top of page


Anchor 1

Counter Terrorism Security Consultant




Through a mix of briefings, desktop exercises and practical’s this course provides attendees with a skill set that would allow them to act as a Counter Terrorism Security Consultant. This includes, being able to understand the threat and then survey a site, deliver a full report identifying and setting out the key vulnerabilities, and make recommendations that would allow the customer to make informed security decisions.




  • The Current terrorist threat

  • Ten principles of Crime Prevention

  • Asset protection

  • Understand Holistic Counter Terrorism protective security

  • Develop Counter Terrorism Security measures for Crowded Places

  • Have an understanding of risk management

  • Understand the security needs of the business community

  • Be able to identify vulnerabilities and design control measures

  • Be able to conduct a CT survey of a site

  • Be able to write a professional detailed survey form with recommendations

Who Should Attend.

This course is suitable for anyone who works as a security manager with new or existing responsibilities for protecting assets or for anyone who wants to have a career as a Counter Terrorism Security Consultant.



One week duration for English speakers extended to two weeks if translated.


The following courses are all one day courses.

Guard Force Professionalisation




Through a mix of briefings and desktop exercises this course provides attendees with a skill set that would allow them to a build a Security culture in their organisation. This includes the understanding good practices in security guarding, professionalising and motivating the security workforce.


  • The threats to business

  • Your responsibilities

  • Securing your assets

  • Integrating security

  • The threat from within

  • Hostile reconnaissance

  • Case studies

  • Making your plan

  • Business continuity


It is especially relevant to security managers or for staff who have security responsibilities.

Security Search Course




Through a mix of briefings, desktop exercises and practical’s this course provides attendees with a skill set that would allow them to understand how to organise a physical search of a location. How to search and seal that location and then how to set up search processes for those wishing to enter the secure area. This search can be aimed at explosives, weapons or contraband.



  • Threat update and why search is important to that venue

  • Improvised explosive device (IED) component parts

  • Types of explosive, what does a bomb look like

  • The power of an explosion

  • Your actions on a find

  • Systematic Searching skills and techniques, Person-Vehicle-Building and Area searches

Who Should Attend.


This course is specifically aimed at those who have responsible for a site or venue or those who have responsibility for security or search teams.

Protecting Against Vehicle Attack




This course provides attendees with an understanding on how they can design out vehicle attacks on their buildings and sites.




  • Understand the various types of vehicle borne attack

  • Understand the physics of vehicle attacks

  • Understand the ways of stopping hostile vehicles

  • How you can reduce vulnerabilities to your site or building

  • Designing in protection

Who Should Attend.


This course is suited to security professionals, architects, Highway engineers, or any person who is involved in the physical security of a building or a site.



Securing Businesses From The Insider Attack.



To help the delegate understand the value of personnel security and understand best practice, to implement within their own business.



What’s the most important factor of a successful security program? Protective security? Technology? Strong policies?


While all of these are important, they are worthless without a strong security culture. If personnel do not understand the need for security then your business is at risk. There will be breaches and security measures will be bypassed (either intentionally or inadvertently). This could be catastrophic for your business, not to mention your reputation.


Building a strong security culture begins at the top of the organisation. Business spends incredible amounts of money buying security equipment. Often forgotten is the human element. Buying more security does not necessarily make you more secure.


Too often, when considering security requirements and controls, there is more emphasis on processes and technology than on people. Poorly managed personnel risk and security culture can easily undo any of your controls and create the weakest link for an organisation’s security.


One poor decision can undo an organisation’s expensive security controls.


Is your organisation at risk?


There are thousands of examples of security breaches which have devastated businesses and destroyed brands. Examples such as confidential information being found on the street because it was carelessly thrown into the rubbish bin; or a file containing sensitive documents being left in a public place. The consequences for either scenario can be severe, and whilst policies may exist prohibiting employees from doing either, there are no technical or process controls (other than physically checking every sheet of paper that leaves a building) to prevent these occurring.


Significant security risks exist due to the accidental or deliberate actions (or inactions) of employees.


Simple human error, ignorance and omission are the root of most data breaches and e-crimes. While most people will try to do the right thing, everyone makes mistakes or may be unaware that what they are doing is actually a risk people business. Common examples are staff sharing passwords, or downloading free software from the Internet without thinking of the consequences.


Physical security is easily overcome by an insider. Many businesses fail to adequately check the credentials of new staff or recognise when staff are becoming a threat. Unscrupulous companies can steal intellectual property or gain a commercial advantage by planting staff inside your business. A good example is when businesses leave important documents on desks overnight and allow unchecked staff from outsourced services to have free access overnight.


Awareness and training goes a long way to educating employees on how to prevent risks. However, the priority employees give to security and whether or not they really pay attention to the awareness training is influenced by the senior management.



The threat to business

Risk assessing roles

Implementing correct pre-employment checks

Signs of poor security practice

Building a security culture

Correct exit procedures



Who should attend


HR managers

Security managers

Security professionals


Counter Terrorism Security Risk and Auditing




A one day course designed to give those with security responsibility but limited experience, the knowledge required to manage the security teams and decide the levels of security required at their site.·      


  • Security risk assessment

  • Protective security

  • Physical security

  • Personnel security

  • Information security


Who should attend


Security managers

Facilities managers

Those with responsibility for assets.

Counter Terrorism Awareness course for Architects, Town Planners and Developers.


This bespoke course is designed for those persons who will have responsibility for designing or planning Crowded Places. The course gives delegates an awareness of current and future terrorism threats and how this should affect their designs. 

The course uses multi-media to assist learning.

The course will consist of a three (3) hour classroom based practical work. 




To develop / enhance the knowledge and awareness of key staff.    


This course provides the essential knowledge required by anyone with responsibility for designing public space, especially Crowded Places which are still the favoured target for International terrorists. 

Any development that involves Crowded places is likely to be submitted to Police Counter Terrorism Security Advisors (CTSA) from the local Police Force. This will necessarily involve observations and delays in plans that do not conform to Counter terrorism good practice. This course will allow you to understand those issues to prevent delays and disputes with the CTSA’s.


At the conclusion of the course the delegates will be able to understand the threat and modus operandi of terrorism and serious crime groups. Be able to identify the specific risks and vulnerabilities terrorism creates, and be aware of the issues that they bring to the way space is used.


Course content    


The following course content is not exhaustive but will include;  


  • Terrorism threat   

  • Terrorist attack options (learning from history)

  • Core Counter Terrorism protective security measures

  • Putting the knowledge into practice

There will also be a series of practical and multi-media exercises which help the student put the learning into practice. The course would follow the following timetable.



Terrorism Awareness training and Crisis Management Plan development Course

Business have a ‘Duty of Care’ to provide staff with awareness and training in the areas they might be confronted. This course allows staff to understand some life skills that will help them protect themselves, customers and the Business in the event of a crisis. 


Our approach; 


The most important issue for staff in the event of a crisis is for early recognition and then a good understanding of priorities and actions whilst the incident is happening. It is a fact that those who have thought through their actions in the event of a crisis or emergency are much less likely to freeze and much more likely to make good decisions. We suggest that a good way to prepare staff would be to have an initial session with members of the SMT where a number of scenarios are discussed and action-lists completed for staff to follow in the event of a similar incident occurring. 


The training session would involve the following;

A series of half day training sessions with the following leaning outcomes; 


1. Understanding the current threat of terrorism and serious crime and how it impacts the business

2. How an attack may manifest itself and develop and impact The business

3. What staff would be expected to do in the various situations covered 

4. Help to provide an action-list on 1st actions to assist in the event of one of these crises
taking place.


(please see below for the suggested incidents to be covered) 


Suitable for up to 25 delegates per session. 

Anchor 2
Anchor 3
Anchor 4
Anchor 5
Anchor 6
Anchor 7
Anchor 8
bottom of page