JOIN US IN ISRAEL
Join our world renowned security training courses to expand your knowledge, widen your experience and make new friends.

  • Dates: Contact us for information
  • Location: Israel
  • Price: $3,700 (full board and lodging included)
The next week-long intensive Security Management Course will be held in Israel.  It is designed both for newly appointed security managers and also for those who want to gain updates and insights into the latest techniques, technologies and methods of managing a complex security operation in an environment of ever-changing and more complex threats.

The Security Management Course introduces a holistic approach to security, encompassing physical security, operation and leadership during routine, heightened alerts and emergencies, crisis negotiation, terror, body language and more.

The course schedule appears below and you are invited to get in touch with us for more information. We look forward to meeting you in Israel soon.

ASK A QUESTION ABOUT THIS COURSE

 

SECURITY MANAGEMENT COURSE AGENDA

Evening: Opening presentation
Introduction to the Israeli security concept

The security challenges that Israel has coped with since its birth have influenced the formation of the Israeli security concept, one of the most practical and dynamic in the world. This session provides a look at the importance of a proactive approach to security, along with the prevention, deterrence and reaction concepts and the key role of the human factor within the Israeli security system.

Behavior, operation and command in dangerous situations

Security professionals often need to operate and command other people in dangerous situations. In this session we will describe the basic human reactions to a danger and the importance of dealing differently with each one of them. We will learn about the differences between unprepared and prepared security systems and personnel and give tools to effectively reduce the response time in emergencies. Since commanders and security managers are required to make critical decisions under pressure and dangerous situations, we will review the whole process of decision making to better understand the importance of each element/stage.

Moving from routine into emergency and the return to a new routine

Security is about analysis and alertness: a correct analysis of the situation and its identification in time is critical to counter a threat that materializes or to minimize its impact. This session gives an in-depth analysis of the seven stage cycle, starting from the routine and ending in the return to a new routine after the emergency is settled. We will also differentiate between the stage of alert of the security system and that of the secured entity. This ensures the maximum level of alertness while maintaining the routine of the protected object as much as possible.

Leadership in uncertainty situations

Uncertainty is a unique stage when it is still unclear how the situation is going to develop – whether it will deteriorate into an emergency or on the contrary, improve and return to the routine levels.   We will learn what are the pressures and the expectations from the leader during times of uncertainty and the ways to ease them into a level that will not prevent him/her from making effective decisions and acting. We will feature the expected behavior in a situation of uncertainty, both of the individual and the group and give some tools to manage it in the best way.

Introduction to Intelligence and exercises

Gathering and processing information is an important component of every security system. This session will provide an outlook of different aspects of the intelligence operation, from the circle of intelligence to work with sources and the intelligence report.

Security Planning: Threat, Risk and Vulnerability. Concepts and methodology of the assessment

Threat and Risk assessment is a very basic tool in the security planning tool box. Its aim is to analyze the current and the near future threat situation, based on intelligence and studies, calculate  the risks as a results of these threats and evaluate the vulnerabilities of each segment of the facility we are assessing. During this session we will define the concepts of Threat, Risk and Vulnerability and learn how to grade them to obtain a prioritized list of vulnerabilities.

Physical Security Planning: Circles and domains of security

A security system is a set of measures put in place or carried out to give maximum available security to the protected entity. In order to be effective, the security system must be designed in a balanced way. In this session we will learn how to overlap the geographic circles of security and the three domains of security (physical, technological and human) so they will provide the best available level of security.  We will also illustrate with the help of some real projects the different stages of the design of a security plan.

Guidelines for the team project

Participants will receive a team project exercise consisting of designing a security plan implementing the concepts and methodology learnt in the previous sessions. Teams will work on their project during the course and prepare themselves to present and discuss them.

Body Language as a tool for the recognition of suspicious behavior

Even when the mouth is silent, the body speaks. Experts estimate that about 85% of human communication is non-verbal. Body language appears as reflex and non-reflex movements of a part or all of the body. Interpreted correctly, such movements can reveal a person’s inner thoughts and intentions. In this session we will learn about gestures, eye signals, body signals and micro expressions which enable the trained person to better spot suspicious behavior. We will make exercises and simulations, filming them so the participants can analyze and explain their own body language in various circumstances.

International Radical Terrorism

Terror can be defined as the deliberate use of violence against civilians in order to achieve political goals whether these goals are religious, ideological, nationalistic or socioeconomic, taking advantage of the modern media to gain attention and spread fear among the target population. In this session we will examine the components and characteristics of the different terror organizations and analyze the current trends, including cyber and mega terror.

Analysis of different terror scenarios: car bombs, suicide bombs, rockets and mortars

In this session we will make an in depth analysis of three case studies representing three different and real threat scenarios: car bomb, suicide bomb and rockets and mortars. We will learn about the attackers’ modus operandi and suggest solutions to counter these threats either in the initial design of the facility or in a retrofit project.

Red Teaming as a tool for the assessment of the security operation

The security system must be constantly checked in order to ensure the expected outcome from the investment. One of the most efficient tools for assessing the real operational readiness and alertness of the security operation is Red Teaming. In this session we will learn what RT means, what are its aims and how it contributes to the continuous improvement of the security operation and the organizational culture.

Working on the team project

Time will be given to the teams to work on their project. PSOS expert will be available to consult if necessary.

Leadership in times of emergency

The preparation for emergencies starts in the routine and encompasses exhaustive planning, clear procedures and continuous training and exercising. The very first moments of an emergency are the most critical ones when the security and emergency forces have not yet arrived and the responsibility for commanding the event is on the security manager’s shoulders. The aim of this session is to identify the key aspects of leadership that enable crises and emergencies to be dealt with effectively.  We will illustrate this through the analysis of different cases of emergency where the way they were managed determined their consequences.

Occupational delinquency and integrity

The damage caused by employees to their work place represents about 6% of a company’s annual turnover, according to international studies, and it can be as high as up to 30% in certain sectors. The scope is wide: from deficient performance at work or misuse of resources and material to false reporting and fraud. In this session we will understand what are the factors causing occupational delinquency and what are the existing solutions to prevent it.

Principles of crisis negotiation

When a crisis situation arises, usually the security manager should act as a first responder until the professional negotiators arrive. It could be a hostage situation, barricades, kidnaping or a suicide individual but the goal will always be to contain and stabilize the situation and gather as much information as possible till the arrival of the professional teams. In this session we will analyze the characteristics of a crisis situation and state what should be the aim of the first negotiation response. We will provide the participants with the tools to successfully deal with a crisis situation during the initial moments and effectively transfer the command of the event to the professional teams.

Risk vs Budget. Prioritizing security needs

Whether in the public or in the private sector, budgetary issues are perceived too often as the main obstacle preventing the achievement of the desired protection level of institutions and buildings. On the other hand, many times the funds are allocated in expensive security measures that do not provide the appropriate protection level against the real threats. A cost effective security is result of a systematic methodology of threat and risk analysis that results in a well-founded list of protection priorities and solutions. In this session we will learn through case studies of real projects what is the suggested methodology to support the decision-making process and avoid unnecessary investments ensuring that funds are allocated in the most appropriate and cost effective way.

Team projects presentation and discussion

The teams will present their projects and we will discuss them. We will point out their strengths and if needed, suggest additional solutions to enhance their level of protection. This session offers the opportunity to adapt and implement the concepts and methods described during the course.

The place of the commander during the event. Analysis of a real case of evacuation

Through the analysis of a real evacuation case we will sum up all the issues learnt during the course regarding security leadership, transition from routine to emergency, the place of the commander during an event and managing emergency situations.

Discussion panel: Means, technologies and the human factor

How to choose and apply the concepts and methods presented at the course to the participants’ professional reality.

Summing up the course

Your opinions, feedback and suggestions are of great importance to us and help us to keep addressing the needs of our students.

Lunch and free time to enjoy Tel Aviv-Yaffo on Friday evening
Guided tour of Jerusalem and the Dead Sea

We will enjoy a visit to Jerusalem, the sacred city for the three monotheistic religions. We will start our tour with a beautiful view from the top of the Mount of Olives and visit some important churches. Afterward, we will go down into the Old City to visit the Western Wall and see the beautiful Dome of the Rock. Exploring the narrow streets of the Old City we will reach the Holy Sepulcher and finish the visit with some bargaining experience in the Arab market. From Jerusalem we will descend to the Dead Sea, the lowest place in world, where we can experience the benefits of its therapeutic mud and float effortlessly in its salty water.

Concluding dinner and distribution of certificates

Back in Tel Aviv we will conclude the course with a ceremony to distribute certificates and a special farewell dinner.

Breakfast and check out


Note: PSOS Security reserves the right to modify the syllabus without prior notice.