Why Attend This Training Course?
There is a need to strengthen efforts to improve security and protection of particularly vulnerable targets, such as infrastructure and public places, against terrorist attacks. This specialized training course proposes a layered approach for the protection and prevention against terrorism attacks on critical buildings. It is rigorous, intense and thorough to ensure that each member of your staff has the resourcefulness and presence of mind to act in crisis situations they might not have even imagined encountering. This training course offers fully immersive training experience ideally suitable for security managers and teams who work to secure crowded places. It is tailored to meet customer requirements. Our course introduces the latest research, practice and training methodologies to security managers, including those responsible for high-profile targets.
What Is The Training Course Methodology?
This training course methodology depends on enabling participants to interact and exchange experiences, explore their competencies and achieve their career aspirations, using forward-thinking training arts, such as theoretical lectures and/or open discussion to exchange opinions and experiences, scenarios, innovative thinking brainstorming. Participants will receive an agenda including training material as a reference, in addition to some extra notes and booklets.
Who Should Attend This Training Course?
This training course is designed for all security engineers, technicians, and assistants, as well as industrial security department staff at industrial facilities, ports, industrial cities and vital buildings from strategic ministries, oil companies and supervisors of bank security and all those related to the security of critical buildings.
What Are The Training Course Objectives?
Introduce the concept of security engineering as one of the modern approaches to protect vital and strategic buildings
Recognize the modern duties of leading the facility security staff and preventive security management
Study new methods of developing plans for the development of operating rooms, modern planning and the development of processing strategic security technique mechanisms
Increase knowledge of how to plan security systems and achieve greater understanding of the design skills for a security system from a security engineering perspective
Training on how to prepare cadastral maps from a security engineering perspective of the facility components and the basis of the engineering classification of security elements
Introduce modern equipment of security engineering strategies required to achieve complete protection of the facility
Training on how to design a comprehensive technical security system for a facility compliant with the security engineering plan
What Is The Training Course Curriculum?
Basic Concept of Security Engineering
Checkpoints from a security engineering perspective (forms - how to deal with them - types)
Degree of risk and the foundations of the required technological devices
Technological control at the entrances and exits
Vital areas and bases of security classification
Statistical Engineering Analysis
Basis of Security Barriers
Types of security barriers (concrete - iron - wire - sand - chemical - water - electric)
Nature of the facility to be protected to test the most appropriate barriers
The foundations of internal and external civil defense including:
Putting adhesive on windows to prevent fragmentation
Early warning devices
First aid means
Fire extinguishing devices
Contact devices
Use of protective masks
Security Barrier Engineering
Building protection engineering near vital buildings
Basis for Installing Surveillance Cameras
Basis for installing speakers
Cadastral engineering fundamentals to ensure the safe distribution of facility components
Engineering alternatives in case of emergency
Safe distribution of power lines to ensure partial power outage
non-reliance on one source of electricity)
Technological Alert Engineering
Preparing Cadastral Maps from a Security Engineering Perspective
Electronic camouflage engineering
Engineering of Safe Evacuation Methods
Loss reduction engineering
Engineering training technology for security staff
Engineering foundations of security maneuvers within the facility to ensure the efficiency of the security technological devices
Basis of engineering classification of security elements
Use of artificial intelligence technology
Use of communication technology
Security Engineering: Devices
Ultrasonic devices
Dober devices
Satellite monitoring devices
Night vision devices (Infrared)
Radiation monitoring devices
Foundations of defense, factuation & confirmation from a security technology perspective
Types of mines
Basics of identifying mine sites
Engineering and technological bases for deactivating mines and timed explosives
Robot technology and engineering security applications
Usage basics of electronic sensors in security engineering
Lighting Distribution
Distribution of lighting and alternative lighting in case of danger
Security engineering foundations for dismounted and mobile patrols inside and outside the facility
Engineering of safe spaces for operation and emergency rooms
Engineering the use of helicopters in difficult security situations and handling methods
Engineering of safe spaces at facilities
Opening and Closing of hydraulic gate
Mechanical gates
Single-way e-gates (in and out)
Smart electronic gates to identify undesirable people
Secret emergency gates with special code
Foundations of emergency plans
Some successful international standards in security engineering and intelligent surveillance technology
Types of engineering codes and preparation methods
We guarantee 100% premium quality solutions by delivering best practice applications in Egypt & the MENA region since 1974, thus, higher retention of learning in business.
This website uses cookies , including third party ones , to allow for analysis of how people use our website in order to improve your experience and our services . By continuing to use our website , you agree to the use of such cookies . Click here for more information on our Cooky policy , Privacy Policy