Sergio RiveraAim

Establish a group of basic knowledge for professionals and safety experts showing the essential elements required for planning and design of the perimeter security of a project. Through the review of basic concepts, methodologies and examples, it is intended to provide the tools and adequate criteria for an orderly and responsible for perimeter security planning.

The main objective of this program is to show how through proper integration of people, processes and equipment in a project, it is possible to improve the security perimeter of a site reducing false alarm rates and meet the overall objectives of physical security set.


This course is aimed at managers, technical managers, sales and operations, technicians and installers who are in daily contact with physical security projects including perimeter security. It is recommended for people who have at least 6 months of experience in the security industry. Those with several years of experience in the field will find that the course is valuable because it shows aspects and key concepts that are not traditionally considered and provide an update on current trends perimeter security.


18 academic hours divided in two days.

Certificate and credential

This course delivers to pass the final exam, a certificate of ALAS. People who do not pass the exam receive a certificate of attendance. You can take the course again to retake the exam and become certified.

Course parts

The course contains 10 chapters:

Chapter 1: It presents a definition of physical security, perimeter security and location of the perimeter security within the framework of physical security.

Chapter 2: Covers basic concepts used in perimeter security related to the probability of detection of an alarm, false alarm rates and vulnerability to overcome a sensor.

Chapter 3This chapter shows a basic perimeter security system must include functions and their performance measures.

Chapter 4: Presents the suggested order for the design and evaluation of a perimeter security system.

Chapter 5
: A methodology for setting targets based on information the site to protect the existing threat and protect white is available.

Chapter 6: The general design criteria and technologies common today perimeter detection and various basic functions that complement them are studied.

Chapter 7: The analysis of an already protected site is carried out using a quantitative method, in order to determine the degree of security obtained, being able to modify parameters and key concepts in order to improve the quality of security.

Chapter 8: Covers basic concepts of risk analysis and management options existing risk.

Chapter 9: 5 case studies concerning projects of industrial and commercial type and where exemplify some of the technologies seen in 6 chapter are reviewed in detail.

Chapter 10: Course summary.

Methodology: Conference PowerPoint presentation, group discussions, practical work directed. active participation is requested. The trainee has full freedom to formulate questions relevant to the issues presented and is encouraged to share their ideas and experiences with the instructor and other participants.

About the instructor

Sergio Rivera García He has an experience of 10 years in the perimeter security field, having received training in perimeter sensors in Canada, the United States and Israel. Mr. Rivera has experience in planning the perimeter security of high-risk projects in most Latin American countries in projects that include airports, prisons, power generation / transmission plants, oil industry, mining industry , And ports. In addition, he has lectured and presented perimeter security and perimeter sensor technology at various international security events in Argentina, Brazil, Colombia, Chile, Mexico, Panama, Peru and Venezuela. Throughout his career Mr. Rivera has held managerial positions in the technical and commercial area in several firms dedicated to the development and manufacture of perimeter sensors.


Author: Latin Press


article thumbnailLatin America. Power over Ethernet (PoE) is one of the most "worrisome" applications for IT managers today, and therefore, ...
article thumbnailInternational. The Vodafone telephone company has joined Huawei and Top Digital to market an intelligent lock. This new ...
article thumbnailLatin America.For the monitoring center to grow in accounts, find new clients and close better businesses it must have a ...
article thumbnailTopic: Modern LAN: Ethernet and long-range PoE solutions. By: Antonio Pérez, Sales Director for Latin America and the Caribbean - NVT...
article thumbnailDahua Dahua launched the new outdoor station for apartments VTO9341D, which offers new access control solutions for fences and entrances ...
article thumbnailMilestone The new hardware platforms Milestone Husky X2 and X8 now allow to design video solutions for large companies using the ...
article thumbnailPlatinum Tools The Platinum Tools Keystone Cat6A shielded connector line is designed for quick and easy finishing without tools ...
article thumbnailTopic: Specialized access control solutions in the corporate sector. By: Alan Castañeda, Latin America and Caribbean Training Manager of ...
article thumbnailEE. UU Latin Press Inc. and ALAS (Latin American Security Association) have officially concluded negotiations for Latin Press to organize ...
article thumbnailColombia. Globant published its Business Guide on IA 2018 - an orientation manual for organizations that are considering investing in AI, which ...