Earn these career-relevant skills in weeks, not years.
- Describe the origins and foundations of private security and how the need for private security has changed over the years.
- Explain how private security collaborates with the community and with law enforcement, and differentiate among their respective roles.
- List an overview of the challenges in the security field.
- Differentiate among proprietary, contractual, and hybrid security programs.
- Identify security management’s role and challenges in the administration of private security.
- Describe how security manages risk and differentiate among the various risk tools used by security, including hazard vulnerability assessments and risk assessments.
- Identify the tools and technologies used in the physical security makeup for various security specializations.
- Compare the security functions in a variety of industries.
- Identify indicators and types of workplace violence.
- Distinguish between employer and employee responsibilities for preventing workplace violence.
- Describe the investigations process and differentiate between private security and law enforcement investigations.
- Explain surveillance, the skills needed to conduct surveillance effectively, and the laws governing both private security and law enforcement.
- Define and distinguish between retail security and loss prevention.
- Identify various criminal acts that cause retail losses and how retail theft has changed over the years.
- Describe private security’s role in dealing with terrorism and how the Department of Homeland Security partners with the private sector.
- Compare and contrast terrorism response in the U.S. with that in other countries.
- Provide examples and discuss responses to recent local, state, and national disasters.
- Identify and distinguish a business impact analysis, business continuity management, and continuity of operations.
- Identify the 16 critical infrastructure sectors, including cyberspace, and security’s role in protecting each.
- Describe the basic steps of a vulnerability assessment.
- Explain the public-private partnerships with regard to disaster response.
- Identify steps to evaluate the effectiveness of an organization’s Emergency Management Plan.