SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
International Security Management Institute
An IQ-Accredited Centre
The Certified Security
Management Professional (CSMP)
Level 6 Organisation Diploma
by distance learning
“The CSMP course has helped me secure my new executive position, for which I thank you.”
Regional Security Manager, EMEA
THE UNITS
Security Risk Analysis
You will learn a simple methodology to help you
determine and prioritise security risk by
evaluating threat likelihood, impact and
vulnerability. The methodology is portable; you
will likely want to use it in your own organisation.
Crime Prevention
Much crime can be avoided by understanding the
reasons why people commit crime in the first
place. You will study crime motivation theories
and, through the unit, develop these into crime
prevention theories that you can apply to your
workplace.
Managing the Security Function
You have probably been doing this for some time,
and this unit provides a great reference to the
daily nuts and bolts of managing a security
programme. It includes models for interacting
with the business, and good practice for getting
the best out of security manpower.
Leadership and Management
Who doesn’t think they’re a good leader?
Feedback on this unit from experienced leaders
has been highly complimentary. The unit will help
you improve your day-to-day generic
management skills, and will provide in-depth
instruction on how to develop management into
leadership.
Security Design, Evaluation and Surveying
“I have been doing this for years but after
studying Unit 5 I finally understand it” was one
student comment. The unit presents a wide
range of tools, templates, models and good
practice in how to optimise security management
and design to get the best return on investment.
Perimeter Protection
A very practical unit in which you will study the
essential elements of a perimeter (design basis
threat, design, civil works, fencing, lighting,
surveillance, intrusion detection etc.) and apply it
to a practical context. By this point in the
programme, assignments focus less on knowledge
regurgitation and more on application – allowing
you to evidence what you can do, rather than just
what you know.
Protecting Buildings
A very comprehensive study of buildings security,
addressing design, security vulnerability analysis,
core security principles, structural hardening,
locking systems and key control, intrusion
detection, surveillance etc. The unit considers the
different security characteristics of old and new
buildings, and multi-tenant buildings. You will be
assessed on your skill in application of the unit
content.
Access Management
Perhaps the most important aspect of physical
security, this unit builds on the previous with an
in-depth operation and technical study of access
management and automated access control
systems. As well as the obvious hardware, card
technology, biometrics and vehicle control
considerations, this unit will address contraband
detection. The assessment is very much case
study focussed.
Video Surveillance (CCTV)
For many companies, a CCTV system represents a
large part of the physical security budget. This
unit will help you understand the subject in
depth, from image acquisition, through
transmission to storage. This is a rapidly
developing area of technical security and this unit
will better position you to negotiate with
suppliers and installers to get the best value for
money and optimum risk reduction. The
assignment tests your skill in applying the theory
to case study contexts.
Facility Counter Terrorism
The spectre of terrorism is ever present,
threatening to cause large-scale casualties and
disrupt business operations. This unit brings
together experiences in protecting facilities in
many different environments and packages it into
a very comprehensive set of good practice
principles that will enable you to optimise your
protection against a wide range of threats. As
well as addressing explosive threats, the unit is
fully updated to include how to mitigate the
threat from marauding terrorist firearms attacks.
Protection of Information
Information compromise is an often hidden
disease, threatening many businesses with slow
death as market share and competitive edge
decline. Learn how to protect information in its
many forms, from know-how, through hardcopy
to digital data. The unit will also explain the
extent of the threat to business from
communications intercept. The output will be an
awareness programme that you can deliver to
your organisation.
Protection of at-Risk Personnel
Many business activities carry inherent risks to
personnel, and laws pertaining to employees are
quite explicit; you have a duty of care to reduce
risk to as low as reasonably practicable. In this
unit you will learn how to identify those at
elevated risk and how to effectively mitigate a
range of risks to personnel, including armed
robbery, threats to overseas travellers or
expatriates, kidnap, etc.
“I WOULD RECOMMEND
THIS COURSE TO ANYONE
WITHIN OUR INDUSTRY.”
Managing Director, Category Winning
Company, 2013 Security Excellence
Awards
THE DETAIL
Introduction
The Certified Security Management Professional (CSMP) certification is
administered by ISMI, the International Security Management Institute
(www.ismi.org.uk). Aimed at security managers at all levels of the
profession, the CSMP award provides a thorough grounding in the key
areas of knowledge necessary to manage a security function.
Certification Qualification Process
The programme is modular. There are 12 units and you are required to
complete one unit every month. Upon completion of each unit you will
have a number of written tasks to undertake to evidence your
understanding. Upon successful completion of all units, you will be
awarded the CSMP.
Cost
The cost to complete the programme is £ (GBP) 750 + VAT where
applicable. Fees are payable at the beginning of the programme and
entitle you to 12 monthly reference units, access to a coach and final
certification.
Registration
Email certification@ismi.org.uk
Register now for next intake. Courses begin every two months.
CSMP Clients Include
Global FMCG Manufacturers; Global Logistics Companies;
Multinational Oil and Gas Companies; National and International
Telecoms Providers; Security Services Providers; Security Installers;
Military Missions and Foreign Defence Forces and Contractors;
European Union; UK Foreign and Commonwealth Office; Global IT
Services Providers; Multinational Mining Companies; United Nations;
Multinational Aviation Manufacturing Companies; Vehicle
Manufacturing Companies; Multinational Technology Manufacturers;
National Power Generation Companies; Overseas Governments;
National Central Banks; Multinational Insurance Providers; Property
Management Companies; Multinational Banks; Telecoms
Manufacturers; Global Food and Beverage Manufacturers; Credit Card
Providers; Global Internet Services Providers; Retailers; Multinational
Power Generation Companies, Pharmaceutical Companies; Schools
and Universities; Business Support Companies
Contact Details
enquiries@ismi.org.uk
www.ismi.org.uk
Telephone +44 207 206 1207
ISMI Certification Ltd. Company Registered in England and Wales 8235767
ACCREDITATION
CSMP is accredited by Industry
Qualifications (IQ) as a Level 6
Organisation Diploma. As such,
it is a unique blend of high-level
vocational and academic study,
with emphasis on
demonstrating advanced-level
competence through
application.
CSMP is also accredited by Skills
for Security, the security sector
skills body for the UK. It reflects
the National Occupational
Standards for Security
Management.
TEN REASONS TO BECOME CSMP-CERTIFIED IN 2014
1. Develop your knowledge and application of risk and security
management.
2. Improve your performance, your contribution to your existing employer,
and enhance your marketability as a security management professional.
3. Enhance your credibility with an internationally-known professional
certification; hundreds of students from over 85 countries have enrolled
on the CSMP programme.
4. Prove that you are formally qualified to manage security operations and
set yourself amongst the elite of the profession.
5. Demonstrate to your colleagues, partners and customers that you are
well versed in industry-respected best practices.
6. Benchmark yourself against other security management peers; you will
be enrolled into a cohort of students and will be able to measure your
progress against that of other students, anonymously.
7. Demonstrate a commitment to personal professional development.
8. Establish a formal benchmark of security management performance in
your organisations by setting CSMP as the team standard.
9. Position yourself to better negotiate performance- and qualification-
related pay.
10.Employers recognise that certified professionals are more productive.
WEWANTYOUTOBESATISFIED
“Very interesting, thought provoking, and definitely challenging”
SECURITY MANAGER, GLOBAL HIGH-TECH COMPANY
“This brilliant course is making me smart”
SECURITY SPECIALIST, CANADA
“The leadership module is by far the best I have ever encountered”
SECURITY CONSULTANT, UK
“The course has cemented all my practical knowledge into a complete package and I am
already talking the talk!”
REGIONAL SECURITY MANAGER, EMEA
“Six months into the course I can wholeheartedly recommend it to both aspiring and
experienced security managers”
SECURITY MANAGER, LEISURE COMPLEX

Mais conteúdo relacionado

Mais procurados

Fraud and Corruption Risk Management 2012
Fraud and Corruption Risk Management 2012Fraud and Corruption Risk Management 2012
Fraud and Corruption Risk Management 2012Ola Odejayi
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the teamtrevorshaff
 
Chapter 09 security_management_practices
Chapter 09 security_management_practicesChapter 09 security_management_practices
Chapter 09 security_management_practiceshusseinalshomali
 
rimap Code of Ethics
rimap Code of Ethicsrimap Code of Ethics
rimap Code of EthicsFERMA
 
Cybersecurity flyer march 28
Cybersecurity flyer march 28Cybersecurity flyer march 28
Cybersecurity flyer march 28Erika Schumacher
 
Whmis certification an overview
Whmis certification an overviewWhmis certification an overview
Whmis certification an overviewmisafety1
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine InsurancePeter Hulyer
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Prudential Practice Guide CPG 220 - Risk Management
Prudential Practice Guide CPG 220 - Risk ManagementPrudential Practice Guide CPG 220 - Risk Management
Prudential Practice Guide CPG 220 - Risk ManagementTurlough Guerin GAICD FGIA
 
CERTIFIED DATA CENTRE RISK PROFESSIONAL
CERTIFIED DATA CENTRE RISK PROFESSIONALCERTIFIED DATA CENTRE RISK PROFESSIONAL
CERTIFIED DATA CENTRE RISK PROFESSIONALDee Smith & Associates
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationFERMA
 
Isaca crisc-courseware
Isaca crisc-coursewareIsaca crisc-courseware
Isaca crisc-coursewareLaxmi Bank
 
Discover 100 Job Descriptions in Risk and Compliance Management and what it t...
Discover 100 Job Descriptions in Risk and Compliance Management and what it t...Discover 100 Job Descriptions in Risk and Compliance Management and what it t...
Discover 100 Job Descriptions in Risk and Compliance Management and what it t...Compliance LLC
 
Risk Leadership on the Boardroom Agenda
Risk Leadership on the Boardroom AgendaRisk Leadership on the Boardroom Agenda
Risk Leadership on the Boardroom AgendaFERMA
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Alvin Integrated Services [AIS]
 
Board Governance and Emerging Risks in the C21
Board Governance and Emerging Risks in the C21Board Governance and Emerging Risks in the C21
Board Governance and Emerging Risks in the C21FERMA
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomBharathi Grover
 

Mais procurados (18)

Fraud and Corruption Risk Management 2012
Fraud and Corruption Risk Management 2012Fraud and Corruption Risk Management 2012
Fraud and Corruption Risk Management 2012
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the team
 
Chapter 09 security_management_practices
Chapter 09 security_management_practicesChapter 09 security_management_practices
Chapter 09 security_management_practices
 
rimap Code of Ethics
rimap Code of Ethicsrimap Code of Ethics
rimap Code of Ethics
 
Cybersecurity flyer march 28
Cybersecurity flyer march 28Cybersecurity flyer march 28
Cybersecurity flyer march 28
 
Whmis certification an overview
Whmis certification an overviewWhmis certification an overview
Whmis certification an overview
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
 
HLM Associates Brochure 2015
HLM Associates Brochure 2015HLM Associates Brochure 2015
HLM Associates Brochure 2015
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Prudential Practice Guide CPG 220 - Risk Management
Prudential Practice Guide CPG 220 - Risk ManagementPrudential Practice Guide CPG 220 - Risk Management
Prudential Practice Guide CPG 220 - Risk Management
 
CERTIFIED DATA CENTRE RISK PROFESSIONAL
CERTIFIED DATA CENTRE RISK PROFESSIONALCERTIFIED DATA CENTRE RISK PROFESSIONAL
CERTIFIED DATA CENTRE RISK PROFESSIONAL
 
EU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentationEU/US boards’ approach to cyber risk governance - webinar presentation
EU/US boards’ approach to cyber risk governance - webinar presentation
 
Isaca crisc-courseware
Isaca crisc-coursewareIsaca crisc-courseware
Isaca crisc-courseware
 
Discover 100 Job Descriptions in Risk and Compliance Management and what it t...
Discover 100 Job Descriptions in Risk and Compliance Management and what it t...Discover 100 Job Descriptions in Risk and Compliance Management and what it t...
Discover 100 Job Descriptions in Risk and Compliance Management and what it t...
 
Risk Leadership on the Boardroom Agenda
Risk Leadership on the Boardroom AgendaRisk Leadership on the Boardroom Agenda
Risk Leadership on the Boardroom Agenda
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.
 
Board Governance and Emerging Risks in the C21
Board Governance and Emerging Risks in the C21Board Governance and Emerging Risks in the C21
Board Governance and Emerging Risks in the C21
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
 

Semelhante a Csmp overview may 14

PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERSPROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERSRuth Jones
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx3aw307
 
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
Corporate Security Intelligence Just Got Smarter   All Courses   LinkedinCorporate Security Intelligence Just Got Smarter   All Courses   Linkedin
Corporate Security Intelligence Just Got Smarter All Courses LinkedinSteve Phelps
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpClaudia Toscano
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Best Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeBest Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeWZWU & Partners
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Afour tech
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdfAfour tech
 

Semelhante a Csmp overview may 14 (20)

PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERSPROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
 
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
Corporate Security Intelligence Just Got Smarter   All Courses   LinkedinCorporate Security Intelligence Just Got Smarter   All Courses   Linkedin
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
 
Nuclear Industry Resilience
Nuclear Industry ResilienceNuclear Industry Resilience
Nuclear Industry Resilience
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write Up
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Best Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeBest Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in Singapore
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 

Último

Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsGoregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptxSIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptxStephenMino
 
2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing YogaRaphaël Semeteys
 
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdfExploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdfMindful Wellness Journey
 
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsColaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...Cara Menggugurkan Kandungan 087776558899
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationbrynpueblos04
 
March 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterMarch 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterssuserdfec6a
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...mitaliverma221
 
Emotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdfEmotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdfaprilross605
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theorydrae5
 
February 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterFebruary 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterssuserdfec6a
 
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
Social Learning Theory presentation.pptx
Social Learning Theory presentation.pptxSocial Learning Theory presentation.pptx
Social Learning Theory presentation.pptxumef01177
 

Último (15)

Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsGoregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Goregaon West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptxSIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
SIKP311 Sikolohiyang Pilipino - Ginhawa.pptx
 
2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga
 
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdfExploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
Exploring Stoic Philosophy From Ancient Wisdom to Modern Relevance.pdf
 
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsColaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Colaba Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentation
 
March 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterMarch 2023 Recommendations for newsletter
March 2023 Recommendations for newsletter
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
 
Emotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdfEmotional Freedom Technique Tapping Points Diagram.pdf
Emotional Freedom Technique Tapping Points Diagram.pdf
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 
February 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterFebruary 2024 Recommendations for newsletter
February 2024 Recommendations for newsletter
 
Girls in Mahipalpur (delhi) call me [🔝9953056974🔝] escort service 24X7
Girls in Mahipalpur  (delhi) call me [🔝9953056974🔝] escort service 24X7Girls in Mahipalpur  (delhi) call me [🔝9953056974🔝] escort service 24X7
Girls in Mahipalpur (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Dadar West Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Social Learning Theory presentation.pptx
Social Learning Theory presentation.pptxSocial Learning Theory presentation.pptx
Social Learning Theory presentation.pptx
 

Csmp overview may 14

  • 1. International Security Management Institute An IQ-Accredited Centre The Certified Security Management Professional (CSMP) Level 6 Organisation Diploma by distance learning “The CSMP course has helped me secure my new executive position, for which I thank you.” Regional Security Manager, EMEA
  • 2. THE UNITS Security Risk Analysis You will learn a simple methodology to help you determine and prioritise security risk by evaluating threat likelihood, impact and vulnerability. The methodology is portable; you will likely want to use it in your own organisation. Crime Prevention Much crime can be avoided by understanding the reasons why people commit crime in the first place. You will study crime motivation theories and, through the unit, develop these into crime prevention theories that you can apply to your workplace. Managing the Security Function You have probably been doing this for some time, and this unit provides a great reference to the daily nuts and bolts of managing a security programme. It includes models for interacting with the business, and good practice for getting the best out of security manpower. Leadership and Management Who doesn’t think they’re a good leader? Feedback on this unit from experienced leaders has been highly complimentary. The unit will help you improve your day-to-day generic management skills, and will provide in-depth instruction on how to develop management into leadership. Security Design, Evaluation and Surveying “I have been doing this for years but after studying Unit 5 I finally understand it” was one student comment. The unit presents a wide range of tools, templates, models and good practice in how to optimise security management and design to get the best return on investment. Perimeter Protection A very practical unit in which you will study the essential elements of a perimeter (design basis threat, design, civil works, fencing, lighting, surveillance, intrusion detection etc.) and apply it to a practical context. By this point in the programme, assignments focus less on knowledge regurgitation and more on application – allowing you to evidence what you can do, rather than just what you know. Protecting Buildings A very comprehensive study of buildings security, addressing design, security vulnerability analysis, core security principles, structural hardening, locking systems and key control, intrusion detection, surveillance etc. The unit considers the different security characteristics of old and new buildings, and multi-tenant buildings. You will be assessed on your skill in application of the unit content. Access Management Perhaps the most important aspect of physical security, this unit builds on the previous with an in-depth operation and technical study of access management and automated access control systems. As well as the obvious hardware, card technology, biometrics and vehicle control considerations, this unit will address contraband detection. The assessment is very much case study focussed. Video Surveillance (CCTV) For many companies, a CCTV system represents a large part of the physical security budget. This unit will help you understand the subject in depth, from image acquisition, through transmission to storage. This is a rapidly developing area of technical security and this unit will better position you to negotiate with suppliers and installers to get the best value for money and optimum risk reduction. The assignment tests your skill in applying the theory to case study contexts. Facility Counter Terrorism The spectre of terrorism is ever present, threatening to cause large-scale casualties and disrupt business operations. This unit brings together experiences in protecting facilities in many different environments and packages it into a very comprehensive set of good practice principles that will enable you to optimise your protection against a wide range of threats. As well as addressing explosive threats, the unit is fully updated to include how to mitigate the threat from marauding terrorist firearms attacks. Protection of Information Information compromise is an often hidden disease, threatening many businesses with slow death as market share and competitive edge decline. Learn how to protect information in its many forms, from know-how, through hardcopy to digital data. The unit will also explain the extent of the threat to business from communications intercept. The output will be an awareness programme that you can deliver to your organisation. Protection of at-Risk Personnel Many business activities carry inherent risks to personnel, and laws pertaining to employees are quite explicit; you have a duty of care to reduce risk to as low as reasonably practicable. In this unit you will learn how to identify those at elevated risk and how to effectively mitigate a range of risks to personnel, including armed robbery, threats to overseas travellers or expatriates, kidnap, etc.
  • 3. “I WOULD RECOMMEND THIS COURSE TO ANYONE WITHIN OUR INDUSTRY.” Managing Director, Category Winning Company, 2013 Security Excellence Awards
  • 4. THE DETAIL Introduction The Certified Security Management Professional (CSMP) certification is administered by ISMI, the International Security Management Institute (www.ismi.org.uk). Aimed at security managers at all levels of the profession, the CSMP award provides a thorough grounding in the key areas of knowledge necessary to manage a security function. Certification Qualification Process The programme is modular. There are 12 units and you are required to complete one unit every month. Upon completion of each unit you will have a number of written tasks to undertake to evidence your understanding. Upon successful completion of all units, you will be awarded the CSMP. Cost The cost to complete the programme is £ (GBP) 750 + VAT where applicable. Fees are payable at the beginning of the programme and entitle you to 12 monthly reference units, access to a coach and final certification. Registration Email certification@ismi.org.uk Register now for next intake. Courses begin every two months. CSMP Clients Include Global FMCG Manufacturers; Global Logistics Companies; Multinational Oil and Gas Companies; National and International Telecoms Providers; Security Services Providers; Security Installers; Military Missions and Foreign Defence Forces and Contractors; European Union; UK Foreign and Commonwealth Office; Global IT Services Providers; Multinational Mining Companies; United Nations; Multinational Aviation Manufacturing Companies; Vehicle Manufacturing Companies; Multinational Technology Manufacturers; National Power Generation Companies; Overseas Governments; National Central Banks; Multinational Insurance Providers; Property Management Companies; Multinational Banks; Telecoms Manufacturers; Global Food and Beverage Manufacturers; Credit Card Providers; Global Internet Services Providers; Retailers; Multinational Power Generation Companies, Pharmaceutical Companies; Schools and Universities; Business Support Companies Contact Details enquiries@ismi.org.uk www.ismi.org.uk Telephone +44 207 206 1207 ISMI Certification Ltd. Company Registered in England and Wales 8235767 ACCREDITATION CSMP is accredited by Industry Qualifications (IQ) as a Level 6 Organisation Diploma. As such, it is a unique blend of high-level vocational and academic study, with emphasis on demonstrating advanced-level competence through application. CSMP is also accredited by Skills for Security, the security sector skills body for the UK. It reflects the National Occupational Standards for Security Management.
  • 5. TEN REASONS TO BECOME CSMP-CERTIFIED IN 2014 1. Develop your knowledge and application of risk and security management. 2. Improve your performance, your contribution to your existing employer, and enhance your marketability as a security management professional. 3. Enhance your credibility with an internationally-known professional certification; hundreds of students from over 85 countries have enrolled on the CSMP programme. 4. Prove that you are formally qualified to manage security operations and set yourself amongst the elite of the profession. 5. Demonstrate to your colleagues, partners and customers that you are well versed in industry-respected best practices. 6. Benchmark yourself against other security management peers; you will be enrolled into a cohort of students and will be able to measure your progress against that of other students, anonymously. 7. Demonstrate a commitment to personal professional development. 8. Establish a formal benchmark of security management performance in your organisations by setting CSMP as the team standard. 9. Position yourself to better negotiate performance- and qualification- related pay. 10.Employers recognise that certified professionals are more productive.
  • 6. WEWANTYOUTOBESATISFIED “Very interesting, thought provoking, and definitely challenging” SECURITY MANAGER, GLOBAL HIGH-TECH COMPANY “This brilliant course is making me smart” SECURITY SPECIALIST, CANADA “The leadership module is by far the best I have ever encountered” SECURITY CONSULTANT, UK “The course has cemented all my practical knowledge into a complete package and I am already talking the talk!” REGIONAL SECURITY MANAGER, EMEA “Six months into the course I can wholeheartedly recommend it to both aspiring and experienced security managers” SECURITY MANAGER, LEISURE COMPLEX