Join our world renowned security training courses to expand your knowledge, widen your experience and make new friends.

  • Location: Tel Aviv, Israel
  • Price: $3,700 (full board and lodging included)

Our Close Protection Management course is specifically designed to meet the training needs of professionals responsible for designing, managing and monitoring the VIP security plans within their organizations.  Close protection presents various challenges to security teams around the world. Learn how to manage these challenges and ensure your team and you take the right approach.

This course covers many topics related to planning and management, including threat and risk assessment, operational plans, routine and emergency procedures, quality assurance and more.

Join us for our next week long course.


Course opening and introduction of the attendees (evening)
Introduction to Israeli security concepts

The security challenges that Israel has coped with since its birth have influenced the formation of Israeli security concepts. This session gives an outlook of the importance of a proactive approach to security and explains the concepts of prevention, deterrence and reaction and the key role of the human factor within the Israeli security system.

VIP protection: concepts and methods in the western word. Video and cases analysis

Though the final objective of close protection remains the same, there are different concepts and methods to achieve it. This session provides an extensive survey of the main concepts and methods of close protection developed in different western countries (UK, USA and Israel). We will use videos and case studies to illustrate the various approaches and techniques.

The figure of the leader and his place within the order of security. Video and case analysis

Leadership can be defined as the capability of engaging people to achieve a common goal. Managing a security team requires a great deal of leadership abilities and skills either in routine times or in emergency. In this session we will analyze the leader’s personality and characteristics and his/her inter-personal relationships with people under his/her responsibility. We will learn about leadership in routine, uncertainty and emergency and how to convey effectively a message according to the situation.

Body Language as a tool for detecting suspicious behavior

The capability to detect suspicious behavior may be the difference between a successful attack against the protected personality and a deterred attack. Body language is an effective tool when looking for “out of the ordinary” situations and behaviors, as even the most trained attacker can’t control his unconscious reactions. In this session we will learn about gestures, eye signals, body signals and micro expressions which help the trained person to better spot suspicious behavior.   We will illustrate these points through exercises, simulations and analysis of real videos.

Threat and Risk Analysis for Close Protection. Assessing the situation

The basis of every security system is an accurate assessment of the relevant threats and risks to the protected entity. Most of us tend to confuse between the “facts” whether visible or audible and their meaning. This often leads to incorrect conclusions which can be fatal. In this session we will deal with the ability to analyze and assess the risks, from the moment the close protection manager identifies the threat and risk and how he drives the system under his charge to reach the proper security solution.

Close Protection Security Plan. Managing the risk. Exercise

After the previous study session and discussion, participants will be given a practical exercise which will allow them to put the acquired knowledge into practice and discuss their work with their course mates. .

Protecting buildings used by the protected person

In this session we will discuss several issues to take into account when planning the protection of buildings which are being used by the protected person. We will review the specific characteristics and protection needs according to the different kind of buildings and locations, the frequency they are used by the protected person, whether it is occasionally, regularly or permanently, and the actual threat/risk level.

Protecting events in which the protected person participates

Protected persons are more vulnerable when exposed to the public in an event, as we can learn from past attacks. From the security point of view, event protection requires special planning and procedures. In this session we will review the characteristics of the different kinds of events and their implications for the security operational plan, taking into account that even when the protection plan addresses or seems to address every possible situation, unforeseen situations may occur which require the close protection manager and operatives to be flexible enough to effectively react to the unexpected.

The coordination meeting. Inputs and outputs

Planning and preparing operational plans involves coordination with relevant agents to ensure the mission will end smoothly and successfully. The coordination meeting is an advanced management tool allowing the close protection manager to maximize the ability and capacity for gathering and elaborating on relevant information to the mission.

The coordination meeting. Exercise

After the previous study session and discussion, participants will be given a practical exercise which will allow them to put the acquired knowledge into practice and discuss their work with their course mates.

Site Description File. What should it contain and how to write it

Close protection is a security discipline characterized by the broad spectrum of scenarios it has to operate in, making it as dynamic as the protected person’s life. As in in every security plan, in close protection the security site description file is a fundamental tool which aims to provide all the required and useful information that will allow a security team to act effectively in case an event occurs. The close protection manager is expected not only to ensure the completeness and accurateness of the information contained in the site file but also to make sure that team members have a thorough understanding of it. In this session we will deal with both things.

The Site Description Document. Exercise

After the previous study session and discussion, participants will be given a practical exercise which will allow them to put the acquired knowledge into practice and discuss their work with their course mates.

The Operational Order

The Operational Order is another fundamental tool for the close protection manager constituting a common language and knowledge foundation for team members. The Operational Order could be defined as the document which specifies the whole range of actions, coordination activities and instructions required for each mission/task.  It presents the work plan for every single component of the security system and includes the role and task distribution at any given time, so whenever a scenario comes there is always an appropriate response and every member of the team knows what to do and how to react.

Practical exercise: concluding exercise in a public square

Participants will be challenged to implement the knowledge and insights of the course in a practical exercise which will take place in downtown Tel Aviv over several hours where they will be confronted with real situations and dilemmas arising when planning a mission. At the end of the day the concluding exercise will be presented and discussed at class.

Red Team as a tool for assessing the real performance of the security order

The security system must be constantly checked in order to ensure its readiness and effectiveness. One of the most efficient tools for assessing the real operational preparedness and alertness of the security operation is Red Teaming. In this session we will learn what read teaming means, what are its aims and how it contributes to the continuous improvement of the security operation.

Managing the security order during routine

It is well known that routine is one of the biggest enemies of security. Routine affects not only the performance of the operatives but of the whole system as it risks the protected person. Breaking the security routine patterns is an effective way to hinder the intentions of an attacker as a potential aggressor who does not recognize a clear routine will usually give up on the attack. In this session we will point out some of the ways a close protection manager can promote the required level of alertness amongst his operatives.

Managing the security order during emergencies

Security is about analysis and alertness. A correct analysis of the situation and its identification in time is critical to counter the threat and minimize its impact. This session gives an in-depth analysis of a complete cycle, starting from the routine and ending in the return to a new routine once the emergency is settled. We will also differentiate between the stage of the alerting of the security system and that of the protected person. This ensures the maximum level of alertness while maintaining the routine of the principal as much as possible.

Summing up the course

Your opinions, feedback and suggestions are of great importance to us and help us to keep addressing the needs of our students.

Lunch and free time to enjoy Tel Aviv-Yaffo on Friday evening.

Guided tour of Jerusalem and the Dead Sea

We will enjoy visiting Jerusalem, the sacred city for the three monotheistic religions. We will start our tour with a beautiful view from the top of the Mount of Olives and visit some important churches. Afterward, we will go down into the Old City to visit the Western Wall and see the beautiful Dome of the Rock. Exploring the narrow streets of the Old City we will reach the Holy Sepulcher and finish the visit with some bargaining experience in the Arab market. From Jerusalem we will descend to the Dead Sea, the lowest place in world, where we can experience the benefits of its therapeutic mud and float effortlessly in its salty water.

Concluding dinner and distribution of certificates

Back in Tel Aviv we will conclude the course with a ceremony of distribution of certificates and a special farewell dinner.

Breakfast and check out

Note: PSOS Security reserves the right to modify the syllabus without prior notice.