• Classroom
  • Online, Instructor-Led
Course Description

This course addresses administration of a security plan within the context of daily operations. Students learn practices and methods of determining adequacy of security management programs, as well as examine the relationship between security functions and managers' responsibilities. The processes of interagency cooperation and establishment of industry standards are also included. In addition, the course addresses contemporary issues in security such as substance abuse, violence, theft, biochemical threats, terrorism and countersecurity measures.

Learning Objectives

  • Given that the administration of comprehensive security plans includes risk analysis, long-term projections, assessment of the threats, resource planning, and organization mission adherence, develop the necessary management procedures for optimal use of resources in each mission-critical activity.
  • Given that the successful execution of an enterprise security administration policy is dependent upon federal, local, and municipal inter-agency cooperation and relationship management, determine the proper functional mix of industry standard adherence and security-team development in terms of the legal and certification standards necessary to evaluate operational policies.
  • Given the increasing company liability associated with Employee Assistance Plan (EAP) policies and the management of human resources, develop policies and programs to meet the human needs of a comprehensive security plan.
  • Given that the increasing cost of and dependence on technology has driven up the cost of daily operations and increased the exposure of corporate assets to internal and external attack, develop the necessary product development mix of human and technological assets for creating and managing emergent events that may have catastrophic results.
  • Given the potential for information compromise resulting from a security breach, develop an infrastructure to minimize the effects of corporate, domestic, or international terrorism damage to corporate assets.
  • Given the high profile nature of the international business community, quantify and qualify the risk climate associated with external and internal risks of operational compromise.
  • Document the procedures necessary for the building of an internal staff capable of directing resources, constructively evaluating the need for outsourcing of training, and determining whether the security measures available are sufficient to address and mitigate any disruptions in the operational business environment.

Framework Connections