sec321 | undergraduate
Survey Of Security Specializations
This undergraduate-level course is 5 weeks To enroll, speak with an Enrollment Representative.
topic title goes here
Origins and Theoretical Foundations of Security Management
- Differentiate among proprietary, contractual, and hybrid security programs.
- Identify security managementâs role and challenges in the administration of private security.
- Describe the origins and foundations of private security and how the need for private security has changed over the years.
- Explain how private security collaborates with the community and with law enforcement, and differentiate among their respective roles.
- List an overview of the challenges in the security field.
Institutional and Workplace Security
- Describe how security manages risk and differentiate among the various risk tools used by security, including hazard vulnerability assessments and risk assessments.
- Identify the tools and technologies used in the physical security makeup for various security specializations.
- Compare the security functions in a variety of industries.
- Identify indicators and types of workplace violence.
- Distinguish between employer and employee responsibilities for preventing workplace violence.
Retail Security and Loss Prevention
- Describe the investigations process and differentiate between private security and law enforcement investigations.
- Explain surveillance, the skills needed to conduct surveillance effectively, and the laws governing both private security and law enforcement.
- Define and distinguish between retail security and loss prevention.
- Identify various criminal acts that cause retail losses and how retail theft has changed over the years.
Terrorism, Emergency Practices, and Crisis/Disaster Management
- Describe private securityâs role in dealing with terrorism and how the Department of Homeland Security partners with the private sector.
- Compare and contrast terrorism response in the U.S. with that in other countries.
- Provide examples and discuss responses to recent local, state, and national disasters.
- Identify and distinguish a business impact analysis, business continuity management, and continuity of operations.
Critical Infrastructure and Cybersecurity
- Identify the 16 critical infrastructure sectors, including cyberspace, and securityâs role in protecting each.
- Describe the basic steps of a vulnerability assessment.
- Explain the public-private partnerships with regard to disaster response.
- Identify steps to evaluate the effectiveness of an organizationâs Emergency Management Plan.
Please ask about these special rates:
Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.
Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.