Learn about proactive methodologies for risk mitigation & threat prevention
Principles of Proactive Security brings you into the classroom from wherever you are. It is internet-based, so that you can view and learn from this 3.5 hour webcast presentation on your desktop, laptop or iPad at your convenience and leisure. This webcast series is the perfect alternative for those unable to attend Chameleon in person training programs.
The Principles of Proactive Security class is presented by Amotz Brandes, Managing Partner of Chameleon Associates. He takes his students - and you - through an explanation of the nature of threat and how to defeat it. He explains how to build and maintain a proactive security system that is threat oriented and adversary based.
Course Learning Objectives
- Learn the nature of criminal and terrorist threats
- Learn the difference between proactive and passive security systems
- Learn about procedures and security system design that is geared towards deterrence and prevention
- Learn the threat assessment process
- Learn how to evaluate security from the adversary's point of view.
Via interactive classroom discussion and lecture, you will learn about:
- The differences between risk and threat-based security
- A security system that is proactive versus reactive
- Terrorism and Criminal Capabilities
- The Ann Marie Murphy case
- The use of Red Teaming as a quality assurance tool
- The criminal justice perspective in security
Using our classroom control panel, students can pause, stop, review or skip forward through the presentation and slides.
The Principles of Proactive Security webcast uses a variety of learning tools and resources that allow students/users to get a real feel for proactive security. These tools include:
- Interaction with a live audience.
- Detailed case studies.
- Interface allows easy navigation of material.
- Ability to take the course at your own pace.
- Print your own certificate of completion.
- A course survey.
Purchase and Pricing
|No. of Users
|Cost per User
Contact us if you would like to customize this course to your organization's specific needs. Here are some customization options that we can provide:
- Add or omit content to the course
- Brand the course to include your own logo, theme, color and design
- Add a forum were your students can discuss the topics
- Create your own links to specific information you want your students to know about
- High speed internet connection
- Web browser: We recommend using Firefox or Google Chrome.
- Speakers or earphones.
Here are some of the corporate and government clients that purchased an organizational license for this course:
COMMENTS FROM STUDENTS WHO HAVE TAKEN OUR COURSES:
"There was so much to learn that made this course very interesting."
"These courses are very useful esp. for our line of work , there is always something new about them to learn , you never know what you might encounter , anywhere not just the place of work . this goes for all the courses that we taking and looking forward in doing other courses . Thank you ."
"Making it a two part course was a good idea. Having access to the classroom participation was helpful."
"I believe that the information included in this course will assist me in performing my duties more effectively and be a great asset for explaining how to "think out of the traditional security concept model."
"Excellent course. The information in this course is very useful in my line of work. I also find this information useful as a security consultant."
"Excellent course, a lot of good information to put into practice."