SlideShare a Scribd company logo
1 of 8
Download to read offline
The 3 Days intensive training both exercising theoretical and practical approaches in crime prevention leads
both crime and security professionals to finally be recognised with the designation of Certified Crime Prevention
Specialist (CCPS), a credential to their professional standings accredited by the Chartered International Institute
of Security and Crisis Management (CIISCM).
Upon successful completion of the training and passing the examination, the Board of Advisors of CIISCM, with
the powers vested, issues the CCPS certification (for example Derick Ding, CCPS) to the participant. CIISCM,
acknowledges the success by including the CCPS into the data base of CIISCM and displayed on the website
listing for verification and authentication as well as provided with a confirmation to the superiors of the
participant.
The years of experiences which security professionals have acquired and gained throughout their career gets an
academic orientation through the learning modules and practical exercises in this comprehensive and
methodological training. To aspirants who are in their midst of in the security profession will get an in-depth
understanding into the realms of crime prevention generics and fundamentals which will enhance their security
management proficiencies. The CCPS program exhibits excellent security standards infused by latest security
thought processes and proven expertise for assimilating into their organizations.
The program exposes the security professionals to not only detect crime and criminal intent but allows them the
opportunity to acquire excellent mitigating processes to prevent crime before it occurs. The content of the
training cuts across businesses from manufacturing, logistics, transportation, service industries to hotels, malls
and complexes and sensitive establishments. The concept of CPTED and business crimes receives special
attention in the training.
The anticipation, recognition and appraisal of a crime risk and the initiation of specific actions to remove or
reduce crime is the primary priority of the program. With budgetary constraints, management pressure and a
varied demographic of employees, suppliers and customers, the principles and skills associated with crime
prevention have taken a unique dimension of importance never before experienced and never more important
than they are today. Versatility, flexibility, adaptability and adoptability are what the specialist is going to acquire
and attain in this training and redefine the way they are going to skilfully handle crime prevention.
The Certified Crime Prevention Specialist will be exposed to latest crime assessment and audit processes and
techniques which can be customised and improvised accordingly to be implemented at their organizations for
management of crime prevention strategies, processes and procedures. The culture of working in cohesion and
collaboration with and among other departments and personnel and as well as law enforcement agencies in
crime prevention initiatives strategized for both public and private businesses in diverse settings demands
transferable action for the real world experience.
In summary the CCPS recognises that crime prevention is a pattern of attitudes and behaviors directed at
reducing the threat of crime and enhancing the sense of safety and security, to positively influence the quality of
life in our society, and to develop environments where crime cannot flourish, must be eradicated if not reduced. It
needs an action now and before it is too late let us turn more of us into Crime Prevention Specialist.
SYNOPSIS
OF THE PROGRAM
The curriculum has undergone a notch up in the areas of specialization wherein aspects of criminal
investigations, suspicious behaviour assessment, criminal profiling, document fraud, terrorism, political violence,
security best known practises and best known methods, persons of interest (surveillance), internet by criminals
and terrorist as well as new technologies in OSINT –SOCMINT approaches have been included. These modules
are new to the syllabus. The areas of concentration are now becoming a niche and norm among security
professionals.
Practitioners of crime prevention are expected to have a greater in-depth grasp of these competencies and
expertise. CIISCM Board being mindful of the evolution and challenges in crime prevention has included these
perspectives into the CCPS curriculum. The fundamental and generics of crime prevention application of
cameras, access controls, security personnel and security standards and certification are also given equal
emphasis in the course content.
MODULES
OF THE PROGRAM
WHAT IS CRIME PREVENTION
This introduction outlines the traditional definitions to crime prevention and the evolution of crime prevention
principles. Concepts associated and progress towards loss prevention is discussed. Crime prevention
challenges and mitigation, intention and management is debated. The perspective concludes with business
risk as a focal point and achieving the balance between business demands and security foresights.
CRIMINAL INVESTIGATIONS OVERVIEW
This module unveils the essence of criminal investigations and outlays the engagement of community with
law enforcement and the necessary facilitation of personal communications in combating the criminal threats.
The intelligence spectrum and preliminary investigation sets the stage for efficient criminal investigations and
assessment. Managing the information leading to a case is paramount and vital in a thorough handling of
criminal investigation. An overview of crime scene evaluation, management and preservation is discussed.
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED)
Definition, components and introduction to CPTED, the Principles & Generics of CPTED as well as CPTED
Theories and Designs (External & Internal of Premises) is well defined in this section. Integrating CPTED
Strategies towards target hardening in Organizational Security Plans at Commercial/Retail Facilities, Hotels,
Factories, Logistics Facilities and Government Establishments are cited. Crime Triangle and effective
combination of operational, technological and architectural security towards efficiency in crime prevention is
discussed.
SUSPICIOUS BEHAVIOURAL ASSESSMENT – PROFILING
The participants will be introduced to the Importance of Observation and of Element of Choices. Hostile
Environment - F.A.C.E. Tactics, Body Language in Behavioural Assessment will be discussed. Structure of
an Investigative Interview and what “Trueness” means will be defined. Security - Investigative Questioning
will be debated. The section concludes with EL AL Israel’s National Airlines - Brief Case Study and Support
Videos –Checkpoints
CLASS EXERCISE: Suspicious Behaviour Assessment
The participants will engage into the behaviour assessment techniques, management
processes and effective principles of suspicious investigations. The exercise will culminate
with sharing of different opinions and experiences from the participants. The trainer will
conclude on the methods and approaches discussed and cite a discussion on Loss
Prevention Investigation - (Hospitality environment)
CLASS EXERCISE: An Analysis of Interview Techniques and Approaches
The participants are given a perspective towards a scenario involving interviews to solicit
information. The approach, types of questions, techniques and methodology is discussed.
The trainer will run the sequence and chronology of events and content. The participants
engage in a “Live” Interview of a person informed of facts. The session ends with a
discussion on the
MODULES
OF THE PROGRAM
DOCUMENT FRAUD
The prevalent crime of document fraud is the focus in this section. It starts with an overview of the
phenomenon and leads on to use of fake documents by criminals and terrorists. Counterfeit, forged and
stolen blanks which are fraudulently obtained is discussed. Pseudo documents and imposters is given
attention. The trainer gives an insight into INTERPOL International Stolen Lost Travel Document Database,
EU Prado and Edison Travel Document Databases.
CLASS EXERCISE: Recognition, Identification and Detection (RID) 		
The participants are indulged into a brief practical demonstration exercise. The debate on
genuine and imposter Identification is put into practise. The presentation gives a vivid show of
how travel documents are forged and “doctored” with the use of internet technology.
INTRODUCTION TO TERRORISM AND POLITICAL VIOLENCE
Crime prevention today is not complete without the inclusion of the challenges and threats associated with
terror, terrorist and terrorism. This section dwells into what terrorism is and the concept and relations to
crime. Typology of Terrorism and Consequence onto preferred targets with links between Terrorism and
Organized Crime is given focus. Terrorism Attack Tactics is viewed from a criminal tactical approach and
juxtaposed against terrorism norms, influences and operations
SECURITY AUDITS & ASSESSMENTS
Concentric Circles of Protection & Security Layering Audits and/or Assessments - Components Security
Audits of Manufacturing Facilities, Warehouses, Security Audits and Assessments of Hotels, Hospitals,
Schools. Campuses Security Audits and assessments of Commercial/Retail Security Outlets.
SECURITY BEST KNOW PRACTISES & METHODS
The trainer will indulge in the knowledge of best practices required in Truck, Trucking & Transportation
Security, Warehousing & Logistics Security, Air Terminals & Maritime Security and the Service Industry. Best
known practices (BKP) & BKM featured in warehousing, logistics and manufacturing environment will be
discussed in this session.
PERSON OF INTEREST [POI] SURVEILLANCE (Open Air Exe)
The basics of covert surveillance, the generics and fundamentals involved in the execution
of POI surveillance will be given and in-depth understanding. The participants will be divided
into groups so as to manage a Time, Environment, Execution and Strategy during an actual
surveillance practice.
MODULES
OF THE PROGRAM
TEAM EXERCISE: External Surveillance
Upon obtaining clarification on the chronology of POI external surveillance attributes, the
participants will be put into a practical exercise. The teams will spend 1-1.5 hours onto
surveillance of a POI and gather evidence to support their findings towards establishing facts
about the objective and mission of the surveillance. The session will conclude with a report
and presentation of the groups findings from the external surveillance exercise executed.
EMPLOYEE CRIME PREVENTION
A lethal threat today is that which is within our organisation. The trainer will unveil the intricacies and
complexities of threat from the within and external. Human Resources and Security cohesive collaboration
plays an important role. Employment process, Authentication, Verification, Background checks and
Screenings will be discussed. A regular monitoring of the employee’s work and behaviour is crucial in
retaining security. The session will conclude with precise information towards security and safety of
employees involved in travel for and on behalf of their organisation.
PERSPECTIVES ON THE USE OF INTERNET AND IT FOR CRIMINAL
AND SECURITY ACTORS
Criminals and terrorist have begun using the Internet as a mode of communication given that it’s accessible
to anyone everywhere. On the brighter side, it has opened up a new modes of monitoring for law
enforcement agencies. New technological approaches have been developed for security enhancement. The
trainer will dive in to the foundations of OSINT – SOCMINT.
CLASS EXERCISE: Online & Social Media
The session will follow with an exercise of basic online searchers and live online
investigations. A practical overview will be carried out on two major media platforms. The
trainer will share various platforms and avenues on the internet (available freely) for the
participants to partake towards engaging in OSINT & SOCMINT
TRAINERS
OF THE PROGRAM
MR. Tony Ridley
Tony is a career security professional. For the past 17 years Tony
has worked commercially around the globe at various senior and ex-
ecutive levels. His prior 13 years were spent within military, primarily
with Special Forces.
During his commercial career, Tony has developed, delivered and
reviewed numerous security, operations, safety and crisis manage-
ment courses. He remains a constant contributor to industry forums,
routinely speaks at international forums and has mentored many up
and coming security specialists and professionals.
Having worked for a number of years in Indonesia, at both project
and corporate levels, he has a unique viewpoint and experience
relevant to Indonesia. Overseeing as many as 3,500 personnel,
deployed across over 40 individual projects, he can communicate
effectively in Bahasa Indonesian and relates with Indonesians at all
levels.
TRAINERS
OF THE PROGRAM
DRS. DARLY SIREGAR ICPS, CATS, CCPS
Drs. Darly Segar is the present Director of PT. First Security Services in Indone-
sia who is responsible for overseeing its entire operations. First Security Servic-
es, as its President Director. The business product focuses on Integrated Security
and he believes in power of strength, system and implementation. PT. First Secu-
rity Services is highly affiliated with all governmental institutions in Indonesia.
Drs. Darly is accomplished with a Degree in Business Administration and holds
many certifications among them are Certified Crime Prevention Specialist
(CCPS), Certified Anti Terrorism Specialist (CATS), ISO 14001:2004 - Manage-
ment Integrated of Security Services, OHSAS 18001:2007 Management Integrat-
ed of Security Services and ISO 9001:2008 Management Integrated of Security
Services
Prior to joining PT. First Security Services, he spent over 10 years of his career
in the hospitality industry where he primarily worked in the security sector. He
held the position and responsibility of setting up security systems, fire & safety
training programs, loss prevention standards and was in-charge of guest security.
This equipped him with the skill set of an all rounded security professional that is
extremely well versed in the field.
Drs. Darly has also been an active part of several multi-national projects including
oil and gas. In his capacity of Director of Operations, he provided strategical and
operational leadership to his team while building a complete consultancy firm.
He is fluent in English and Bahasa Indonesia. He spends his free time being an
active member at the Harley Davidson Club in Indonesia (HDCI)
REGISTRATION
OF THE PROGRAM
Fee Includes:
- 3 days luncheons, and refreshments
- Examination
- CCPS Training manual
Indonesia, Jakarta 18 - 20 Dec 2017
IDR 13,000,000
Training Dates & Fee
MR. MUNIESWERAN VEERIAH
MCiiSCM, CATS, CCPS
Muniesweran has well over 35 years of experience with the
government and multi-national companies both regionally and
worldwide. He exemplifies with an outstanding array of professional
experience, knowledge and competencies, which saw him leading the
entities he worked with achieving international accolades. The global
exposure of holding senior management positions in different
continents worldwide, particularly with regional attachments in
Germany, Africa, Middle East, South East Asia and North Asia has seen
to the business acumen and management business excellence in
Munies. He brings in-depth experience in the Operations, Human
Capital and Management perspectives of manufacturing, trading,
transportation, shipping and logistics entities worldwide in the names of
Elcon GmbH, Isorast Afica, Dubai Diamonds, Flextronics, Sky
Schreiber International, DHL and Motorola.
For Enquiries, Please Contact
PT. FIRST SECURITY SERVICES INDONESIA
Contact Person:
Global E2C Pte Ltd
1 Gateway Drive, Westgate Tower #07-01, Singapore 608531
Tel: (65) 6514 9646 Email: Sales@GlobalE2C.com.sg
Ms. Alia
Email: bdv.exe1@fsi.id
Tel: (62) 8119702715
Ms. Revita
Email: bdv.exe2@fsi.id
Tel: (62) 8119702716
Ms. Linka Angelia
Email: bdv.exe3@fsi.id
Tel: (62) 8119702714
Ms. Anggia
Email: pa@fsi.id
Tel: (62) 21 83783053
- CCPS Challenge Coin
- CCPS Polo Shirt
- CCPS Collar Pin
- CCPS Embroidery Badge
- CIISCM Certified Certificate
- CIISCM Subscriber Membership
Venue			 : Hotel Ashley, JI. KH. Wahid Hasyim No. 73-75,
	 		 Jakarta Pusat (10250), Indonesia.
Training Time		 : 0900 hrs - 1700 hrs
Payment Transfer to	 : PT. First Security Services Indonesia
Bank Account No	 : 478 300 2305 (Cabang Wahid Hasyim)
Last Payment		 : 2 weeks before the date
Indonesia, Jakarta 12 - 14 Feb 2018
3-Day CCPS Training Certifies Crime Prevention Specialists

More Related Content

Similar to 3-Day CCPS Training Certifies Crime Prevention Specialists

SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestCyber Security Academy
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...Jacqueline Fick
 
8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptx8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptxHandmade Rugs and Carpet Store
 
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docxAlarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docxvoltronoperations
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018FERMA
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...AmeliaJonas2
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Community Protection Forum
 
OSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementOSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementAmitabh Sen Gupta
 
The Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdfThe Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdfSWC Security
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
 
Upgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsUpgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsIntellect Design Arena Ltd
 
Cybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating ThreatsCybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating Threatspriyanka rajput
 

Similar to 3-Day CCPS Training Certifies Crime Prevention Specialists (20)

SOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | BestSOC Analyst Training In Hyderabad | Best
SOC Analyst Training In Hyderabad | Best
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptx8 Strategies for Top-notch Event Security Response.pptx
8 Strategies for Top-notch Event Security Response.pptx
 
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docxAlarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
Ferma perspectives #2 - Cyber Risk Governance 09.10.2018
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
 
OSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence ManagementOSSIM-School of Security and Intelligence Management
OSSIM-School of Security and Intelligence Management
 
The Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdfThe Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdf
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
Upgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking ApplicationsUpgrade Your Banking Experience with Advanced Core Banking Applications
Upgrade Your Banking Experience with Advanced Core Banking Applications
 
Cybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating ThreatsCybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating Threats
 

More from Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Recently uploaded (20)

9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

3-Day CCPS Training Certifies Crime Prevention Specialists

  • 1.
  • 2. The 3 Days intensive training both exercising theoretical and practical approaches in crime prevention leads both crime and security professionals to finally be recognised with the designation of Certified Crime Prevention Specialist (CCPS), a credential to their professional standings accredited by the Chartered International Institute of Security and Crisis Management (CIISCM). Upon successful completion of the training and passing the examination, the Board of Advisors of CIISCM, with the powers vested, issues the CCPS certification (for example Derick Ding, CCPS) to the participant. CIISCM, acknowledges the success by including the CCPS into the data base of CIISCM and displayed on the website listing for verification and authentication as well as provided with a confirmation to the superiors of the participant. The years of experiences which security professionals have acquired and gained throughout their career gets an academic orientation through the learning modules and practical exercises in this comprehensive and methodological training. To aspirants who are in their midst of in the security profession will get an in-depth understanding into the realms of crime prevention generics and fundamentals which will enhance their security management proficiencies. The CCPS program exhibits excellent security standards infused by latest security thought processes and proven expertise for assimilating into their organizations. The program exposes the security professionals to not only detect crime and criminal intent but allows them the opportunity to acquire excellent mitigating processes to prevent crime before it occurs. The content of the training cuts across businesses from manufacturing, logistics, transportation, service industries to hotels, malls and complexes and sensitive establishments. The concept of CPTED and business crimes receives special attention in the training. The anticipation, recognition and appraisal of a crime risk and the initiation of specific actions to remove or reduce crime is the primary priority of the program. With budgetary constraints, management pressure and a varied demographic of employees, suppliers and customers, the principles and skills associated with crime prevention have taken a unique dimension of importance never before experienced and never more important than they are today. Versatility, flexibility, adaptability and adoptability are what the specialist is going to acquire and attain in this training and redefine the way they are going to skilfully handle crime prevention. The Certified Crime Prevention Specialist will be exposed to latest crime assessment and audit processes and techniques which can be customised and improvised accordingly to be implemented at their organizations for management of crime prevention strategies, processes and procedures. The culture of working in cohesion and collaboration with and among other departments and personnel and as well as law enforcement agencies in crime prevention initiatives strategized for both public and private businesses in diverse settings demands transferable action for the real world experience. In summary the CCPS recognises that crime prevention is a pattern of attitudes and behaviors directed at reducing the threat of crime and enhancing the sense of safety and security, to positively influence the quality of life in our society, and to develop environments where crime cannot flourish, must be eradicated if not reduced. It needs an action now and before it is too late let us turn more of us into Crime Prevention Specialist. SYNOPSIS OF THE PROGRAM
  • 3. The curriculum has undergone a notch up in the areas of specialization wherein aspects of criminal investigations, suspicious behaviour assessment, criminal profiling, document fraud, terrorism, political violence, security best known practises and best known methods, persons of interest (surveillance), internet by criminals and terrorist as well as new technologies in OSINT –SOCMINT approaches have been included. These modules are new to the syllabus. The areas of concentration are now becoming a niche and norm among security professionals. Practitioners of crime prevention are expected to have a greater in-depth grasp of these competencies and expertise. CIISCM Board being mindful of the evolution and challenges in crime prevention has included these perspectives into the CCPS curriculum. The fundamental and generics of crime prevention application of cameras, access controls, security personnel and security standards and certification are also given equal emphasis in the course content. MODULES OF THE PROGRAM WHAT IS CRIME PREVENTION This introduction outlines the traditional definitions to crime prevention and the evolution of crime prevention principles. Concepts associated and progress towards loss prevention is discussed. Crime prevention challenges and mitigation, intention and management is debated. The perspective concludes with business risk as a focal point and achieving the balance between business demands and security foresights. CRIMINAL INVESTIGATIONS OVERVIEW This module unveils the essence of criminal investigations and outlays the engagement of community with law enforcement and the necessary facilitation of personal communications in combating the criminal threats. The intelligence spectrum and preliminary investigation sets the stage for efficient criminal investigations and assessment. Managing the information leading to a case is paramount and vital in a thorough handling of criminal investigation. An overview of crime scene evaluation, management and preservation is discussed. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) Definition, components and introduction to CPTED, the Principles & Generics of CPTED as well as CPTED Theories and Designs (External & Internal of Premises) is well defined in this section. Integrating CPTED Strategies towards target hardening in Organizational Security Plans at Commercial/Retail Facilities, Hotels, Factories, Logistics Facilities and Government Establishments are cited. Crime Triangle and effective combination of operational, technological and architectural security towards efficiency in crime prevention is discussed. SUSPICIOUS BEHAVIOURAL ASSESSMENT – PROFILING The participants will be introduced to the Importance of Observation and of Element of Choices. Hostile Environment - F.A.C.E. Tactics, Body Language in Behavioural Assessment will be discussed. Structure of an Investigative Interview and what “Trueness” means will be defined. Security - Investigative Questioning will be debated. The section concludes with EL AL Israel’s National Airlines - Brief Case Study and Support Videos –Checkpoints CLASS EXERCISE: Suspicious Behaviour Assessment The participants will engage into the behaviour assessment techniques, management processes and effective principles of suspicious investigations. The exercise will culminate with sharing of different opinions and experiences from the participants. The trainer will conclude on the methods and approaches discussed and cite a discussion on Loss Prevention Investigation - (Hospitality environment) CLASS EXERCISE: An Analysis of Interview Techniques and Approaches The participants are given a perspective towards a scenario involving interviews to solicit information. The approach, types of questions, techniques and methodology is discussed. The trainer will run the sequence and chronology of events and content. The participants engage in a “Live” Interview of a person informed of facts. The session ends with a discussion on the
  • 4. MODULES OF THE PROGRAM DOCUMENT FRAUD The prevalent crime of document fraud is the focus in this section. It starts with an overview of the phenomenon and leads on to use of fake documents by criminals and terrorists. Counterfeit, forged and stolen blanks which are fraudulently obtained is discussed. Pseudo documents and imposters is given attention. The trainer gives an insight into INTERPOL International Stolen Lost Travel Document Database, EU Prado and Edison Travel Document Databases. CLASS EXERCISE: Recognition, Identification and Detection (RID) The participants are indulged into a brief practical demonstration exercise. The debate on genuine and imposter Identification is put into practise. The presentation gives a vivid show of how travel documents are forged and “doctored” with the use of internet technology. INTRODUCTION TO TERRORISM AND POLITICAL VIOLENCE Crime prevention today is not complete without the inclusion of the challenges and threats associated with terror, terrorist and terrorism. This section dwells into what terrorism is and the concept and relations to crime. Typology of Terrorism and Consequence onto preferred targets with links between Terrorism and Organized Crime is given focus. Terrorism Attack Tactics is viewed from a criminal tactical approach and juxtaposed against terrorism norms, influences and operations SECURITY AUDITS & ASSESSMENTS Concentric Circles of Protection & Security Layering Audits and/or Assessments - Components Security Audits of Manufacturing Facilities, Warehouses, Security Audits and Assessments of Hotels, Hospitals, Schools. Campuses Security Audits and assessments of Commercial/Retail Security Outlets. SECURITY BEST KNOW PRACTISES & METHODS The trainer will indulge in the knowledge of best practices required in Truck, Trucking & Transportation Security, Warehousing & Logistics Security, Air Terminals & Maritime Security and the Service Industry. Best known practices (BKP) & BKM featured in warehousing, logistics and manufacturing environment will be discussed in this session. PERSON OF INTEREST [POI] SURVEILLANCE (Open Air Exe) The basics of covert surveillance, the generics and fundamentals involved in the execution of POI surveillance will be given and in-depth understanding. The participants will be divided into groups so as to manage a Time, Environment, Execution and Strategy during an actual surveillance practice.
  • 5. MODULES OF THE PROGRAM TEAM EXERCISE: External Surveillance Upon obtaining clarification on the chronology of POI external surveillance attributes, the participants will be put into a practical exercise. The teams will spend 1-1.5 hours onto surveillance of a POI and gather evidence to support their findings towards establishing facts about the objective and mission of the surveillance. The session will conclude with a report and presentation of the groups findings from the external surveillance exercise executed. EMPLOYEE CRIME PREVENTION A lethal threat today is that which is within our organisation. The trainer will unveil the intricacies and complexities of threat from the within and external. Human Resources and Security cohesive collaboration plays an important role. Employment process, Authentication, Verification, Background checks and Screenings will be discussed. A regular monitoring of the employee’s work and behaviour is crucial in retaining security. The session will conclude with precise information towards security and safety of employees involved in travel for and on behalf of their organisation. PERSPECTIVES ON THE USE OF INTERNET AND IT FOR CRIMINAL AND SECURITY ACTORS Criminals and terrorist have begun using the Internet as a mode of communication given that it’s accessible to anyone everywhere. On the brighter side, it has opened up a new modes of monitoring for law enforcement agencies. New technological approaches have been developed for security enhancement. The trainer will dive in to the foundations of OSINT – SOCMINT. CLASS EXERCISE: Online & Social Media The session will follow with an exercise of basic online searchers and live online investigations. A practical overview will be carried out on two major media platforms. The trainer will share various platforms and avenues on the internet (available freely) for the participants to partake towards engaging in OSINT & SOCMINT
  • 6. TRAINERS OF THE PROGRAM MR. Tony Ridley Tony is a career security professional. For the past 17 years Tony has worked commercially around the globe at various senior and ex- ecutive levels. His prior 13 years were spent within military, primarily with Special Forces. During his commercial career, Tony has developed, delivered and reviewed numerous security, operations, safety and crisis manage- ment courses. He remains a constant contributor to industry forums, routinely speaks at international forums and has mentored many up and coming security specialists and professionals. Having worked for a number of years in Indonesia, at both project and corporate levels, he has a unique viewpoint and experience relevant to Indonesia. Overseeing as many as 3,500 personnel, deployed across over 40 individual projects, he can communicate effectively in Bahasa Indonesian and relates with Indonesians at all levels. TRAINERS OF THE PROGRAM DRS. DARLY SIREGAR ICPS, CATS, CCPS Drs. Darly Segar is the present Director of PT. First Security Services in Indone- sia who is responsible for overseeing its entire operations. First Security Servic- es, as its President Director. The business product focuses on Integrated Security and he believes in power of strength, system and implementation. PT. First Secu- rity Services is highly affiliated with all governmental institutions in Indonesia. Drs. Darly is accomplished with a Degree in Business Administration and holds many certifications among them are Certified Crime Prevention Specialist (CCPS), Certified Anti Terrorism Specialist (CATS), ISO 14001:2004 - Manage- ment Integrated of Security Services, OHSAS 18001:2007 Management Integrat- ed of Security Services and ISO 9001:2008 Management Integrated of Security Services Prior to joining PT. First Security Services, he spent over 10 years of his career in the hospitality industry where he primarily worked in the security sector. He held the position and responsibility of setting up security systems, fire & safety training programs, loss prevention standards and was in-charge of guest security. This equipped him with the skill set of an all rounded security professional that is extremely well versed in the field. Drs. Darly has also been an active part of several multi-national projects including oil and gas. In his capacity of Director of Operations, he provided strategical and operational leadership to his team while building a complete consultancy firm. He is fluent in English and Bahasa Indonesia. He spends his free time being an active member at the Harley Davidson Club in Indonesia (HDCI)
  • 7. REGISTRATION OF THE PROGRAM Fee Includes: - 3 days luncheons, and refreshments - Examination - CCPS Training manual Indonesia, Jakarta 18 - 20 Dec 2017 IDR 13,000,000 Training Dates & Fee MR. MUNIESWERAN VEERIAH MCiiSCM, CATS, CCPS Muniesweran has well over 35 years of experience with the government and multi-national companies both regionally and worldwide. He exemplifies with an outstanding array of professional experience, knowledge and competencies, which saw him leading the entities he worked with achieving international accolades. The global exposure of holding senior management positions in different continents worldwide, particularly with regional attachments in Germany, Africa, Middle East, South East Asia and North Asia has seen to the business acumen and management business excellence in Munies. He brings in-depth experience in the Operations, Human Capital and Management perspectives of manufacturing, trading, transportation, shipping and logistics entities worldwide in the names of Elcon GmbH, Isorast Afica, Dubai Diamonds, Flextronics, Sky Schreiber International, DHL and Motorola. For Enquiries, Please Contact PT. FIRST SECURITY SERVICES INDONESIA Contact Person: Global E2C Pte Ltd 1 Gateway Drive, Westgate Tower #07-01, Singapore 608531 Tel: (65) 6514 9646 Email: Sales@GlobalE2C.com.sg Ms. Alia Email: bdv.exe1@fsi.id Tel: (62) 8119702715 Ms. Revita Email: bdv.exe2@fsi.id Tel: (62) 8119702716 Ms. Linka Angelia Email: bdv.exe3@fsi.id Tel: (62) 8119702714 Ms. Anggia Email: pa@fsi.id Tel: (62) 21 83783053 - CCPS Challenge Coin - CCPS Polo Shirt - CCPS Collar Pin - CCPS Embroidery Badge - CIISCM Certified Certificate - CIISCM Subscriber Membership Venue : Hotel Ashley, JI. KH. Wahid Hasyim No. 73-75, Jakarta Pusat (10250), Indonesia. Training Time : 0900 hrs - 1700 hrs Payment Transfer to : PT. First Security Services Indonesia Bank Account No : 478 300 2305 (Cabang Wahid Hasyim) Last Payment : 2 weeks before the date Indonesia, Jakarta 12 - 14 Feb 2018