Establish a group of basic knowledge for professionals and safety experts showing the essential elements required for planning and design of the perimeter security of a project. Through the review of basic concepts, methodologies and examples, it is intended to provide the tools and adequate criteria for an orderly and responsible for perimeter security planning.
The main objective of this program is to show how through proper integration of people, processes and equipment in a project, it is possible to improve the security perimeter of a site reducing false alarm rates and meet the overall objectives of physical security set.
This course is aimed at executives, technical managers, operations and sales, technicians and installers who are in daily contact with physical security projects that include perimeter security. It is recommended for people who have at least 6 months of experience in the security industry. Those with several years of experience in the field will find that the course is valuable, because it shows aspects and key concepts that are traditionally not considered and that offer an update on the current trends of perimeter security.
18 academic hours divided in two days.
Certificate and credential
This course delivers to pass the final exam, a certificate of ALAS. People who do not pass the exam receive a certificate of attendance. You can take the course again to retake the exam and become certified.
The course contains 10 chapters:
Chapter 1: It presents a definition of physical security, perimeter security and location of the perimeter security within the framework of physical security.
Chapter 2: Covers basic concepts used in perimeter security related to the probability of detection of an alarm, false alarm rates and vulnerability to overcome a sensor.
Chapter 3This chapter shows a basic perimeter security system must include functions and their performance measures.
Chapter 4: Presents the suggested order for the design and evaluation of a perimeter security system.
Chapter 5: A methodology for setting targets based on information the site to protect the existing threat and protect white is available.
Chapter 6: The general design criteria and technologies common today perimeter detection and various basic functions that complement them are studied.
Chapter 7: The analysis of an already protected site is carried out using a quantitative method, in order to determine the degree of security obtained, being able to modify parameters and key concepts in order to improve the quality of security.
Chapter 8: Covers basic concepts of risk analysis and management options existing risk.
Chapter 9: 5 case studies concerning projects of industrial and commercial type and where exemplify some of the technologies seen in 6 chapter are reviewed in detail.
Chapter 10: Course summary.
Methodology: Conference PowerPoint presentation, group discussions, practical work directed. active participation is requested. The trainee has full freedom to formulate questions relevant to the issues presented and is encouraged to share their ideas and experiences with the instructor and other participants.
About the instructor
Sergio Rivera García He has an experience of 10 years in the perimeter security field, having received training in perimeter sensors in Canada, the United States and Israel. Mr. Rivera has experience in planning the perimeter security of high-risk projects in most Latin American countries in projects that include airports, prisons, power generation / transmission plants, oil industry, mining industry , And ports. In addition, he has lectured and presented perimeter security and perimeter sensor technology at various international security events in Argentina, Brazil, Colombia, Chile, Mexico, Panama, Peru and Venezuela. Throughout his career Mr. Rivera has held managerial positions in the technical and commercial area in several firms dedicated to the development and manufacture of perimeter sensors.