Sergio RiveraObjective

Establish a group of basic knowledge for professionals and safety experts showing the essential elements required for planning and design of the perimeter security of a project. Through the review of basic concepts, methodologies and examples, it is intended to provide the tools and adequate criteria for an orderly and responsible for perimeter security planning.

The main objective of this program is to show how through proper integration of people, processes and equipment in a project, it is possible to improve the security perimeter of a site reducing false alarm rates and meet the overall objectives of physical security set.


Participants

This course is aimed at executives, technical managers, operations and sales, technicians and installers who are in daily contact with physical security projects that include perimeter security. It is recommended for people who have at least 6 months of experience in the security industry. Those with several years of experience in the field will find that the course is valuable, because it shows aspects and key concepts that are traditionally not considered and that offer an update on the current trends of perimeter security.

Duration

18 academic hours divided in two days.

Certificate and credential

This course delivers to pass the final exam, a certificate of ALAS. People who do not pass the exam receive a certificate of attendance. You can take the course again to retake the exam and become certified.

Course parts

The course contains 10 chapters:

Chapter 1: It presents a definition of physical security, perimeter security and location of the perimeter security within the framework of physical security.

Chapter 2: Covers basic concepts used in perimeter security related to the probability of detection of an alarm, false alarm rates and vulnerability to overcome a sensor.

Chapter 3This chapter shows a basic perimeter security system must include functions and their performance measures.

Chapter 4: Presents the suggested order for the design and evaluation of a perimeter security system.

Chapter 5
: A methodology for setting targets based on information the site to protect the existing threat and protect white is available.

Chapter 6: The general design criteria and technologies common today perimeter detection and various basic functions that complement them are studied.

Chapter 7: The analysis of an already protected site is carried out using a quantitative method, in order to determine the degree of security obtained, being able to modify parameters and key concepts in order to improve the quality of security.

Chapter 8: Covers basic concepts of risk analysis and management options existing risk.

Chapter 9: 5 case studies concerning projects of industrial and commercial type and where exemplify some of the technologies seen in 6 chapter are reviewed in detail.

Chapter 10: Course summary.

Methodology: Conference PowerPoint presentation, group discussions, practical work directed. active participation is requested. The trainee has full freedom to formulate questions relevant to the issues presented and is encouraged to share their ideas and experiences with the instructor and other participants.

About the instructor

Sergio Rivera García He has an experience of 10 years in the perimeter security field, having received training in perimeter sensors in Canada, the United States and Israel. Mr. Rivera has experience in planning the perimeter security of high-risk projects in most Latin American countries in projects that include airports, prisons, power generation / transmission plants, oil industry, mining industry , And ports. In addition, he has lectured and presented perimeter security and perimeter sensor technology at various international security events in Argentina, Brazil, Colombia, Chile, Mexico, Panama, Peru and Venezuela. Throughout his career Mr. Rivera has held managerial positions in the technical and commercial area in several firms dedicated to the development and manufacture of perimeter sensors.

Author: Latin Press

IN OTHER NEWS

article thumbnailSony The HAW-S series is the first NVR compatible Sony 4K device that can record and play in 4K resolution, for monitoring systems of ...
article thumbnailSeco-Larm The new multifunctional timer and counter SA-025MQ includes operation with low current consumption, seven modes easily ...
article thumbnailJohnson Controls The new 8.0 version of Kantech's EntraPass now adds support for the American Dynamics NVR network recorders through the app ...
article thumbnailST Electronics The AgilFence perimeter intrusion detection system developed for perimeter fences offers reliable detection and ...
article thumbnailAxis Communications The new AXIS Companion Dome Mini LE camera is designed to meet the needs of video surveillance in small businesses ....
article thumbnailU.S. For the first time in its history, the WINGS Summit will have online registration open to the public to visit the commercial exhibition and ...
article thumbnailInternational. Information technology (IT) managers are more likely to catch cybercriminals on servers and networks ...
article thumbnailU.S. Recent reports from Business Insider, CNN Business and many other publications have highlighted the undisclosed on-board microphone ...
article thumbnailInternational. ASIS International launched the Selection and Training Guide for Private Security Officers (PSO) of ASIS (ASIS PSO-2019) that ...
article thumbnailInternational. The World Wide Web Consortium (W3C) has just approved the web authentication API, also known as the WebAuthn standard, which is ...