SlideShare a Scribd company logo
1 of 6
TRAINING METHODOLOGY
 Legal and Procedural Provisions related to
Security
 Vital Security Operations and their Practical
Methodology.
 Role of Security Personnel in Contingency
Management.
 Use of Computer/Electronic Appliances in
Security Arrangements.
 Public Dealing and Self-Development.
 General Knowledge and Awareness about Current
Events
 Lot of emphasis on outdoor training activities
which enhances the skills, spontaneity and
reflexes of an aspiring security guard.
 Outdoor training exercises establish the basic
and professional set of skills which will be
required by a security guard in all fields
necessary such as hospitality, bank, retail,
private etc.
i) Access Control/Frisking
ii) Anti-sabotage Checking
iii) Cordoning and Sealing
iv) Evacuation
v) Surveillance
vi) Chasing, Overpowering and Immobilization of a Mobster/Suspect
vii) Identification of I.E.Ds and Explosive/Narcotic Material.
viii) Body Search, Premises Search and Area Search.
ix) Defensive Driving.
x) Working of Anti-sabotage Checking Gadgetry.
xi) Role of Sniffer Dogs in Security Operations.
xii) First-aid.
xiii) Type and Techniques of Patrolling.
xiv) Handling a Mob-attack.
xv) Handling and Operation of Wireless Communication Equipments.
xvi) Handling and Operating Basic Fire-fighting Equipments.
xvii) Close quarter combat Techniques.
xviii) Cordoning and Providing Security Cover to a Threatened
Person in Crowded Places.
 Access control/frisking
 Anti sabotage checking
 Cordoning and sealing
 Evacuation
 Surveillance, Chasing, overpowering and immobilization of
mobster/suspect
 Identification of I.E.Ds. and explosive/narcotic material, Body
search
 Premises search and area search
 Defensive driving
 Working of anti sabotage checking gadgetry
 Role of sniffer dogs in security operations
 First aid
 Type and techniques of patrolling
 Handling a mob-attack
 Handling and operation of Wireless
 Musketry handling and firing of personal weapon
Contact number : +91 9810289649, +91 8826887122
Website-
www.collegeofsecuritystudies.com
Mail us at :
info@coss.in
Our Blog :
blog.collegeofsecuritystudies.com
Follow us on twitter :
https://twitter.com/InfoCoss
Facebook:
https://www.facebook.com/pages/College-of-Security-Studies/311597015662748
Google + :
https://plus.google.com/105333422894677645787/posts
Linkedin:
https://www.linkedin.com/profile/view?id=351803231&trk=nav_responsive_tab_profile

More Related Content

Viewers also liked

Escuelas del pensamiento económico
Escuelas del pensamiento económicoEscuelas del pensamiento económico
Escuelas del pensamiento económicoJoseline Loza Gil
 
Analysis of the private security industry 29 Aug 2013
Analysis of the private security industry 29 Aug 2013Analysis of the private security industry 29 Aug 2013
Analysis of the private security industry 29 Aug 2013ndifunaukwazi
 
Pl7505 Brief intro to critical theory and critical security studies
Pl7505 Brief intro to critical theory and critical security studiesPl7505 Brief intro to critical theory and critical security studies
Pl7505 Brief intro to critical theory and critical security studiesHelenDexter
 
Postcolonial Futures
Postcolonial FuturesPostcolonial Futures
Postcolonial Futuresilyas babar
 
What role does liberalism play within security studies
What role does liberalism play within security studiesWhat role does liberalism play within security studies
What role does liberalism play within security studiesCalum Rogers
 
Private Security Agencies Regulation Act 2005
Private Security Agencies Regulation Act 2005Private Security Agencies Regulation Act 2005
Private Security Agencies Regulation Act 2005Capt Rajeshwar singh
 
Postcolonial theory-and-litearature
Postcolonial theory-and-litearaturePostcolonial theory-and-litearature
Postcolonial theory-and-litearaturejakajmmk
 
Security officer performance appraisal
Security officer performance appraisalSecurity officer performance appraisal
Security officer performance appraisaltaylorshannon964
 
Postcolonial criticism
Postcolonial criticismPostcolonial criticism
Postcolonial criticismjakajmmk
 
Theories of international relations ppt
Theories of international relations pptTheories of international relations ppt
Theories of international relations pptVivek Hind
 
Critical theory (chapter 6)
Critical theory (chapter 6)Critical theory (chapter 6)
Critical theory (chapter 6)HelvieMason
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 

Viewers also liked (16)

Escuelas del pensamiento económico
Escuelas del pensamiento económicoEscuelas del pensamiento económico
Escuelas del pensamiento económico
 
Decolonizing curriculum (1)
Decolonizing curriculum (1)Decolonizing curriculum (1)
Decolonizing curriculum (1)
 
Analysis of the private security industry 29 Aug 2013
Analysis of the private security industry 29 Aug 2013Analysis of the private security industry 29 Aug 2013
Analysis of the private security industry 29 Aug 2013
 
Pl7505 Brief intro to critical theory and critical security studies
Pl7505 Brief intro to critical theory and critical security studiesPl7505 Brief intro to critical theory and critical security studies
Pl7505 Brief intro to critical theory and critical security studies
 
Postcolonial Futures
Postcolonial FuturesPostcolonial Futures
Postcolonial Futures
 
What role does liberalism play within security studies
What role does liberalism play within security studiesWhat role does liberalism play within security studies
What role does liberalism play within security studies
 
Private Security Agencies Regulation Act 2005
Private Security Agencies Regulation Act 2005Private Security Agencies Regulation Act 2005
Private Security Agencies Regulation Act 2005
 
Postcolonial theory-and-litearature
Postcolonial theory-and-litearaturePostcolonial theory-and-litearature
Postcolonial theory-and-litearature
 
Security officer performance appraisal
Security officer performance appraisalSecurity officer performance appraisal
Security officer performance appraisal
 
Postcolonial criticism
Postcolonial criticismPostcolonial criticism
Postcolonial criticism
 
PSARA 2005
PSARA 2005PSARA 2005
PSARA 2005
 
Theories of international relations ppt
Theories of international relations pptTheories of international relations ppt
Theories of international relations ppt
 
Postcolonial theory
Postcolonial theoryPostcolonial theory
Postcolonial theory
 
Critical theory (chapter 6)
Critical theory (chapter 6)Critical theory (chapter 6)
Critical theory (chapter 6)
 
Postcolonial theory
Postcolonial theoryPostcolonial theory
Postcolonial theory
 
Security training module
Security training moduleSecurity training module
Security training module
 

Similar to Security Sector- Training Methodology at College Of Security Studies

Law Enforcement Administration II
Law Enforcement Administration IILaw Enforcement Administration II
Law Enforcement Administration IIVanrex Pasco
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information David Santiago
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
Mastering Cyber Defense Ethical Hacking Training in Kochi.pptx
Mastering Cyber Defense Ethical Hacking Training in Kochi.pptxMastering Cyber Defense Ethical Hacking Training in Kochi.pptx
Mastering Cyber Defense Ethical Hacking Training in Kochi.pptxhunterboy350350
 
Everything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdfEverything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdfETS Risk Management
 
Security Guard Service.pdf
Security Guard Service.pdfSecurity Guard Service.pdf
Security Guard Service.pdfcabomer365
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory RealmShawn Tuma
 
SHADOW Anti-Terrorism Academy CP content
SHADOW Anti-Terrorism Academy CP contentSHADOW Anti-Terrorism Academy CP content
SHADOW Anti-Terrorism Academy CP contentDimitris Siok
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxClintonKelvin
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdffeelinggift
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...
Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...
Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...AakashParmar37
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxVaibhavYadav297587
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxNarangYadav
 

Similar to Security Sector- Training Methodology at College Of Security Studies (20)

Law Enforcement Administration II
Law Enforcement Administration IILaw Enforcement Administration II
Law Enforcement Administration II
 
Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information Assets protection and The Need for Timely Information
Assets protection and The Need for Timely Information
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Mastering Cyber Defense Ethical Hacking Training in Kochi.pptx
Mastering Cyber Defense Ethical Hacking Training in Kochi.pptxMastering Cyber Defense Ethical Hacking Training in Kochi.pptx
Mastering Cyber Defense Ethical Hacking Training in Kochi.pptx
 
Everything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdfEverything You Need to Know about Special Event Security.pdf
Everything You Need to Know about Special Event Security.pdf
 
Security Guard Service.pdf
Security Guard Service.pdfSecurity Guard Service.pdf
Security Guard Service.pdf
 
Fabio Ghioni
Fabio GhioniFabio Ghioni
Fabio Ghioni
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
SHADOW Anti-Terrorism Academy CP content
SHADOW Anti-Terrorism Academy CP contentSHADOW Anti-Terrorism Academy CP content
SHADOW Anti-Terrorism Academy CP content
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...
Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...
Introduction to Footprinting and Reconnaissance in Ethical Hacking - Pristine...
 
403 9
403 9403 9
403 9
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Security Sector- Training Methodology at College Of Security Studies

  • 2.  Legal and Procedural Provisions related to Security  Vital Security Operations and their Practical Methodology.  Role of Security Personnel in Contingency Management.  Use of Computer/Electronic Appliances in Security Arrangements.  Public Dealing and Self-Development.  General Knowledge and Awareness about Current Events
  • 3.  Lot of emphasis on outdoor training activities which enhances the skills, spontaneity and reflexes of an aspiring security guard.  Outdoor training exercises establish the basic and professional set of skills which will be required by a security guard in all fields necessary such as hospitality, bank, retail, private etc.
  • 4. i) Access Control/Frisking ii) Anti-sabotage Checking iii) Cordoning and Sealing iv) Evacuation v) Surveillance vi) Chasing, Overpowering and Immobilization of a Mobster/Suspect vii) Identification of I.E.Ds and Explosive/Narcotic Material. viii) Body Search, Premises Search and Area Search. ix) Defensive Driving. x) Working of Anti-sabotage Checking Gadgetry. xi) Role of Sniffer Dogs in Security Operations. xii) First-aid. xiii) Type and Techniques of Patrolling. xiv) Handling a Mob-attack. xv) Handling and Operation of Wireless Communication Equipments. xvi) Handling and Operating Basic Fire-fighting Equipments. xvii) Close quarter combat Techniques. xviii) Cordoning and Providing Security Cover to a Threatened Person in Crowded Places.
  • 5.  Access control/frisking  Anti sabotage checking  Cordoning and sealing  Evacuation  Surveillance, Chasing, overpowering and immobilization of mobster/suspect  Identification of I.E.Ds. and explosive/narcotic material, Body search  Premises search and area search  Defensive driving  Working of anti sabotage checking gadgetry  Role of sniffer dogs in security operations  First aid  Type and techniques of patrolling  Handling a mob-attack  Handling and operation of Wireless  Musketry handling and firing of personal weapon
  • 6. Contact number : +91 9810289649, +91 8826887122 Website- www.collegeofsecuritystudies.com Mail us at : info@coss.in Our Blog : blog.collegeofsecuritystudies.com Follow us on twitter : https://twitter.com/InfoCoss Facebook: https://www.facebook.com/pages/College-of-Security-Studies/311597015662748 Google + : https://plus.google.com/105333422894677645787/posts Linkedin: https://www.linkedin.com/profile/view?id=351803231&trk=nav_responsive_tab_profile