Training for ohrany.Elektronny lectures.

Affiliates: 4,5 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0
Refunds: 0

Uploaded: 14.11.2009
Content: podgotovka_oxpana.exe (918,7 kB)


The need for trained staff security and safety - a topical issue in the labor market. Moreover, it exists as in small- and medium-sized businesses and large holding companies.
There is a need for training programs and the man who will take over the job of organizing learning. It is to help such a person and developed this practical electronic lectures.

Theme 1. Protection of stationary objects
Characteristics and types of stationary objects
The organization and mode of protection
Basic requirements for the protection of the object mode
The procedure for admission of stationary objects under protection
Tactic Protection of stationary objects
Means of signaling Protection of stationary objects
Providing order during mass events by management
Samples of official documentation for the protection of stationary objects. Key.
1. Log on duty - "JOURNAL duty guards for the protection of the office of the enterprise"
2. Schedule the guards on duty for a month
3. Report Card post
4. Magazine reception protected by key cabinets
5. Magazine reception rooms on the KME (hub small capacity)
6. History of orders and instructions Protection
7. Passport office of the enterprise
8. Passport to the place of residence of the director
9. Instructions guard bodyguard escort Head
2. Subject perimeter security systems (DIS)
The concept of "concept to protect the perimeter of the enterprise"
Model perimeter
Model threats
Options for standard models offenders
Early detection of the offender - a task SOP
Barrages - as part of the technical means to protect the perimeter
Autonomous and rapidly deployable system
False alarms perimeter security system
Three approaches to combat false alarms
Theme 3. Control - access control in the enterprise
Organization of control - access mode enterprise (CRC)
Preparation of initial data for the development of access control
Classification categories regime
Development of instructions access mode
Types of passes
Checkpoint. (PPC)
CPR for the passage of people
Motor Gearbox
Admission staff and visitors to the facility
Admission to the object of control personnel.
Admission to the territory of the enterprise vehicles, removal of property
The main features of a possible attack on the object of protection
The criteria for the effectiveness of the security unit
A typical list of documents that are at the checkpoint. (To Russia and the CIS).
A typical list of documents that are at the checkpoint. (For Ukraine).

Additional information

Theme 4. Preparation and conduct of security measures
Terrorist acts
Brief description of the concept of "terrorism"
The reasons for the killings.
The attacks - as manifestations of terrorism
Certain types of crimes
Protivosnayperskie protection measures
What is the vulnerability of a sniper - a terrorist?
Features of personal protection.
General characteristics, principles and methods of protection
Perimeter and security posts
Situational build outfits Protection
Features of the preparation and conduct of security measures
Elements of training and technique of interventions
Arrangements for the protection of the object
Commissioning of advanced groups
Checklist for the inspection route.
Contract ensure the protection of an individual
Explosive device (detect)
Detection, prevention and suppression of a possible assassination attempt on the protected person
Preliminary check of the protected object
Security at mass events
Business receptions and public events
Protection of business meetings and receptions
Protection of advertising and commercial activities
Protection of business meetings and receptions
Stripping territory
Tactics to work with the object of protection
Your "customer" - the object of protection
Something about etiquette and outfit
Security Posts
Subject 5. Basic assessment level of threat the protected object.
Action Guard in an attack on a protected object.
Features actions of protection while traveling by car.
Five major factors unprofessional actions of the driver protection.
Reflection of criminal attacks by following the vehicle.
(18 basic rules and factors 5)
General safety by following the vehicle.
Tactical and psychological characteristics detection surveillance.
Eight basic techniques of observation and visual memory.
Theme 6. Actions protection service in detecting explosive devices (slaves).
The main condition for the security of the protected person from the threat of the use of slaves.
Practical advice on identifying slaves.
The methodology and procedure for the search of explosive devices (slave) on the premises.
The methodology and procedure for checking the premises for the presence of slaves (8 basic rules.)
The methodology and procedure for the search of explosives in vehicles (9 basic rules).
Overall control of household items for the presence of BV.
Of protection when it detects explosive device radio managed
Countermeasures detection RVU.
Features of protection under the threat of explosion.
Theme 7. Basics of personal security specialists Sat.
The main directions (10) Personal security experts Sat.
Fundamentals of psychology physical security specialists Sat.
Practical advice (43 receptions) on personal security of workers Sat.
Outside, practical techniques secure communication specialists Sat.
Practical memo specialist Sat.
The psychology of security in conflict situations.
Professional stages of conflict resolution.
Manifestation of professional deformation of the specialists Sat.
Main fatal errors (8) employees Sat.
Ways of overcoming of professional deformation of employees in the Security Council.
Basic techniques of psychological defense (12 methods).
More practical methods of manipulation and indoctrination.
More topics. BONUSES
1. Subject: How do guard in different situations?
Practical recommendations.
PRACTICAL TRAINING BONUS 1. Sniper (full course).
PROTIVOSNAYPERSKIE security measures.
BONUS 2. Creation of security of business.
Practical materials on the example of Ukraine.


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)