Principles of Proactive Security


Principles of Proactive Security brings you into the classroom from wherever you are. It is internet-based, so that you can view and learn from this 3.5 hour webcast presentation on your desktop,laptop or Ipad at your convenience and leisure. This webcast series is the perfect alternative for those unable to attend Chameleon face to face training programs.

The Principles of Proactive Security class is presented by Amotz Brandes, Managing Partner of Chameleon Associates. He takes his students – and you – through an explanation of the nature of threat and how to defeat it. He explains how to build and maintain a proactive security system that is threat oriented and adversary based.

Principles of Proactive Securitydemo_school_security








The learning objectives of the course are:

  • Learn the nature of criminal and terrorist threats
  • Learn the difference between proactive and passive security systems
  • Learn about procedures and security system design that is geared towards deterrence and prevention
  • Learn the threat assessment process
  • Learn how to evaluate security from the adversary’s point of view.

    Through interactive classroom discussion and lecture, you will learn about:

  • The differences between risk and threat-based security
  • A security system that is proactive versus reactive
  • Terrorism and Criminal Capabilities
  • The Ann Marie Murphy case
  • The use of Red Teaming as a quality assurance tool
  • The criminal justice perspective in security
  • Using our classroom control panel, students can pause, stop, review or skip forward through the presentation and slides.

    User Features

    The Principles of Proactive Security webcast uses a variety of learning tools and resources that allow students/users to get a real feel for proactive security. These tools include:

  • Interaction with a live audience (screenshot)
  • Detailed case studies (screenshot)
  • Interface allows students to easily navigate the material (screenshot)
  • Ability to take the course at your own pace
  • Print your own certificate of completion (screenshot)
  • A course survey (screenshot)

    # of Users

    Per User Cost

    Course Expires After

    User Tracking & Management



    30 days




    6 months

    Contact Us

    Or Call (888) 343-4100



    6 months

    Contact Us

    Or Call (888) 343-4100

    51- 100


    6 months

    Contact Us

    Or Call (888) 343-4100

    101 and more


    6 months

    Contact Us

    Or Call (888) 343-4100


    Customization Options

    Contact us if you would like to customize this course to your organization’s specific needs. Here are some customization options that we can provide:

  • Add or omit content to the course
  • Brand the course to include your own logo, theme, color and design
  • Add a forum were your students can discuss the topics
  • Create your own links to specific information you want your students to know about
  • System Requirements

  • High speed internet connection
  • Web browser: We recommend using Firefox and Google Chrome. IE8 and IE7 work well but IE9 has problems recording test results onto the LMS
  • This online course will also play on an Ipad using the “Articulate Mobile Player” app which is available at the AppStore
  • Speakers or earphones
  • Comments by trainees who went through the course

    I believe that the information included in this course will assist me in performing my duties more effectively and be a great asset for explaining how to “think out of the traditional security concept model”.

    Excellent course. The information in this course is very useful in my line of work. I also find this information useful as a security consultant.

    Excellent course, a lot of good information to put into practice.