sec210 | undergraduate
Physical Asset Protection
topic title goes here
Physical Security, Access Control, and Identity Management
- Explain the importance of identification management protocols across business processes
- Identify types of barriers and their effectiveness.
- Explain the layers of protection in managing access.
- Explain the role of barriers and delay technologies in physical protection systems.
- Summarize entry control and describe its use as part of the physical security plan.
- Describe available methods for contraband screening.
- Identify the three available authentication factors.
- Explain the potential benefits of smart card technologies.
- Recognize the functional differences between electric locking hardware types.
- Identify the pitfalls associated with privacy protection.
- Differentiate between identification and authentication.
Intrusion Detection, Video Surveillance, and Risk Assessments
- Determine which types of sensors provide effective detection for given threat tactics and environmental conditions.
- Explain the relationship between detection, delay, and response.
- Identify the uses of video systems in physical security.
- Describe the fundamental steps in designing a video system.
- Classify intrusion detection sensors and determine how to improve protection-in-depth.
- Identify effective placement of intrusion sensors.
- Recognize the importance of video quality when considering the application of video.
- Explain the difference between a traditional data center and cloud computing.
- Determine the advantages and methods of combining sensor systems.
- Describe the importance of video assessment with respect to intrusion detection.
- Identify rapidly evolving software and hardware and the impact on PPS performance.
Internal Controls and Investigations
- Identify the preferred process for gathering and organizing relevant materials.
- Describe the process for reporting the results of the investigation
- Define the common principles for internal investigations.
- Explain proper evidence management.
- Recognize the risks of conducting internal investigations.
- Identify examples of behavioral interviewing.
- Identify verbal and non-verbal cues associated with deceptive behaviors.
- Identify general principles of behavior symptoms.
- Define truthful and deceptive subjects
- Recognize the motivations behind internal crimes.
- Explore the basic principles for conducting investigations.
- Develop non-verbal and verbal behavioral models.
- Compose appropriate questions specific to an interview and/or interrogation.
- Examine proven methods and controls to reduce the opportunity and the impact of fraud.
Workplace Violence, Emergency Planning, and Risk Assessments
- Identify risk factors associated with violent behavior affecting the workplace.
- Recognize potential sources of violence and describe aggravating and mitigating factors.
- Distinguish between defined types of violent and aggressive behavior.
- Describe applicable legal standards related to employee safety and violence.
- Explain a comprehensive approach to managing threats and provide applicable examples.
- Defend the security department’s responsibility to the organization as it pertains to managing risk.
- Define the purpose of emergency planning.
- Identify the categories of crisis and elements of crisis management planning.
- Determine the elements necessary to build an emergency plan.
- Recognize the pitfalls of a poorly managed emergency management plan.
- Explore proven methods of analyzing and assessing security loss/risk.
- Define fundamental steps in designing a vulnerability assessment.
- Explain the importance of the risk assessment process.
- Determine how to present results of vulnerability/risk assessment in the most appropriate manner.
Security Force Management, Policies, and Metrics
- Describe the importance of sound guard services.
- Identify the goals of guard force management.
- Explain training and competencies for security personnel.
- Identify common problems associated with proper guard force management.
- Differentiate between proprietary and contract services, and explain advantages and shortcoming of various staffing models.
- Define the purpose and types of Standard Operating Procedures.
- Recognize the importance of Standard Operating Procedures for protecting the organization.
- Identify common problems and pitfalls resulting from lack of proper Standard Operating Procedures.
- Explain proper change management protocols in Standard Operating Procedure development.
- Identify modern tools that help the security manager visualize data findings to identify key concerns and opportunities for improvement.
- Evaluate proven methods of how to successfully manage programs and people through clear expectations, milestones, and measurements.
- Determine key performance indicators for security programs using business language.
Please ask about these special rates:
Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.
Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.