Content: podgotovka_oxpana.exe (918.70 KB)
Uploaded: 14.11.2009

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

987.21 Rub.
The need for trained staff security and safety - a topical issue in the labor market. Moreover, it exists as in small- and medium-sized businesses and large holding companies.

There is a need for training programs and the man who will take over the job of organizing learning. It is to help such a person and developed this practical electronic lectures.

Contents


Theme 1. Protection of stationary objects

Characteristics and types of stationary objects

The organization and mode of protection

Basic requirements for the protection of the object mode

The procedure for admission of stationary objects under protection

Tactic Protection of stationary objects

Means of signaling Protection of stationary objects

Providing order during mass events by management

Samples of official documentation for the protection of stationary objects. Key.

1. Log on duty - "JOURNAL duty guards for the protection of the office of the enterprise"

2. Schedule the guards on duty for a month

3. Report Card post

4. Magazine reception protected by key cabinets

5. Magazine reception rooms on the KME (hub small capacity)

6. History of orders and instructions Protection

7. Passport office of the enterprise

8. Passport to the place of residence of the director

9. Instructions guard bodyguard escort Head

2. Subject perimeter security systems (DIS)

The concept of "concept to protect the perimeter of the enterprise"

Model perimeter

Model threats

Options for standard models offenders

Early detection of the offender - a task SOP

Barrages - as part of the technical means to protect the perimeter

Autonomous and rapidly deployable system

False alarms perimeter security system

Three approaches to combat false alarms

Theme 3. Control - access control in the enterprise

Organization of control - access mode enterprise (CRC)

Preparation of initial data for the development of access control

Classification categories regime

Development of instructions access mode

Types of passes

Checkpoint. (PPC)

CPR for the passage of people

Motor Gearbox

Admission staff and visitors to the facility

Admission to the object of control personnel.

Admission to the territory of the enterprise vehicles, removal of property

The main features of a possible attack on the object of protection

The criteria for the effectiveness of the security unit

A typical list of documents that are at the checkpoint. (To Russia and the CIS).

A typical list of documents that are at the checkpoint. (For Ukraine).
Theme 4. Preparation and conduct of security measures

Terrorist acts

Brief description of the concept of "terrorism"

The reasons for the killings.

The attacks - as manifestations of terrorism

Certain types of crimes

Protivosnayperskie protection measures

What is the vulnerability of a sniper - a terrorist?

Features of personal protection.

General characteristics, principles and methods of protection

Perimeter and security posts

Situational build outfits Protection

Features of the preparation and conduct of security measures

Elements of training and technique of interventions

Arrangements for the protection of the object

Commissioning of advanced groups

Checklist for the inspection route.

Contract ensure the protection of an individual

Explosive device (detect)

Detection, prevention and suppression of a possible assassination attempt on the protected person

Preliminary check of the protected object

Security at mass events

Business receptions and public events

Protection of business meetings and receptions

Protection of advertising and commercial activities

Protection of business meetings and receptions

Stripping territory

Hostage-taking

Tactics to work with the object of protection

Your "customer" - the object of protection

Something about etiquette and outfit

Security Posts

Subject 5. Basic assessment level of threat the protected object.

Action Guard in an attack on a protected object.

Features actions of protection while traveling by car.

Five major factors unprofessional actions of the driver protection.

Reflection of criminal attacks by following the vehicle.

(18 basic rules and factors 5)

General safety by following the vehicle.

Tactical and psychological characteristics detection surveillance.

Eight basic techniques of observation and visual memory.

Theme 6. Actions protection service in detecting explosive devices (slaves).

The main condition for the security of the protected person from the threat of the use of slaves.

Practical advice on identifying slaves.

The methodology and procedure for the search of explosive devices (slave) on the premises.

The methodology and procedure for checking the premises for the presence of slaves (8 basic rules.)

The methodology and procedure for the search of explosives in vehicles (9 basic rules).

Overall control of household items for the presence of BV.

Of protection when it detects explosive device radio managed

Countermeasures detection RVU.

Features of protection under the threat of explosion.

Theme 7. Basics of personal security specialists Sat.

The main directions (10) Personal security experts Sat.

Fundamentals of psychology physical security specialists Sat.

Practical advice (43 receptions) on personal security of workers Sat.

Outside, practical techniques secure communication specialists Sat.

Practical memo specialist Sat.

The psychology of security in conflict situations.

Professional stages of conflict resolution.

Manifestation of professional deformation of the specialists Sat.

Main fatal errors (8) employees Sat.

Ways of overcoming of professional deformation of employees in the Security Council.

Basic techniques of psychological defense (12 methods).

More practical methods of manipulation and indoctrination.

More topics. BONUSES

1. Subject: How do guard in different situations?

Practical recommendations.

PRACTICAL TRAINING BONUS 1. Sniper (full course).

PROTIVOSNAYPERSKIE security measures.

BONUS 2. Creation of security of business.

Practical materials on the example of Ukraine.
No feedback yet