MindShare Training

A Division of EarthSafe

Comprehensive Security Systems Training

Courses

CORE LEVEL - PHYSICAL SECURITY SERIES

A Comprehensive Approach to Physical Security Vulnerability Assessments

Identify the weaknesses of an existing physical security system and determine how successfully an adversary can exploit them.

Due to heightened security threats, organizations worldwide are reevaluating their fiduciary and security obligations to customers, shareholders, and employees, thereby strengthening their security systems against unforeseen vulnerabilities.

Eliminating or mitigating all risk can be quite costly and, at some point, may even produce diminishing returns. It’s often difficult to make a business case and get management to support and commit resources to protect against something that hasn’t happened yet. Yet if a breach does occur, the chief security officer must explain why more wasn’t spent to fully avert the threat. Budget-driven security will always fail.

Review physical security system components and subcomponents.

This 1 day course will provide valuable information to all those involved in planning, designing, managing, maintaining, and testing physical security systems. Students will learn about exterior and interior protection system components and subcomponents, including security policies, procedures, and legal considerations.

Learn protection techniques for traditional and ton-traditional threats.

Explore building designs, countermeasures functions, and strategic protection techniques to deter, delay, and defeat an attack and remove the incentives for perpetrators. Learn about the advantages and disadvantages of various security countermeasures, as well as the exploits for them.

Learn the principles of the SANDIA National Labs Assessment Methodology.

To construct a framework for subsequent countermeasure selection and improvement, students will learn methodologies and techniques for planning and performing a vulnerability assessment, including those used by the US Department of Defense and Sandia National Laboratories.

Topics include:
  • Security Policies

  • Executive Protection Assessments

  • D.O.D. Design Systems Approach

  • Protective Barriers & Building Elements

  • Intrusion Detection Systems

  • Electronic Emanation Protection

  • Electronic Security Systems components

  • Vulnerability Assessments Methodologies

  • S.A.N.D.I.A. Performance-based PPS Design

  • Introduction: E.A.S.I. Model Critical Path Analysis

Benefits
  • Identify, prioritize, & mitigate critical security weaknesses “in house” ---Effi ciently use your security budget.

  • Design an environment that encourages appropriate behavior and discourages inappropriate, criminal, or terroristic behavior.

  • Improve compliance with security policies, procedures and regulatory and legal responsibilities.

  • Nurture and re-enforce your in-house security culture by training your key managers.

  • Make a purposeful and meaningful contribution to your country's national security!

Who should attend
  • Anyone who is involved with security, safety, business continuity, and emergency preparedness

  • Physical security professionals and Newcomers

  • Information Technology professionals (IT)

  • Risk management professionals

  • Information security convergence professionals (IS)

  • Legal Corporate Secretaries

  • Human Resources professionals that manage the physical security department

PHY301-CORE LEVEL: PHYSICAL SECURITY SYSTEMS & VULNERABILITY ASSESSMENTS

# PHY-301
Core Level
One -Day Course

Led by certified
Homeland Security Level 5
Security & Emerg Mgmnt Expert

8 CPE Credits

www.earth-safe.com

Contact: Gabriela Yanez
+1 727 424 8429

mindshareseminars@gmail.com

CORE LEVEL - INFORMATION SECURITY & DIGITAL FORENSICS SERIES

Convergence is a concerted and results-oriented team effort to work together

As physical security and information security boundaries have become increasingly blurred many organizations are experiencing challenges with how to eff ectively and efficiently manage security.

Physical security and information security professionals often do not collaborate with each other because they don’t have the same background.

Investigations into either physical or cyber breaches need to involve both parties, as weaknesses in one area of security can have serious repercussions for the other side.

Cross-training equates to improved cost-control and productivity.

Some technical training will help bridge the gap and go a long way towards team building, improving skill sets, and communicating eff ectively with information technology and information security departments. A cross-trained organization is more cohesive, with diff erent divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profi le and streamline some redundant security processes.

Build a “Human Firewall”.

Having a work force that is cross-trained and more aware of information security is like expanding the Information Security department into the whole company. It gives the security manager or Chief Information Security O ffi cer a broader base of brainpower which they can tap if needed.

Get started in Information Security and Digital Forensics.

Information security and computer forensics are the skills are in demand. This course will give students a solid foundation in key information security and network security concepts and processes.

In addition, as a primer for getting started in computer forensics, this course covers the basic principles of digital forensics and cloud computing forensics, which is the recommended pre-requisite training for the follow-on "CYB502-Advanced Computer Forensic Investigation" hands-on course.

This curriculum aligns with National Institutes of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE), and ISACA’s “NEW” CyberSecurity Fundamentals Certifi cate exam objectives.

Course Highlights include:

  • Information Security Principles

  • Cryptography - Symmetric and Asymmetric

  • Public Key Infrastructure & Digital Certifi cates

  • Networking principles including OSI and TCP/IP Model

  • Network Security and Firewalls

  • Application Security & Malicious Code Attacks

  • Digital Forensics - Key Technical Concepts

  • Solid State Drives - Flash Memory

  • Collecting Evidence

  • Windows System Artifacts

  • Mobile Device Evidence

  • Principles of "Cloud" Computing Forensics

Benefits

  • One strategic security mission with consistent goals - a “human fi rewall”.

  • Improved communication, coordination, and investigations between Physical Security and Information Security departments.

  • Improve compliance with security policies, procedures and regulatory and legal responsibilities.

  • Better alignment with BCP/DRPs

Appropriate Candidates include:

  • Anyone NEW to information security and digital forensics

  • Physical Security professionals

  • Team members of information security convergence projects

  • Risk management, Business Continuity, and Incident Response professionals

  • Auditors, Compliance and Legal professionals

SEC301- PRINCIPLES OF INFORMATION SECURITY & DIGITAL FORENSICS

# SEC-301
Two-Day Course

No Experience Required

Led by certified
Information Security SME CISSP, MSCE, CSSA, LINUX+

16 CPE Credits

www.earth-safe.com

Contact: Gabriela Yanez
+1 727 424 8429

mindshareseminars@gmail.com

Please note: This course does NOT focus on Physical Security components or principles.

For physical security courses, ask us about: “Core Level & Advanced Level : Physical Security Risk Analysis , VA’s, and Cost Budgeting Tools"