You may choose from any of the courses listed below:
In this class, you will:
- Describe the Scope of Risk for International Economic Espionage or Theft for Critical Infrastructure targets
- Identify common strategies used for International Economic Espionage of IP
- Identify the primary global actors who conduct IP Economic Espionage or Theft
- Describe the Strategies for effectively protecting critical infrastructure information from International Economic Espionage within a physical or cyber environment
- Understand the Pre-incident Indicators of International Economic Espionage or Theft from Insider Threats
- Understand what steps to take if your organization is being targeted for International Economic Espionage or Theft
In this course, you will:
- Understand what is the Insider Threat, and how/why it most commonly develops as a risk to Critical Infrastructure
- Understand the vital role of HR, Legal, Compliance, Ethics, Finance, IT, HSE, and Corporate Communications in developing Insider threat prevention plans and describe effective strategies for creating task forces for addressing Insider threats
- Describe the most effective security management strategies for protecting against the Insider Threat
- Understanding the most common reasons why Insider Threats are not detected, but instead grow and flourish within Critical Infrastructure
- Be able to describe when pre-event indicators of an emerging Insider Threat are most detectable (visible), and how to interrupt an evolving threat
- Understand how to develop and implement an Insider Threat security awareness strategy to detect, deter and neutralize the risk
- Create a quantifiable competitive advantage for workforce recruitment and retention through Insider Threat protection programs
In this course, you will:
- Understand the scope of cyber - physical security overlap and duplication at critical infrastructure sites and what options are available for organizational convergence
- Be familiar with how cyber security hardware, software, and processes can be employed to achieve security management outcomes like those used by physical security, including "Establishing Cyber Perimeter & Access Control Security"
- Create Cyber Information Protection Similar to Hard-copy Physical Protection
- Discuss Emergency Response to Cyber-Physical Threats or Events
- Detail a Forensic Response Process for Cyber & Physical Events
- Implement Concentric Rings of Integrated Cyber-Physical Security Strategies
- Integrate Cyber Security with Physical Security Operations and vice versa
- Align Cyber Security and Physical Security Awareness Training
- Integrate Cyber & Physical Security Vulnerability Assessments with Risk Analysis
In this course, you will:
- Use the Crisis Management and Resilience Process as a Strategic Tool for Protecting Critical Infrastructure Operations.
In this course, you will:
- Understand the operational benefits of using security drones and robots for patrols, access control, vehicle inspections, and incident response
- Be able to describe the regulatory requirements relating to security drones and robots, and understand how employ drones / robots autonomously and using piloted systems
- Be able to describe the current technology limitations and deficiencies to using security drones and robots for security operations
- Understand the interaction and partnership needed with IT to operate security drones and robots
- Be able to develop a business case for the value of employing security drones and/or security robots including the ROI and IRR and the impact they have upon recordable injuries and flow through profitability of critical infrastructure
- Be able to describe the multi-functional value of security drones / robots for emergency management and maintenance as well as security