In The Learning Zone

Established and award-winning security education specialist Tavcom Training has recently completed major upgrades to its headquarters at Bishops Waltham in Hampshire. In tandem with this move, the business has just issued its 2015 Course Directory. Paul Tennent reviews some of the key training options open to practising security and risk management professionals

Modern security and risk managers operational in both the public and private sectors are now facing up to fresh threats and challenges on a daily basis. In all honesty, they’re ideally placed to influence, support and implement policies and practices which raise and distribute responsibility for security to every level throughout every division within their company.

The role of the security manager is a crucial one, and the BTEC Level 5 ‘Managing Security’ course is designed to reflect that fact. Areas covered on the five-day instruction programme include the key responsibilities of the security manager, how to achieve organisational goals, targets and objectives, effective management styles, creating a culture of security (which is now viewed as being increasingly important), commercial awareness, essential ‘need to know’ legislation, British and European Standards, managing risk, the new UK Surveillance Code of Practice, managing change and working with the Emergency Services.

Whether your organisation is regional, national or international in scope or in the industrial, commercial, Government or retail space, this course is for you.

It’s very often the case, of course, that security and risk managers will be tasked with overseeing numerous projects, perhaps relating to business continuity or the planning, management and delivery of security system installations for the host business. Here, a variety of specialist skills and techniques will inevitably come into play.

There needs to be a degree of individual competency in terms of organising sometimes scarce resources, tightly managing the available budget, working to strict deadlines (and thus avoiding cost overruns), controlling any unexpected changes and realising maximum levels of performance from the project team by dint of effective leadership.

The ‘Project Management’ course also runs to five days in scope and leads to the award of a BTEC Level 5 Diploma. The role of the project manager – and, indeed, the overall project team – is covered in detail, so too how to define project initiation documents. Scheduling and contingency are key factors, while communication and people management techniques are also reviewed.

Importantly, there’s salient instruction on the best ways in which to close a given project, capture vital data from it and measure the results attained.

This particular course is best suited to those security and risk professionals who are relatively new to project management in addition to those who feel they need to strengthen their skill sets or are otherwise seeking ‘refresher’ instruction focused on current trends and methods.

Technology and disaster recovery

Particularly true in times of fiscal austerity, the majority of today’s companies quite rightly demand a return on their investments, including those made in the security function.

The ‘Managing Technology’ course affords delegates – typically security and facility managers as well as owners and operators – a realistic understanding of the cost of ownership when it comes to electronic security systems (including a focus on purchase, installation and maintenance costs) while also ensuring that they derive value for money when acquiring new technology designed to safeguard premises, property and members of staff.

This five-day BTEC Level 4 certificated course provides an overview of CCTV, IP, access control and intruder alarm-focused solutions, how security managers can establish the cost of the risk and ‘make the case’ for new technology.

It’s important that security and risk managers define exactly what they want to achieve for the business and then learn how to design a suitable system in conjunction with other partners across the supply chain.

These important disciplines are covered, as are the correct procedures when it’s time to select your security consultants and integrators, developing an Operational Requirement (‘The Bigger Picture: Outlining CCTV’s Operational Requirements’, Risk UK, January 2015, pp14-15) and budgeting for installation and maintenance.

It’s a truism that either man-made or natural disasters may strike your workplace at any time. Ensuring that your organisation is able to function in the aftermath of a major incident is absolutely vital. The ‘Managing Disaster and Business Continuity’ course is designed to provide end users with the right knowledge and skills necessary to formulate plans of action and execute them when and where necessary.

Delegates will learn and understand how to react professionally and calmly after emergencies and prepare a set of actions designed to minimise disruption, thus allowing the host business to return to a situation wherein normal operations are once again running smoothly and efficiently.

This particular course covers identifying and defining emergencies, risk assessments and mitigation planning, the business impact of civil emergencies, the development of a successful business continuity plan, the cost benefits around emergency planning, recovery time objectives and business recovery scenarios, how best to communicate critical information both accurately and in a speedy fashion, contingency planning for terrorist attacks and issues concerning major incident escalation.

Again, this training leads to a BTEC Level 5 award and runs across five days.

CCTV Control Rooms: key skills

Do you require the necessary skills and confidence to manage a busy CCTV Control Room, introduce operational procedures or otherwise improve and update your existing operations? If so, the ‘Managing CCTV Control Rooms’ course merits consideration.

The course content encompasses communicating your requirements to staff and senior management, agreeing on – and then defining – key objectives, cost of ownership and maintenance contracts, developing a CCTV system, working in partnership on the issue of funding, understanding surveillance equipment and its application, selecting the right kit and systems installation/integration partner(s), the selection and screening of CCTV operators, the law, Codes of Practice, relevant British Standards and digital recording as well as that all-important evidential criteria.

Leading on from this, ‘Gathering Video Evidence’ is a course developed in conjunction with both the police service and the Home Office to provide the necessary understanding of how digital footage might be effectively exported and used within the UK’s legal system. The instruction represents what you might call a classic combination of ‘need to know’ classroom theory supported by practical sessions conducted in a workshop-style format.

The course evaluates the fundamentals of CCTV, handling video and data storage media, basic networking principles, extracting video – a practical view, evidential criteria and audit trails, issues concerning the Data Protection Act 1998 and the legal considerations around CCTV.

Taught over three days, this course leads to the award of a BTEC Level 3 certificate.

Cyber and IT security

Cyber and IT security is emerging as one of the most important elements in IT planning and implementation for businesses. The ongoing risk of viruses, unauthorised data access, uncontrolled e-mail correspondence, data manipulation and the misuse of access to the Internet can seriously affect an organisation’s reputation in the wider world and, potentially at least, its financial stability.

Paul Tennent

Paul Tennent

The five-day, BTEC Level 3 certificate course entitled ‘Cyber and IT Security’ examines potential business vulnerabilities and where they may reside, IT crime investigation and computer forensics, how to secure the network, the concealment of IP addresses, e-mail protection, address filtering and screening, how to identify malicious websites and understanding both integrated and external firewalls.

There’s also instruction on the use of proxy servers and packet filtering, encryption (including wireless encryption), wire-tapping and port scanners, IP VPNs and SSL, spoofing, spamming, phishing, malware and viruses.

SMTP session hijacking is covered in detail as well as Denial of Service, cyber terrorism and the huge issue that is identity theft.

Focus on security consulting

In order to deliver creative solutions in today’s security and business climates, security consultants need to be inspirational, innovative and knowledgeable professionals in equal measure, demonstrating key skills and versatility across a number of major areas.

The ‘Security Consultancy’ course affords all delegates with the necessary skills to develop, design and then implement imaginative security systems solutions in what can often be challenging and difficult working environments.

Practical risk and security surveys are outlined along with how to scope and develop consultancy briefs, hazard and threat identification, Operational Requirements, the consultancy cycle, overviews of project management, an evaluation of tenders, legislation and compliance, construction regulations and how best to go about managing client relationships.

Paul Tennent is Managing Director at Tavcom Training

 

About the Author
Brian Sims BA (Hons) Hon FSyI, Editor, Risk UK (Pro-Activ Publications) Beginning his career in professional journalism at The Builder Group in March 1992, Brian was appointed Editor of Security Management Today in November 2000 having spent eight years in engineering journalism across two titles: Building Services Journal and Light & Lighting. In 2005, Brian received the BSIA Chairman’s Award for Promoting The Security Industry and, a year later, the Skills for Security Special Award for an Outstanding Contribution to the Security Business Sector. In 2008, Brian was The Security Institute’s nomination for the Association of Security Consultants’ highly prestigious Imbert Prize and, in 2013, was a nominated finalist for the Institute's George van Schalkwyk Award. An Honorary Fellow of The Security Institute, Brian serves as a Judge for the BSIA’s Security Personnel of the Year Awards and the Securitas Good Customer Award. Between 2008 and 2014, Brian pioneered the use of digital media across the security sector, including webinars and Audio Shows. Brian’s actively involved in 50-plus security groups on LinkedIn and hosts the popular Risk UK Twitter site. Brian is a frequent speaker on the conference circuit. He has organised and chaired conference programmes for both IFSEC International and ASIS International and has been published in the national media. Brian was appointed Editor of Risk UK at Pro-Activ Publications in July 2014 and as Editor of The Paper (Pro-Activ Publications' dedicated business newspaper for security professionals) in September 2015. Brian was appointed Editor of Risk Xtra at Pro-Activ Publications in May 2018.

Related Posts