Your browser is not supported. Please download Mozilla Firefox or Google Chrome browser.

: 0 items
Cart Total
Filters Applied
  • Category: Security
Reset All

Crowd Management Course

Crowd control is a public security practice where large crowds are managed to prevent the outbreak of crowd crushes, affray, fights involving drunk and disorderly people or riots. Crowd crushes in particular can cause many hundreds of fatalities.[1] Crowd control can involve privately hired security guards as well as police officers. Crowd control is often used at large, public gatherings like street fairs, music festivals, stadiums and public demonstrations. At some events, security guards and police use metal detectors and sniffer dogs to prevent weapons and drugs being brought into a venue.

Visited 387 times

Advanced Vehicle Search Course

This program will cover proper procedures in conducting an accurate and effective vehicle search.   Material will cover what to look for, as well as where to look on and in the vehicle. The procedures will also inform the security officer of what steps to follow if a suspicious package or item is discovered.

Visited 110 times

Access to Medical Records Course

1910.1020(a) -The purpose of this course is to explain to employees and their designated representatives a right of access to relevant exposure and medical records; and to provide representatives of the Assistant Secretary a right of access to these records in order to fulfill responsibilities under the Occupational Safety and Health Act.

Visited 82 times

18 Wheel Inspection Course

Accidents involving 18-wheelers and buses often have very tragic consequences.  Considering the size, speed, and cargo of these vehicles, accidents and security involving large commercial motor vehicles and buses involve forces that oftentimes lead others involved in these accidents to be seriously injured or killed.

Visited 88 times

Conflict Resolutions Course

Conflict resolution, otherwise known as reconciliation, is conceptualized as the methods and processes involved in facilitating the peaceful ending of conflict and retribution. Committed group members attempt to resolve group conflicts by actively communicating information about their conflicting motives or ideologies to the rest of the group (e.g., intentions; reasons for holding certain beliefs), and by engaging in collective negotiation.

Visited 96 times

Active Shooter Awareness Course

An Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area; in most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.

Visited 146 times

Disaster Management Course

Disaster management (or emergency management) is the creation of plans through which communities reduce vulnerability to hazards and cope with disasters.[1][2] Disaster management does not avert or eliminate the threats; instead, it focuses on creating plans to decrease the effect of disasters. Failure to create a plan could lead to human mortality, lost revenue, and damage to assets. Currently in the United States 60 percent of businesses do not have emergency management plans. Events covered by disaster management include acts of terrorism, industrial sabotage, fire, natural disasters (such as earthquakes, hurricanes, etc.), public disorder, industrial accidents, and communication failures.

Visited 259 times

Back Safety Course

Back injuries are major safety hazards at the workplace. Bureau of Labor Statistics (BLS) shows that more than one million workers suffer back injuries each year. 75% of these occurred while the employee was lifting. Using proper lifting techniques can help prevent downtime due to avoidable back injuries. Though, no approach will completely eliminate back injuries, a substantial portion can be prevented by incorporating effective administrative controls and engineering controls. Training employees to utilize lifting techniques that place minimum stress on the lower back can go a long way in reducing the back injury incidents.

Visited 87 times

Driving Safety Course

When you’re behind the wheel of a car – whether alone or with passengers – driving safely should always be your top concern. We’re more distracted than ever, so it’s crucial to know the basics of safe driving and practice them every time you’re on the road.

Visited 85 times

Bloodborne Pathogens Course

Bloodborne pathogens are infectious microorganisms in human blood that can cause disease in humans. In order to reduce or eliminate the hazards of occupational exposure to bloodborne pathogens, an employer must implement an exposure control plan for the worksite with details on employee protection measures. The plan must also describe how an employer will use engineering and work practice controls, personal protective clothing and equipment, employee training, medical surveillance, hepatitis B vaccinations, and other provisions as required by OSHA's Bloodborne Pathogens Standard (29 CFR 1910.1030). Engineering controls are the primary means of eliminating or minimizing employee exposure and include the use of safer medical devices, such as needleless devices, shielded needle devices, and plastic capillary tubes.

Visited 99 times

Circumventing Security Measures Course

When a terrorist or criminal is going to target a facility, they are not going to walk up to the gate office or gangway of a ship and ask to come onboard to commit a heinous crime.   Terrorists are intent on causing massive causalities and as much damage as they can.   They will not want to get caught before they get to their main objective.

Visited 97 times

Facility Security Plan Course

This facility security plan describes the methods, procedures and measures to be used by a company in order to establish security measures and prevent loss, damage or  compromise of assets and interruption to business activities.

Visited 82 times

Healthcare Facilities Part 2 Course

Consider the variety of people who make up the typical hospital or clinic environment: patients, terminated employees, current employees. Vulnerability in the operation of the healthcare industry includes drugs, bio-hazardous waste, bomb threats, fire, etc. No healthcare facility is without risk.  A well trained security force is an asset to the organization and serves as a compliment to the management team.

Visited 70 times

Identifying Security Threats and Patterns Course

The need for careful security planning is clearly the most critical in prevention, being prepared and quick response.  Since we are faced with the likelihood of intentionally caused events, which threatens the society as a whole, the need for security planning is essential.   Effective security planning begins with, and continually considers, risk as a means to guide actions and make effective use of resources.   We must be careful to recognize that, while the visible trappings of physical security may portray an illusion of safety,  a careful analysis of the lesser-known elements of vulnerability, consequence, and threat are arguably more important if we are going to achieve a truly secure environment.

Visited 111 times

Security Screening Course

Identification Procedures for Personnel screening All persons entering a facility should possess and show a valid photo I.D. card to gain facility access. Individuals arriving by motorcycle should remove helmets to assist in identification. Security personnel or competent authority should verify that I.D. card matches the person presen<ng it.

Visited 84 times

TWIC Card Training Course

TWIC is a common idenfication credential for all personnel requiring unescorted access to secure areas of MTSA (Maritime Transportation Security Act), regulated facilities and vessels, and all mariners holding Coast Guard issued credentials.

Visited 480 times