Welcome to the World's Only Open Source Intelligence Online Training program. Register Online here
The need and usage of actionable intelligence can never be over emphasized, whether in law-enforcement, corporate or any other field. But more important is the ever demand of highly trained agents and officers that must source and analyze raw data and information for the end users. So why not get yourself trained in this challenging, yet interesting career? You do not even have to leave your job or current endeavors for the training. Just relax and enjoy yourself while you get trained on one of the most sophisticated and top-secret course on earth right from the comfort of your bedroom. For simplicity sake the course is divided into 7 Modules and each one is expected to be completed within 1-2 weeks and a Tutor marked Assignment (TMA) submitted on a given test based on case studies. Hence the course is expected to be completed within 1-2 months depending on a student capabilities and understanding. At the end of the course, successful students will be issued our highly customized completion certificate that can be presented for job application. Additionally, you will be certified as either; Certified Intelligence Analyst (CIA), Certified Corporate Intelligence Officer (CCIP), or Certified Intelligence Officer (CIO)*. Please Register Online Here to begin your training immediately. Or send mail to: xxx@armourcopintel-services.org, trainings@armourcopsecurity.com or armourcop@gmail.com .Why don't you use a moment to taste what you would get trained on. Get the ball rolling now, scan through a bit of module 1 of the course. Intelligence challenge game, register here (CIO designation is for current law-enforcement officers only)
Please Note: Registration Form is: N1000 only and mode of training is thru Online/Email/Long Distance only. Corporate/Law-Enforcement bodies can contact us for in-house or group training
**Training Terms: All our course programs do not in anyway replaced your professional training you should get from relevant security or governmental agencies/institutes. Our training programs are for educational and self enlightenment purposes only
Please Note: Registration Form is: N1000 only and mode of training is thru Online/Email/Long Distance only. Corporate/Law-Enforcement bodies can contact us for in-house or group training
**Training Terms: All our course programs do not in anyway replaced your professional training you should get from relevant security or governmental agencies/institutes. Our training programs are for educational and self enlightenment purposes only
Amourcop Criminal Intelligence Training - Module 1: INTRODUCTION TO INTELLIGENCE
1. AN INTRODUCTION TO INTELLIGENCE: FROM INFORMATION TO INTELLIGENCE
Before we can properly discuss and explore intelligence and analysis in theoretical and practical terms, we need to have some common understanding as to what those terms mean.
Some definitions of these three key terms are as follows:-
Information- ‘knowledge in raw form’
Intelligence- ‘information that is capable of being understood’
- ‘information with added value’
- ‘information that has been evaluated in context to its source and reliability’
Analysis (of either Information or Intelligence)
- ‘the resolving or separating of a thing into its component parts’
- ‘ascertainment of those parts’
- the tracing of things to their source to discover the general principals behind them’
- ‘a table or statement of the results of this process’
Understanding properly the difference between these terms and how they interact is important, however even at this early stage, these definitions point to key differences. Information is quite simply raw data of any type, whilst in contrast Intelligence is data which has been worked on, given added value or significance. The way in which this transformation is made is through evaluation, a process of considering the information with regard to its context through its source and reliability.In its simplest form, intelligence analysis is about collecting and utilizing information, evaluating it to process it into intelligence, and then analyzing that intelligence to produce products to support informed decision making.
All these decisions involve applying our natural ability to ‘analyze’ information, an overall process which can be usefully broken down into a series of stages, or questions we ask of ourselves, as follows :-
1) What exactly is the problem; what decision do we have to make and why is it significant or
important?
2) What information do we already have or might we reasonably obtain that could be relevant to the problem in hand. Where is it / how can we get it?
INFORMATION + EVALUATION = INTELLIGENCE
3) What meaning can we extract from the information; what does it tell us about what’s going on?
4) Is there only one possible explanation, or are there other alternatives or options. Are some more likely than others?
5) How do these affect the decision we have to make, are some options potentially better than others; do some carry greater risk of success and / or failure?
6) Are we ready to take action with a reasonable level of confidence, or do we need to gather more information first? If so, what else do we need and where / how can we get it?
The process of applying these questions, evaluating the answers, and then choosing how to respond, to act, is the essence of what analysis is about.
By bringing this process under our conscious control, we can monitor it, develop and improve it, and subject it to quality checks which can be quite complicated to grasp. Beginning that development of awareness and skill is critical. The practical advantages of developing an individual’s analytical skills are many, but can be summarize as follows:-
ANALYSIS GOES BEYOND THE FACTS
- IT CAN TELL YOU HOW GOOD (OR POOR) YOUR INFORMATION / INTELLIGENCE IS
- IT CAN TELL YOU THINGS YOU DID NOT KNOW BEFORE
- IT CAN TELL YOU WHAT YOU NEED TO KNOW TO UNDERSTAND A SITUATION
- IT CAN TELL YOU WHERE TO LOOK FURTHER
- IT CAN HELP YOU TO COMMUNICATE YOUR UNDERSTANDING TO OTHERS
THE ORIGINS OF INTELLIGENCE ANALYSIS
Knowledge has the potential to be equated to power. The concept of collecting and utilizing information to support decision making in some formal, structured way is nothing new. In order to obtain advantage over an adversary, it is imperative to possess the most up to date, accurate information regarding amongst other things, their intentions and capabilities. This rule applies in every field, be it politics, business, military strategy, or criminal intelligence. In addition, it is a process that has always been, and still is, continually developing and evolving, in response to changes in social / cultural factors, technology, organizational needs, and new / higher levels of analytical skill.
Reviewing the historical background, the ‘roots’ of intelligence and analysis as a process and as a
profession is a useful and important exercise. Raising our understanding of the origins of intelligence and analysis helps us to understand both where we are now and how / why we arrived at this point. It also raises our awareness of how Intelligence Analysis is a continually changing, evolving practice, which if it is to remain relevant and useful in a practical sense constantly needs a fresh, flexible approach, new ideas, new skills, new techniques. The one constant for the professional Intelligence Analyst is that no two tasks or projects are ever exactly the same; every new piece of work can need a fresh approach.
There are many examples throughout history of military, religious and community leaders actively tasking individuals with information-gathering exercises and then basing their decisions on the information obtained in this way. Perhaps the earliest recognized text on the subject of information gathering and intelligence-based actions is ‘The Art of War, The Art of Strategy’. This was written in the 5th Century BC by Sun Tzu, a Chinese mercenary warlord who was renowned for his ability to command military campaigns whose success owed a lot to his effective information-gathering and intelligence-led decision-making.
It says much for the quality of this work that it still remains in print today, and is essential reading for military and corporate strategists and intelligence operatives worldwide.
In addition, many early examples are documented in the Bible, such as when the Lord told Moses to send leaders of the twelve tribes to explore the land of Canaan to gather information to estimate the strength and capability of the enemy. From these early beginnings throughout history until relatively recent times, employing information-gatherers for:
CRIMINAL INTELLIGENCE TRAINING, FOR LAW-ENFORCEMENT OFFICERS:
Primarily military goals has been a common trend. What is more, a methodology arose from this process that basically involved direct contact between the information gatherer(s) and the client / decision-maker.
This method had certain notable features:-
1) The sheer logistics involved (no real technology for transport or communication) created a massive time-delay between the tasking of the information gatherer, the obtaining of the information, and the delivery of the information to the ‘end-user’.
2) Using information collectors who operated by visiting locations and witnessing events either
personally or through intermediaries guaranteed that the information collected would be limited by their senses and their ability to remember accurately what they saw; such information would thus always be highly subjective, and tend towards being based on opinion rather than fact.
3) The volume of information collected in return for such a large investment of time and resources would be extremely small. Any investigation generates vast amounts of information; the larger the inquiry, the more information the client/investigator has to deal with. The problem for the client / investigator is that no matter how good the system used to store all this information is, they are always limited by their own mental capacity to embrace the information as a whole, to `take it all in` at once.
This understanding of the whole of the information is crucial to valid decision-making. Fully understanding a small part of the whole information available means that in fact the client / investigator only has partial understanding of the whole situation. Partial understanding must incorporate a degree of misunderstanding. Misunderstanding leads to poor conclusions. It might reasonably be taken as some measure of the importance and value of intelligence and analysis that despite these potentially crippling limitations the process still proved to be a decisive factor in the success of military and political campaigns throughout these times.
UPDATE YOUR CV OR PROFESSIONAL CAREER TODAY. GET OUR COMPLETE DISTANCE INTELLIGENCE TRAINING and be certified PLEASE CLICK HERE To Register Or Contact US Also see our full intelligence training website here
Please Note: Registration Form is: $10 (N1000) non-refundable fee and training mode is thru Online/long Distance only
See our other unique Online Training Courses below:
Before we can properly discuss and explore intelligence and analysis in theoretical and practical terms, we need to have some common understanding as to what those terms mean.
Some definitions of these three key terms are as follows:-
Information- ‘knowledge in raw form’
Intelligence- ‘information that is capable of being understood’
- ‘information with added value’
- ‘information that has been evaluated in context to its source and reliability’
Analysis (of either Information or Intelligence)
- ‘the resolving or separating of a thing into its component parts’
- ‘ascertainment of those parts’
- the tracing of things to their source to discover the general principals behind them’
- ‘a table or statement of the results of this process’
Understanding properly the difference between these terms and how they interact is important, however even at this early stage, these definitions point to key differences. Information is quite simply raw data of any type, whilst in contrast Intelligence is data which has been worked on, given added value or significance. The way in which this transformation is made is through evaluation, a process of considering the information with regard to its context through its source and reliability.In its simplest form, intelligence analysis is about collecting and utilizing information, evaluating it to process it into intelligence, and then analyzing that intelligence to produce products to support informed decision making.
All these decisions involve applying our natural ability to ‘analyze’ information, an overall process which can be usefully broken down into a series of stages, or questions we ask of ourselves, as follows :-
1) What exactly is the problem; what decision do we have to make and why is it significant or
important?
2) What information do we already have or might we reasonably obtain that could be relevant to the problem in hand. Where is it / how can we get it?
INFORMATION + EVALUATION = INTELLIGENCE
3) What meaning can we extract from the information; what does it tell us about what’s going on?
4) Is there only one possible explanation, or are there other alternatives or options. Are some more likely than others?
5) How do these affect the decision we have to make, are some options potentially better than others; do some carry greater risk of success and / or failure?
6) Are we ready to take action with a reasonable level of confidence, or do we need to gather more information first? If so, what else do we need and where / how can we get it?
The process of applying these questions, evaluating the answers, and then choosing how to respond, to act, is the essence of what analysis is about.
By bringing this process under our conscious control, we can monitor it, develop and improve it, and subject it to quality checks which can be quite complicated to grasp. Beginning that development of awareness and skill is critical. The practical advantages of developing an individual’s analytical skills are many, but can be summarize as follows:-
ANALYSIS GOES BEYOND THE FACTS
- IT CAN TELL YOU HOW GOOD (OR POOR) YOUR INFORMATION / INTELLIGENCE IS
- IT CAN TELL YOU THINGS YOU DID NOT KNOW BEFORE
- IT CAN TELL YOU WHAT YOU NEED TO KNOW TO UNDERSTAND A SITUATION
- IT CAN TELL YOU WHERE TO LOOK FURTHER
- IT CAN HELP YOU TO COMMUNICATE YOUR UNDERSTANDING TO OTHERS
THE ORIGINS OF INTELLIGENCE ANALYSIS
Knowledge has the potential to be equated to power. The concept of collecting and utilizing information to support decision making in some formal, structured way is nothing new. In order to obtain advantage over an adversary, it is imperative to possess the most up to date, accurate information regarding amongst other things, their intentions and capabilities. This rule applies in every field, be it politics, business, military strategy, or criminal intelligence. In addition, it is a process that has always been, and still is, continually developing and evolving, in response to changes in social / cultural factors, technology, organizational needs, and new / higher levels of analytical skill.
Reviewing the historical background, the ‘roots’ of intelligence and analysis as a process and as a
profession is a useful and important exercise. Raising our understanding of the origins of intelligence and analysis helps us to understand both where we are now and how / why we arrived at this point. It also raises our awareness of how Intelligence Analysis is a continually changing, evolving practice, which if it is to remain relevant and useful in a practical sense constantly needs a fresh, flexible approach, new ideas, new skills, new techniques. The one constant for the professional Intelligence Analyst is that no two tasks or projects are ever exactly the same; every new piece of work can need a fresh approach.
There are many examples throughout history of military, religious and community leaders actively tasking individuals with information-gathering exercises and then basing their decisions on the information obtained in this way. Perhaps the earliest recognized text on the subject of information gathering and intelligence-based actions is ‘The Art of War, The Art of Strategy’. This was written in the 5th Century BC by Sun Tzu, a Chinese mercenary warlord who was renowned for his ability to command military campaigns whose success owed a lot to his effective information-gathering and intelligence-led decision-making.
It says much for the quality of this work that it still remains in print today, and is essential reading for military and corporate strategists and intelligence operatives worldwide.
In addition, many early examples are documented in the Bible, such as when the Lord told Moses to send leaders of the twelve tribes to explore the land of Canaan to gather information to estimate the strength and capability of the enemy. From these early beginnings throughout history until relatively recent times, employing information-gatherers for:
CRIMINAL INTELLIGENCE TRAINING, FOR LAW-ENFORCEMENT OFFICERS:
Primarily military goals has been a common trend. What is more, a methodology arose from this process that basically involved direct contact between the information gatherer(s) and the client / decision-maker.
This method had certain notable features:-
1) The sheer logistics involved (no real technology for transport or communication) created a massive time-delay between the tasking of the information gatherer, the obtaining of the information, and the delivery of the information to the ‘end-user’.
2) Using information collectors who operated by visiting locations and witnessing events either
personally or through intermediaries guaranteed that the information collected would be limited by their senses and their ability to remember accurately what they saw; such information would thus always be highly subjective, and tend towards being based on opinion rather than fact.
3) The volume of information collected in return for such a large investment of time and resources would be extremely small. Any investigation generates vast amounts of information; the larger the inquiry, the more information the client/investigator has to deal with. The problem for the client / investigator is that no matter how good the system used to store all this information is, they are always limited by their own mental capacity to embrace the information as a whole, to `take it all in` at once.
This understanding of the whole of the information is crucial to valid decision-making. Fully understanding a small part of the whole information available means that in fact the client / investigator only has partial understanding of the whole situation. Partial understanding must incorporate a degree of misunderstanding. Misunderstanding leads to poor conclusions. It might reasonably be taken as some measure of the importance and value of intelligence and analysis that despite these potentially crippling limitations the process still proved to be a decisive factor in the success of military and political campaigns throughout these times.
UPDATE YOUR CV OR PROFESSIONAL CAREER TODAY. GET OUR COMPLETE DISTANCE INTELLIGENCE TRAINING and be certified PLEASE CLICK HERE To Register Or Contact US Also see our full intelligence training website here
Please Note: Registration Form is: $10 (N1000) non-refundable fee and training mode is thru Online/long Distance only
See our other unique Online Training Courses below:
Armourcop Advanced Private Security Guard Training Course Program
Pretest: Test Yourself Now And See How Far You Can Go
This pretest will start you thinking about the information in this unit.
Write T for True or F for False before each of these statements. You can check your marks by sending your answers to us thru the link below. After you complete this unit you may want to try this pretest again to see how much you have learned. The first one has been done for you.
1. __T__ Confidentiality is an important part of security work.
2. ____ All security guards do patrols.
3. ____ A security guard’s main duties are to patrol and report.
4. ____ In emergencies, security guards may be asked to help police.
5. ____ A duty of security guards is to protect information.
6. ____ Standard operating procedures give details such as who to call if there is an emergency.
Send us your answers here
DUTIES AND RESPONSIBILITIES OF A SECURITY GUARD
LESSON ONE
AN OVERVIEW OF DUTIES AND RESPONSIBILITIES OF A SECURITY GUARD
Security guards protect people, property and information. The duties and responsibilities of a guard are extremely varied from site to site. In order to satisfactorily undertake these responsibilities, a security guard must understand the importance of the position and the general duties that a Security Guard may be asked to play on a day to day basis. Guards must be well attuned to changes and developments within the industry and the expectations and obligations that are owed to the client, the public, and his or her employer.
The security industry is one of the fastest growing industries in the World because criminal activity is not decreasing in frequency. Police agencies are expected to do more with fewer resources. The widening gap between police service and demand must be filled with something, and, based on the experiences of the last few decades in the United States, presumably it will be filled by private policing. While it is doubtful that a security guard would ever be called on to duplicate the extensive duties of a police officer, it is possible to imagine private security facing increased responsibilities under the guidance and tutelage of the police
PUBLIC AND PRIVATE SECURITY
There are two main divisions of the security industry: public and private.
Public security: Public security agencies are those groups that perform a security function but are funded exclusively by governments in the interest of public service. These agencies include municipal/Local Government, provincial/State and federal police forces (Countries where State Police is Applicable). Legislation in each jurisdiction initiates and empowers these agencies, mandates specific training, and creates an objective complaint review process. Police forces are granted wide sweeping powers that are generally recognized by the public, including:
Preserving the peace;
Preventing crimes and other offenses;
Assisting victims of crime;
Arresting or detaining criminals or those suspected of criminal involvement;
Drafting and laying criminal charges;
Investigating crimes;
Seizing evidence;
Testifying in court; and
Executing search and arrest warrants.
Private Security: Private security is different than public security in several significant ways. Private security is provided to clients for a fee, and except in special circumstances, has its jurisdiction limited to the property owned by the client. Rather than service provided in the interests of the public, security is provided to protect the interests of the client. Traditionally, legislation in Nigeria has recognized these differences and has not extended the same powers of detention, arrest, and search and seizure to security service providers as have been extended to police
Private security includes measures taken by individuals, partnerships and corporations designed to protect their interests. Generally speaking, these measures involve the protection of property (such as the things produced by the client and the facilities and equipment used in its production), personnel (including both the people that work on the site and members of the public having access to it), and information about the products, property, facilities, process and so on (industrial security is rapidly becoming one of the most important aspects of private security). Companies wishing to have private security without the costs associated with developing their own security unit will often choose to contract the services of an outside security company. By contracting the services of these agencies, a company avoids incurring the costs associated with managing and administering the function. For example, the costs associated with monitoring the performance of individual security guards, training, providing a benefit package, and so on, are avoided.
These administrative and other costs are divided among all of the clients of the security firm, decreasing the cost of providing these services to any one client. Companies choosing to employ contract security also can avoid any difficulties that may be encountered through union and employee contract negotiations. These concerns remain with the owners of the private security firms. Private security firms also operate independently of the politics of the host company. Employees may feel that they can trust a security guard from outside the company, and therefore the employee may be more cooperative during investigations than they would be if internal agents were used.
Finally, independent security companies may be able to develop expertise beyond the range of experiences usually associated with in-house security operations. Depending on the nature of the security needs of the host company, it may be more beneficial to go to the experts rather then use in-house or general contract personnel.
Update your career today. Click here to Register or Contact US See Our High-Tech Gadgets Here
Please Note: Registration Form is: $10 (N1000) only and mode of training is thru Online/Long Distance only.
**Training Terms: All our course programs do not in anyway replaced your professional training you should get from relevant security or governmental agencies/institutes. Our training programs are for educational and self enlightenment purposes only
This pretest will start you thinking about the information in this unit.
Write T for True or F for False before each of these statements. You can check your marks by sending your answers to us thru the link below. After you complete this unit you may want to try this pretest again to see how much you have learned. The first one has been done for you.
1. __T__ Confidentiality is an important part of security work.
2. ____ All security guards do patrols.
3. ____ A security guard’s main duties are to patrol and report.
4. ____ In emergencies, security guards may be asked to help police.
5. ____ A duty of security guards is to protect information.
6. ____ Standard operating procedures give details such as who to call if there is an emergency.
Send us your answers here
DUTIES AND RESPONSIBILITIES OF A SECURITY GUARD
LESSON ONE
AN OVERVIEW OF DUTIES AND RESPONSIBILITIES OF A SECURITY GUARD
Security guards protect people, property and information. The duties and responsibilities of a guard are extremely varied from site to site. In order to satisfactorily undertake these responsibilities, a security guard must understand the importance of the position and the general duties that a Security Guard may be asked to play on a day to day basis. Guards must be well attuned to changes and developments within the industry and the expectations and obligations that are owed to the client, the public, and his or her employer.
The security industry is one of the fastest growing industries in the World because criminal activity is not decreasing in frequency. Police agencies are expected to do more with fewer resources. The widening gap between police service and demand must be filled with something, and, based on the experiences of the last few decades in the United States, presumably it will be filled by private policing. While it is doubtful that a security guard would ever be called on to duplicate the extensive duties of a police officer, it is possible to imagine private security facing increased responsibilities under the guidance and tutelage of the police
PUBLIC AND PRIVATE SECURITY
There are two main divisions of the security industry: public and private.
Public security: Public security agencies are those groups that perform a security function but are funded exclusively by governments in the interest of public service. These agencies include municipal/Local Government, provincial/State and federal police forces (Countries where State Police is Applicable). Legislation in each jurisdiction initiates and empowers these agencies, mandates specific training, and creates an objective complaint review process. Police forces are granted wide sweeping powers that are generally recognized by the public, including:
Preserving the peace;
Preventing crimes and other offenses;
Assisting victims of crime;
Arresting or detaining criminals or those suspected of criminal involvement;
Drafting and laying criminal charges;
Investigating crimes;
Seizing evidence;
Testifying in court; and
Executing search and arrest warrants.
Private Security: Private security is different than public security in several significant ways. Private security is provided to clients for a fee, and except in special circumstances, has its jurisdiction limited to the property owned by the client. Rather than service provided in the interests of the public, security is provided to protect the interests of the client. Traditionally, legislation in Nigeria has recognized these differences and has not extended the same powers of detention, arrest, and search and seizure to security service providers as have been extended to police
Private security includes measures taken by individuals, partnerships and corporations designed to protect their interests. Generally speaking, these measures involve the protection of property (such as the things produced by the client and the facilities and equipment used in its production), personnel (including both the people that work on the site and members of the public having access to it), and information about the products, property, facilities, process and so on (industrial security is rapidly becoming one of the most important aspects of private security). Companies wishing to have private security without the costs associated with developing their own security unit will often choose to contract the services of an outside security company. By contracting the services of these agencies, a company avoids incurring the costs associated with managing and administering the function. For example, the costs associated with monitoring the performance of individual security guards, training, providing a benefit package, and so on, are avoided.
These administrative and other costs are divided among all of the clients of the security firm, decreasing the cost of providing these services to any one client. Companies choosing to employ contract security also can avoid any difficulties that may be encountered through union and employee contract negotiations. These concerns remain with the owners of the private security firms. Private security firms also operate independently of the politics of the host company. Employees may feel that they can trust a security guard from outside the company, and therefore the employee may be more cooperative during investigations than they would be if internal agents were used.
Finally, independent security companies may be able to develop expertise beyond the range of experiences usually associated with in-house security operations. Depending on the nature of the security needs of the host company, it may be more beneficial to go to the experts rather then use in-house or general contract personnel.
Update your career today. Click here to Register or Contact US See Our High-Tech Gadgets Here
Please Note: Registration Form is: $10 (N1000) only and mode of training is thru Online/Long Distance only.
**Training Terms: All our course programs do not in anyway replaced your professional training you should get from relevant security or governmental agencies/institutes. Our training programs are for educational and self enlightenment purposes only
STRATEGIC VIP PROTECTION TRAINING COURSE
THE CONTENTS OF THE EXECUTIVE PROTECTION TRAINING COURSE ARE:
EXECUTIVE PROTECTION: The players and their roles.
SECURITY OBJECTIVES: Prevention of intentional and unintentional injuries.
THE THREAT: Targeting the client.
THREAT ASSESSMENT: Threat modeling
INTELLIGENCE SOURCES: In-house files.
PROTECTIVE DETAILS: Organization-responsibilities-command post-formations.
ADVANCES: Advancing hotels-special events-routes-transportation.
FOREIGN ADVANCES: Passports-Visas, shots, customs, logistics.
PHYSICAL SECURITY: Perimeter & Interior
ELECTRONIC SECURITY: Intrusion detection-electronic surveillance countermeasures.
VEHICLES AND DRIVING SECURITY: Convoys, evasive maneuvers, armoring.
BOMBS AND BOMB INCIDENT MANAGEMENT: Threats-searches-evacuations.
CORPORATE EXECUTIVE PROTECTION: Protecting corporate clients- relationships.
PROTECTING EXECUTIVES ABROAD- Special problems and risks.
CRISIS MANAGEMENT: Crisis management trams.
MORE CRISIS MANAGEMENT: kidnapping-hostage taking-hostage negotiations.
CRISES SURVIVAL: Survival skills.
VIOLENT EMPLOYEES IN THE WORKPLACE: Behavioral clues-screening, terminations.
CROWDS, CRANKS AND STALKERS: Celebrity and domestic stalkers-handling cranks.
SPECIAL EVENTS SECURITY: Liability factors-access control-security factors.
WOMEN AS PROTECTORS: Female agents.
UNARMED DEFENSIVE TECHNIQUES: Control and weapons disarms techniques.
FIRE RESPONDENT MEDICINE FOR THE PROTECTIVE AGENT: Responses to most likely medical incidents.
EXECUTIVE PROTECTION PROTOCOL: Dress-communications, relationships
LEGAL ASPECTS OF THE AGENT'S JOB: Liabilities-deadly force-negligence.
WORKING IN THE INDUSTRY: Resumes-interviews- working tools.
Update your CV or Career today, Click Here to Register online or See Our High-Tech Gadgets Here
Please Note: Registration Form is: $10 (N1000) only and mode of training is thru Online/Long Distance only.
**Training Terms: All our course programs do not in anyway replaced your professional training you should get from relevant security or governmental agencies/institutes. Our training programs are for educational and self enlightenment purposes only
EXECUTIVE PROTECTION: The players and their roles.
SECURITY OBJECTIVES: Prevention of intentional and unintentional injuries.
THE THREAT: Targeting the client.
THREAT ASSESSMENT: Threat modeling
INTELLIGENCE SOURCES: In-house files.
PROTECTIVE DETAILS: Organization-responsibilities-command post-formations.
ADVANCES: Advancing hotels-special events-routes-transportation.
FOREIGN ADVANCES: Passports-Visas, shots, customs, logistics.
PHYSICAL SECURITY: Perimeter & Interior
ELECTRONIC SECURITY: Intrusion detection-electronic surveillance countermeasures.
VEHICLES AND DRIVING SECURITY: Convoys, evasive maneuvers, armoring.
BOMBS AND BOMB INCIDENT MANAGEMENT: Threats-searches-evacuations.
CORPORATE EXECUTIVE PROTECTION: Protecting corporate clients- relationships.
PROTECTING EXECUTIVES ABROAD- Special problems and risks.
CRISIS MANAGEMENT: Crisis management trams.
MORE CRISIS MANAGEMENT: kidnapping-hostage taking-hostage negotiations.
CRISES SURVIVAL: Survival skills.
VIOLENT EMPLOYEES IN THE WORKPLACE: Behavioral clues-screening, terminations.
CROWDS, CRANKS AND STALKERS: Celebrity and domestic stalkers-handling cranks.
SPECIAL EVENTS SECURITY: Liability factors-access control-security factors.
WOMEN AS PROTECTORS: Female agents.
UNARMED DEFENSIVE TECHNIQUES: Control and weapons disarms techniques.
FIRE RESPONDENT MEDICINE FOR THE PROTECTIVE AGENT: Responses to most likely medical incidents.
EXECUTIVE PROTECTION PROTOCOL: Dress-communications, relationships
LEGAL ASPECTS OF THE AGENT'S JOB: Liabilities-deadly force-negligence.
WORKING IN THE INDUSTRY: Resumes-interviews- working tools.
Update your CV or Career today, Click Here to Register online or See Our High-Tech Gadgets Here
Please Note: Registration Form is: $10 (N1000) only and mode of training is thru Online/Long Distance only.
**Training Terms: All our course programs do not in anyway replaced your professional training you should get from relevant security or governmental agencies/institutes. Our training programs are for educational and self enlightenment purposes only