for
      1. Ventilation IDS
      2. Correct documents

Module 16: Hospital security

  1. Infection control – steps are taken to reduce the chance of spreading infectious
  2. Caregiver – any personnel responsible for providing services to patients and their families.
  3. Threats to hospital security

    • A fire of any size
    • Breach of information security & patient confidentiality
    • Theft of medicinal supplies or equipment
    • Abduction of children or babies
    • Sabotage of life support equipment
    • Contamination of food or water supplies
  1. Hazards at a hospital

    • Physical hazards
    • Biological hazards
    • Chemical hazards
    • Psychological hazards
  1. Particular care must be taken by all members of staff to handle sharp items including needles with extreme care, and dispose of used needles in the designated containers.
  2. In some healthcare facilities, such a response is conducted by a team of experts that are dedicated to deal with hazardous spills.
  3. Access control zones at hospitals

    • Public zone
    • Staff zone
    • High-security zone
  4. Standard incident codes
    • Amber: Missing infant or child
    • Black: Bomb threat or suspect object
    • Blue: Unresponsive adult medical emergency
    • Brown: Hazardous material spill
    • Gold : Utility / I.T failure
    • Green: Internal disaster
    • Grey: Severe weather
    • Orange: External disaster
    • Pink: Unresponsive child infant medical emergency
    • Red: Fire or smoke
    • Silver: Weapon or hostage situation
    • White: Violent person
    • Yellows: missing adult.
  1. Stroke can be identified through the FAST method:

  • F= Face: Ask the person to smile.
  • A= Arms: Ask the person to raise both arms,
  • S= Speech:  Ask the person to repeat a simple phrase,
  • T = Time: If these symptoms are present, quickly report the stroke alert to nurse staff.
  1. Security staffs are not required to carry belongings, aide people to walk, or push wheelchairs.
  2. HEART:

    • Hear the story (of the upset person)
    • Empathies with them
    • Apologies for the fact they are upset
    • Respond with suitable resolution options
    • Thank them for their time and cooperation
  1. When greeting and welcoming visitors to the hospital facility, Security staff can follow the START method of customer service:
    • S= Smile and greet
    • T= Tell your name
    • A= Actively listen
    • R= Rapport and relationship building
    • T= Thanking the person
  1. SCC: security control center
  2. HIMS: Hospital incident management system
  3. Infection control measures at a hospital

    • Hand hygiene
    • Cough etiquette
    • Using PPE
    • Airborne infection precautions
    • Textile and laundry handling

Module 17: Special event security

  1. VOC – Venue operations center
  2. Special event -A unique event evolving large gathering of people.
  3. Sponsor – The organization that contributes fund.
  4. Roles and responsibilities of event security

    1. Static Duties
    2. Mobile duties
  5. Hazards at a special event

    1. Structural failures
    2. Severe weather
    3. Hazard materials and substances
    4. Noise and vibration level
    5. Sun and heat exposure at outdoor events
    6. Fireworks and lasers
  6. Access control at events had different zones.
    • Exclusive zone
    • Outer perimeter zone
    • Inner perimeter zone
    • Inner event zone
    • Event participant zone
  7. Basic principles of controlling access to a venue for special events.
  8. Public Zone
  9. Pre-entry

    • Security screening
    • Entry control
    • Spectator placement
  10. If a venue is large and holds many visitors, an evacuation may need to be conducted in sections.
  11. A method of delaying and distributing crowds as they approach should be considered such as the use of zigzagging approach routes.
  12. IED: Improvise explosives device
  13. The consequences of poor security practices being broadcast by media may include:
    • Legal action against negligent Security staff
    • The damaged reputation of event organizers
    • Financial loss due to withdrawal of event sponsorship
  1. Critical incidents at special events

  • Fire
  • Terrorist attack
  • Power failure
  • Crowd crushing or panic
  • Natural disasters e.g.
  • Full lesson

Module 18: Ports, Airports and n orders security

  1. Port – A geographical area located by sea for the logistics of maritime transport
  2. PFSO – Port Facility Security officer the person in charge of port security operations
  3. Airport – A geographic area designated to accommodate aircraft, passengers, cargo,, and maintenance operation.
  4. ATC –Air traffic control tower responsible for the guidance of all aircraft using the airport
  5. Airside -the airport in which aircraft move e.g., runways, taxiways, hangar, and apron

6 Border: agreed on the physical line between 2 or more nations.

  1. National border– The point at which a person is processed into a country e.g. Airport, portland border.
  2. Customs – The government agency responsible for the protection of a country through the regulation of incoming goods and people.
  3. Organizations and Agencies operating at Sea Ports Ministry of Climate Change and Environment (MOCCAE)
  4. Food Control Authority (FCA)
  5. Critical Infrastructure and Coastal Protection Authority (CICPA)
  6. Federal Customs Authority (FCA)
  7. Civil Defense (CD)
  8. International Civil Aviation Organization (ICAO)
  9. International Air Transport Association (IATA)
  10. ACI – Airports Council International
  11. Terminal – The check-in, immigration and security screening, and departure or arrival lounges.
  12. Airport Passenger inspection is normally divided into 3 components.
    • Checkpoint entry
    • Inspection point
    • Repacking zone
  1. If an attacker is able to access non-passenger areas of an aircraft, very serious damage and death may be possible through sabotage, deliberate damage,, or other interference with the aircraft,
  2. Aviation hazards

    • Extreme noise
    • Moving vehicles
    • Aircraft engine exhaust
    • Fume inhalation
  1. Land border security threats

  • People or groups who wish to harm the country
  • Criminals
  • Unauthorized migrants
  1. Systems of security control at land borders divided into 3 zones

  • The approach zone
  • The access control zone
  • The response zone

Module 19: Critical Infrastructure

  1. Critical infrastructure – Assets that are essential for the functioning of society and the economy IS called critical infrastructure.
  2. Desalination: The removal of salt and minerals from salt water to make it drinkable
  3. Generation – The production of electricity from sources of energy such as oil, gas or nuclear reactors.
  4. What is the critical infrastructure?

    • Nuclear power plants
    • Oil and Gas
    • Electrical grid distribution stations
    • Water treatment and desalination facilities
  1. When working in high-risk areas, Security staff must observe the PPE requirements and wear protective equipment as appropriate.
  2. Nuclear safety hazards

    • Radioactive materials
    • Ionizing radiation
  1. Security staff will inspect all vehicles and people entering and leaving a Nuclear Energy Plant.
  2. Detection of radioactive material can be done using 3 type of detector:

    • Pocket detecting device
    • Handheld detector
    • Automatic detector
  1. Threats to security at water treatment facilities. include:

    • Terrorism
    • Political enemies
    • Disgruntled employee
    • Unsupervised visitor and contractor
  1. High risk / critical incident

  • Fire or explosion
  • Suspicious or n
  • Gas leak / Oil spill
  • Full lesson

Module 20: museum and Cultural Centre security

  1. Culture center -A place designed to exhibit cultural practices, traditions and
  2. Museum – A place devoted to the procurement, care study,, and display of objects of aging interest and value.
  3. Artifact – An object made by humans of historical or cultural significance is called Artefact.
  4. Counterfeit – Potential thieves or other organized crime rings may attempt to replace genuine exhibits with counterfeit copies, and these will normally be detected by specialists from that field.
  5. Specially trained museum staff will be permitted to handle artifacts and antiquities, and Security staff should not attempt to do so.
  6. Museum and Cultural Centre security options

    • Vibration sensors
    • Exhibit inventory numbers
    • Exhibit fixings
    • Glass casings
    • Environmental sensors
    • Viewing gaps
    • Motion sensors
    • CCTV cameras
  1. Critical incident response at the museum or cultural center

In the event of a critical incident, Security staff will follow an established guide for actions to take if an exhibit alarm is activated is to:

    • If on duty in the alarm location, seal all entry and exit from eh one or area.
    • Control visitors and organize them into an orderly group
    • Attempt to confirm if the alarm is legitimate or false
    • Relay any information gained to the Control room
    • Await the arrival of support from Security college and police.
Full lesson 

FINISHED

26 COMMENTS

  1. Hi Ranga kindly advice how to register for the advance security course and if a certificate is issued upon completion of the course?

  2. Multi-Domain Expertise: Our AI isn’t just a jack of all trades; it’s a master of many. Whether you’re in the business, entertainment, or lifestyle sector, PromptScroll adapts and excels.

  3. upysm.com 是一個專業的社交媒體推廣平台,提供各種刷粉絲服務,讓您的Instagram、Facebook、Youtube等帳號快速增加人氣和影響力。無論您是個人創作者還是企業品牌,我們都可以為您量身定制最合適的方案,讓您在社交媒體上脫穎而出。

  4. you are in reality a good webmaster The website loading velocity is amazing It sort of feels that youre doing any distinctive trick Also The contents are masterwork you have done a fantastic job in this topic

  5. https://ktinyc.com/
    Our Advanced Security Guard Training in nyc expert instructors, boasting years of experience in law enforcement, counterterrorism, and corporate security, will guide participants through rigorous modules covering threat assessment, crisis management, crowd control, and surveillance tactics tailored to the unique challenges of urban security.

    From mastering the art of situational awareness to honing communication skills for effective de-escalation, each session is meticulously crafted to empower Advanced Security Guard Training in nyc personnel with the confidence and competence to mitigate potential risks swiftly and decisively.

    Through immersive simulations and real-world case studies, participants will develop a keen understanding of emerging threats, including cyber vulnerabilities and physical breaches, equipping them with the agility to adapt and respond in dynamic security environments.

  6. Hi, Neat post. There is a problem along with your website in internet explorer, would test this텶E still is the market chief and a good section of other folks will pass over your magnificent writing due to this problem.

  7. Ive read several just right stuff here Certainly price bookmarking for revisiting I wonder how a lot effort you place to create this kind of great informative website

  8. Normally I do not read article on blogs however I would like to say that this writeup very forced me to try and do so Your writing style has been amazed me Thanks quite great post

  9. you are in reality a just right webmaster The site loading velocity is incredible It seems that you are doing any unique trick In addition The contents are masterwork you have performed a wonderful task on this topic

  10. you are truly a just right webmaster The site loading speed is incredible It kind of feels that youre doing any distinctive trick In addition The contents are masterwork you have done a great activity in this matter

  11. helloI really like your writing so a lot share we keep up a correspondence extra approximately your post on AOL I need an expert in this house to unravel my problem May be that is you Taking a look ahead to see you

LEAVE A REPLY

Please enter your comment!
Please enter your name here