Join our world renowned security training courses to expand your knowledge, widen your experience and make new friends.

  • Dates: Contact us for information
  • Location: Tel Aviv, Israel
  • Price: $3,700 (full board and lodging included)

Our Physical Security Course has been one of the most sought after courses to introduce both general management and security management to the concepts of threat and risk management and security planning.  With the vast array of technological, engineering and structural products available today, it is all too easy to invest huge sums to buy in the latest and best solutions but none of us have unlimited budgets and it is vital to focus on cost-effective investments and determining priorities.

This course will introduce you to the concepts of physical security based on risks, threats, vulnerabilities and establishing prioritized tasks and investment.

The course schedule appears below.


Course opening and introduction of the attendees (evening)
Introduction to Israeli security concepts

The security challenges that Israel has coped with since its birth influenced the formation of the Israeli security conception. This session gives an outlook of the importance of a proactive approach to security and explains the concepts of prevention, deterrence and reaction and the key role of the human factor within the Israeli security system.

The threat to a building and its occupants

An updated look at the various threats to be taken into account when protecting an infrastructure, starting from disgruntled employees or antigovernment groups to terror and war threats. Through past events we will learn about possible means and weapons to carry out the threat, their utilization and consequences of these various threat scenarios.

Case Study: Attack on US Embassy in Nairobi (Kenya)

On August 7, 1998 two track bombs exploded simultaneously at the US embassies in Dar es Salam (Tanzania) and Nairobi (Kenya). In the Nairobi attack 212 people were killed, the vast majority local citizens. In this session we will analyze the attackers’ modus operandi and the effect that the huge blast had on the embassy and the nearby buildings. We will learn which structures were the most affected and why, and understand what caused the major casualties.

The Risk

Each threat involves a risk. In this session we will expose and analyze the different kinds of risks affecting site and infrastructure protection, especially those related to terror attacks. We will examine the anatomy of an explosion and determine the risk to people and structures as a consequence of the blast load, fragmentation, secondary fragmentation, fire, etc.

Case Study: 9/11 building collapse

The twin towers of the World Trade Center collapsed on September 11, 2001 as a consequence of the 9/11 terror attacks. The South tower collapsed less than an hour after the crash of the jet airline and the North one collapsed almost three hours after being hit. 7 World Trade Center was heavily damaged as the North Tower collapsed and fell itself seven hours later. In this session we will provide an engineering look at the World Trade Center’s structural system and the buildings’ collapse considering the various theories for the failure of the structures. Some recent changes to structural design standards, such as structural robustness will be also considered.

Introduction to construction methods and materials

An overview of the principal construction methods and materials used in the construction industry such as concrete, masonry, metals, and glass, and the implications from the protection point of view. Through real examples we will learn that involving the security planners from the start of the project provides many advantages, including budgetary benefits and outcomes, without compromising the architectural vision.

Introduction to Threat and Risk Analysis. A methodical look at physical security

Threat and Risk Analysis aims to analyze the current and the near future threat situation, based on studies and intelligence, calculate the risks as a result of these threats and evaluate the vulnerabilities of each segment of the facility being assessed in order to provide the management and decision makers with a well based and clear report on the organization security situation and needs. In this session we will describe our systematic security thinking and planning method and the ways to use it through examples of real projects.

Prioritizing facilities and threats

The desired result of a Threat and Risk Analysis is a prioritized list of vulnerabilities to be addressed and facilities to be protected in order to provide a satisfactory level of protection for the main security needs. As budget is limited both in public and private organizations, this strategy ensures that funds are allocated to the right places and that the solutions put in place give an accurate response to the threat scenarios.  In this session we will learn how to arrive at this list of priorities and how to present them to the managerial level responsible for the decision-making.

The principles of survivability in installation protection

Protective construction refers to the design, construction and layout of facilities to support an integrated and in-depth plan to protect personnel and critical assets from an attack.  Even during and after a natural or man-made disturbance, a well-planned installation should be able to continue operating and functioning at an acceptable level to ensure continuity of business and services. In this session we will learn the principles of survivability to be implemented when designing the protection of an installation.

Case Study: Threat and Risk Analysis and Protection Project

We will illustrate stage by stage the way of thinking, working method and security solutions described in the previous lessons by an in depth overview of a real protection project.

Analysis of different threat scenarios: car bombs, suicide bombs, rockets and mortars

In this session we will make an in depth analysis of three case studies representing three different and real threat scenarios: car bomb, suicide bomb and rockets and mortars. We will learn about the attackers’ modus operandi and suggest solutions to counter these threats either in the initial design of the facility or in a retrofit project.

Reading and understanding building drawings, including drawing reading exercises

Whether designing the protection measures for a new project or enhancing the existing protection level in a retrofit project, there is always a need to read and fully understand the building drawings.  In this session we will explain the different types of drawings and learn how to read them in order to locate potential vulnerabilities. We will deal with positioning, structural and detailing issues that will help us to understand what are the important things we need to look out for when assessing and planning the security array of the site.

Tour areas of the city to understand construction methods and materials

We will make a tour in the city and observe the urban network, understanding the different construction methods and materials and their implications from the protection point of view.

Security Domains and Building Circles

An effective security is a balanced one where every measure and every protection mean put in place ensures the achievement of at least one protection goal whether it is deterrence, detection, evaluation or reaction. In this session we will learn the concepts of circles of protection and security domains and understand that the only way to ensure an effective security system and maximize the output of the investment is by a detailed planning and analysis.

Physical Security products and standards

There are ways to cope with physical security threats, whether by preventing them from occurring, delaying them or mitigating their effects. A combination of different means of protection will be typically the most effective solution. In this session we will fully review the security solutions available today in the market, understand their protection aims and technical characteristics and notice the important things to consider when planning to use them.

Security Systems and the Security Control Room

The technological domain should be one of the three balanced domains constituting the security array. As with every other measure, security systems and products should be assessed and quantified by how they ensure the required outcome. In this session we will review from our experience various systems according to their protection purpose and pay attention to the main points for consideration to ensure the maximum output from the investment when planning allocating funds for them.

Introducing the team project

Participants will be requested to work in a team project and implement the concepts and methods exposed during the course.

Visit to secure and protected site

By visiting a secure and protected site the participants will see how the concepts and methods presented within the course are implemented in a real project without compromising architecture, esthetics and functionality. We will discuss the difficulties arising during the different stages of the project, the security solutions provided and their output on the ground.

Working on the team projects

Time will be given to the teams to work on their own project. PSOS expert will be available to consult if necessary.

Team projects presentation and discussion

The teams will present their projects and we will discuss them. We will point out their strengths and if needed, suggest additional solutions to enhance their level of protection. This session offers the opportunity to adapt and implement the concepts and methods elaborated on during the course.

Summary of Physical Security Program Building Methodology

On the last day of the course, we will summarize the concepts and working methodologies learnt during the previous days and discuss their applicability to the working context of the attendees.

National Physical Security Guidelines

Some countries provide national guidelines for lessening the severity of the effect of a terrorist attack on a building by means of security measures and for building design considerations to enhance structures’ protection in order to assist responsible managers, architects, designers, contractors, designated officials and security officers. We will bring some examples of the threat listed by different governments and discuss the suggested security considerations and solutions.

Summing up the course

Your opinions, feedback and suggestions are of great importance to us and help us to keep addressing the needs of our students.

Lunch and free time to enjoy Tel Aviv-Yaffo on Friday evening
Guided tour of Jerusalem and the Dead Sea

We will enjoy visiting Jerusalem, the sacred city for the three monotheistic religions. We will start our tour with a beautiful view from the top of the Mount of Olives and visit some important churches. Afterward, we will go down into the Old City to visit the Western Wall and see the beautiful Dome of the Rock. Exploring the narrow streets of the Old City we will reach the Holy Sepulcher and finish the visit with some bargaining experience in the Arab market. From Jerusalem we will descend to the Dead Sea, the lowest place in world, where we can experience the benefits of its therapeutic mud and float effortlessly in its salty water.

Concluding dinner and distribution of certificates

Back in Tel Aviv we will conclude the course with a ceremony of distribution of certificates and a special farewell dinner.

Breakfast and check out

Note: PSOS Security reserves the right to modify the syllabus without prior notice.