The need for trained staff security and safety - a topical issue in the labor market. Moreover, it exists as in small- and medium-sized businesses and large holding companies.
There is a need for training programs and the man who will take over the job of organizing learning. It is to help such a person and developed this practical electronic lectures.
Theme 1. Protection of stationary objects
Characteristics and types of stationary objects
The organization and mode of protection
Basic requirements for the protection of the object mode
The procedure for admission of stationary objects under protection
Tactic Protection of stationary objects
Means of signaling Protection of stationary objects
Providing order during mass events by management
Samples of official documentation for the protection of stationary objects. Key.
1. Log on duty - "JOURNAL duty guards for the protection of the office of the enterprise"
2. Schedule the guards on duty for a month
3. Report Card post
4. Magazine reception protected by key cabinets
5. Magazine reception rooms on the KME (hub small capacity)
6. History of orders and instructions Protection
7. Passport office of the enterprise
8. Passport to the place of residence of the director
9. Instructions guard bodyguard escort Head
2. Subject perimeter security systems (DIS)
The concept of "concept to protect the perimeter of the enterprise"
Options for standard models offenders
Early detection of the offender - a task SOP
Barrages - as part of the technical means to protect the perimeter
Autonomous and rapidly deployable system
False alarms perimeter security system
Three approaches to combat false alarms
Theme 3. Control - access control in the enterprise
Organization of control - access mode enterprise (CRC)
Preparation of initial data for the development of access control
Classification categories regime
Development of instructions access mode
Types of passes
CPR for the passage of people
Admission staff and visitors to the facility
Admission to the object of control personnel.
Admission to the territory of the enterprise vehicles, removal of property
The main features of a possible attack on the object of protection
The criteria for the effectiveness of the security unit
A typical list of documents that are at the checkpoint. (To Russia and the CIS).
A typical list of documents that are at the checkpoint. (For Ukraine).