• Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Call us Anton +62-813-8332-6388 (Phone/WA/Telegram)

antonsim@heilandsolutions.com
Rp 0
No products in the cart
Go to shop
Heiland Consulting & TrainingHeiland Consulting & Training
Heiland Consulting & TrainingHeiland Consulting & Training
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles
Awaiting product image

Security Management for Critical National Infrastructure (New)

Rp 9.000.000

Covering essential areas in security management at critical national infrastructure environment, and
based on the latest standards and regulations in the industry, this course will equip security
professionals to effectively manage security in critical national infrastructure environment.

Category: Uncategorized.
0
Share
  • Description
  • Reviews (0)

Security Management for Critical National Infrastructure (New) – 3 days

Covering essential areas in security management at critical national infrastructure environment, and
based on the latest standards and regulations in the industry, this course will equip security
professionals to effectively manage security in critical national infrastructure environment.
Who Should Attend
• Security director/manager in critical national infrastructure organizations
• Security specialist
Course Outline:
• Security Function Management
o Security in Indonesia’s context
o Proactive security
o Security management program
o Security Operation Procedures
o Security Awareness
o Baseline security standard
o Security plan
o Security alert and operating levels
• Security Risk Analysis
o Basics of security risk analysis
o Asset identification
o Threat assessment
o Likelihood assessment
o Impact assessment
o Determining the IRV
o Finding your Vulnerability
o Risk mitigation
o Risk register
o Calculating ROI
• Security Design and Survey
o Overview of Security Design
o Security design objectives
o Physical Protection Systems
o Situational Crime Prevention
o CPTED
o Adversary Path Modelling
• Physical Security
o About Perimeter
o Use of multiple fences
o Perimeter Intrusion Detection System
o Perimeter CCTV
o Perimeter Lighting
o Differences in Old and New Buildings
o Fundamentals of Building Protection
o Building Intrusion Detection System
o CCTV for Buildings
• Electronic Security System and Its Implementation
o Access management and automation
o Access Control Hardware
o Vehicle Control and Entry
o Visitor Management System
o Function of CCTV
o Active and Passive Surveillance
o CCTV Overview: cameras, lenses, transmissions, video management system, display,
storage
o Video analytics
• Counterterrorism and Militancy
o Terrorist Threat assessment
o Overview of Bomb attacks
o Marauding Terrorist Firearm Attacks
o Chemical, Biological and Radiological Terrorism
o CNI as one of terrorist target
o Protection principles: resilience, target hardening, detecting hostile reconnaissance
o Improvised Explosive Device (IED) and its Varieties
o Bomb Threats
o Searching for IED
o Actions on Discovery of IED
o Evacuation and Assembly
• Protection of Information
o Is Information an Asset?
o Information Classification
o Information Location
o The Bad Guys
o Threats
o Insider Threat
o Policy
o Awareness Training
o Protection Principles
o Data protection on Information Systems
o Overview of Technical Surveillance Counter Measure (TSCM)
o Incident Response and Investigation
• VIP Protection
o Duty of care
o At-risk personnel
o Risk identification
o Workplace violence
o Armed robbery
o Active Shooter
o Business Travel Security
o Expatriate Security
Investment: Contact Us

Reviews

There are no reviews yet.

Be the first to review “Security Management for Critical National Infrastructure (New)” Cancel reply

Your email address will not be published. Required fields are marked *

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

heilandsolutions

heilandsolutions

Contact Info

  • Anton Sim
  • +62 813 8332 6388/+62 811 805 434 (Call/WhatsApp/Telegram)
  • antonsim@heilandsolutions.com ask@heilandsolutions.com

© 2025 · www.heilandsolutions.com