MindShare Training
A Division of EarthSafe
Comprehensive Security Systems Training
Courses
CORE LEVEL - PHYSICAL SECURITY SERIES
A Comprehensive Approach to Physical Security Vulnerability Assessments
Identify the weaknesses of an existing physical security system and determine how successfully an adversary can exploit them.
Due to heightened security threats, organizations worldwide are reevaluating their fiduciary and security obligations to customers, shareholders, and employees, thereby strengthening their security systems against unforeseen vulnerabilities.
Eliminating or mitigating all risk can be quite costly and, at some point, may even produce diminishing returns. It’s often difficult to make a business case and get management to support and commit resources to protect against something that hasn’t happened yet. Yet if a breach does occur, the chief security officer must explain why more wasn’t spent to fully avert the threat. Budget-driven security will always fail.
Review physical security system components and subcomponents.
This 1 day course will provide valuable information to all those involved in planning, designing, managing, maintaining, and testing physical security systems. Students will learn about exterior and interior protection system components and subcomponents, including security policies, procedures, and legal considerations.
Learn protection techniques for traditional and ton-traditional threats.
Explore building designs, countermeasures functions, and strategic protection techniques to deter, delay, and defeat an attack and remove the incentives for perpetrators. Learn about the advantages and disadvantages of various security countermeasures, as well as the exploits for them.
Learn the principles of the SANDIA National Labs Assessment Methodology.
To construct a framework for subsequent countermeasure selection and improvement, students will learn methodologies and techniques for planning and performing a vulnerability assessment, including those used by the US Department of Defense and Sandia National Laboratories.
Topics include:
Security Policies
Executive Protection Assessments
D.O.D. Design Systems Approach
Protective Barriers & Building Elements
Intrusion Detection Systems
Electronic Emanation Protection
Electronic Security Systems components
Vulnerability Assessments Methodologies
S.A.N.D.I.A. Performance-based PPS Design
Introduction: E.A.S.I. Model Critical Path Analysis
Benefits
Identify, prioritize, & mitigate critical security weaknesses “in house” ---Effi ciently use your security budget.
Design an environment that encourages appropriate behavior and discourages inappropriate, criminal, or terroristic behavior.
Improve compliance with security policies, procedures and regulatory and legal responsibilities.
Nurture and re-enforce your in-house security culture by training your key managers.
Make a purposeful and meaningful contribution to your country's national security!
Who should attend
Anyone who is involved with security, safety, business continuity, and emergency preparedness
Physical security professionals and Newcomers
Information Technology professionals (IT)
Risk management professionals
Information security convergence professionals (IS)
Legal Corporate Secretaries
Human Resources professionals that manage the physical security department
PHY301-CORE LEVEL: PHYSICAL SECURITY SYSTEMS & VULNERABILITY ASSESSMENTS
# PHY-301
Core Level
One -Day Course
Led by certified
Homeland Security Level 5
Security & Emerg Mgmnt Expert
8 CPE Credits
www.earth-safe.com
Contact: Gabriela Yanez
+1 727 424 8429
mindshareseminars@gmail.com
CORE LEVEL - INFORMATION SECURITY & DIGITAL FORENSICS SERIES
Convergence is a concerted and results-oriented team effort to work together
As physical security and information security boundaries have become increasingly blurred many organizations are experiencing challenges with how to eff ectively and efficiently manage security.
Physical security and information security professionals often do not collaborate with each other because they don’t have the same background.
Investigations into either physical or cyber breaches need to involve both parties, as weaknesses in one area of security can have serious repercussions for the other side.
Cross-training equates to improved cost-control and productivity.
Some technical training will help bridge the gap and go a long way towards team building, improving skill sets, and communicating eff ectively with information technology and information security departments. A cross-trained organization is more cohesive, with diff erent divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profi le and streamline some redundant security processes.
Build a “Human Firewall”.
Having a work force that is cross-trained and more aware of information security is like expanding the Information Security department into the whole company. It gives the security manager or Chief Information Security O ffi cer a broader base of brainpower which they can tap if needed.
Get started in Information Security and Digital Forensics.
Information security and computer forensics are the skills are in demand. This course will give students a solid foundation in key information security and network security concepts and processes.
In addition, as a primer for getting started in computer forensics, this course covers the basic principles of digital forensics and cloud computing forensics, which is the recommended pre-requisite training for the follow-on "CYB502-Advanced Computer Forensic Investigation" hands-on course.
This curriculum aligns with National Institutes of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE), and ISACA’s “NEW” CyberSecurity Fundamentals Certifi cate exam objectives.
Course Highlights include:
Information Security Principles
Cryptography - Symmetric and Asymmetric
Public Key Infrastructure & Digital Certifi cates
Networking principles including OSI and TCP/IP Model
Network Security and Firewalls
Application Security & Malicious Code Attacks
Digital Forensics - Key Technical Concepts
Solid State Drives - Flash Memory
Collecting Evidence
Windows System Artifacts
Mobile Device Evidence
Principles of "Cloud" Computing Forensics
Benefits
One strategic security mission with consistent goals - a “human fi rewall”.
Improved communication, coordination, and investigations between Physical Security and Information Security departments.
Improve compliance with security policies, procedures and regulatory and legal responsibilities.
Better alignment with BCP/DRPs
Appropriate Candidates include:
Anyone NEW to information security and digital forensics
Physical Security professionals
Team members of information security convergence projects
Risk management, Business Continuity, and Incident Response professionals
Auditors, Compliance and Legal professionals
SEC301- PRINCIPLES OF INFORMATION SECURITY & DIGITAL FORENSICS
# SEC-301
Two-Day Course
No Experience Required
Led by certified
Information Security SME CISSP, MSCE, CSSA, LINUX+
16 CPE Credits
www.earth-safe.com
Contact: Gabriela Yanez
+1 727 424 8429
mindshareseminars@gmail.com
Please note: This course does NOT focus on Physical Security components or principles.
For physical security courses, ask us about: “Core Level & Advanced Level : Physical Security Risk Analysis , VA’s, and Cost Budgeting Tools"
Connect with
Subscribe To Our Newsletter
+1 727 424 8429
or
+1 305 771 3787
© 2025. All rights reserved.


Gabriela Yanez
Mindshare Training - a division of EarthSafe
Comprehensive Security Systems Training
