This training course equips participants with an extensive understanding of the ISPS Code and its requirements based on model courses 3.20 & 3.19. Upon successful completion, the trainees will be able to acquire qualification as Company Security Officer (CSO) and Ship Security Officer (SSO).
Built your knowledge, understanding, and proficiency as required by STCW 2010 and the ISPS Code to undertake the tasks, duties, and responsibilities as Company Security Officer (CSO) or Ship Security Officer (SS
Assist current and future CSOs/SSOs, to develop effective and practical skills in order to carry out their tasks effectively
Help companies apply the ISPS Code and achieve compliance
By the end of this course participants will:
Personnel involved in maritime security matters coming from shipping companies Designated Person Ashore
Part A: ISP's code for CSO & SSO and other International Conventions - ISP's details
Part A: ISPS for CSO/SSO
Introduction
UNCLOS
Maritime Zones
1988 SUA Convention
Security Cases-Incidents
Stowaways & Illegal Migrants
Drugs & weapons smuggling
Sabotage & Arson
Undeclared and/or incorrectly packed dangerous goods
Oil Theft
11 September 2001
Diplomatic Conference December 2002 Conference resolution 1
ISPS (CSO-SSO) & International Conventions
The ISPS Code’s Background
History
Progress
The application of SOLAS Ch. XI-2
New provisions of SOLAS Ch. XI-2
Application of SOLAS Ch. XI-2
SOLAS Ch. XI-2, Contents
The ISPS Code’s Purpose and Objective
Purpose
Objectives
The definitions used in SOLAS XI-2 and ISPS Code Part a and B
General
Safety and Security
SOLAS Ch.XI-2 Reg.1 – Definitions
ISPS Part A, Sec.2 – Definitions
Basic Tools
The ISPS Code's Functional Requirements
Implications for the ship
The ISPS Code's Detailed Requirements
ISPS Code, Part A Requirements
ISPS Code, Part B Requirements
Compliance and Use of Checklists
Solas Reg XI-2/9 Control & Compliance
Guide to Maritime Security ISPS edition 2012-Useful Tables
Cross-reference of Government & Industry Responsibilities
IMO Guidance material on Maritime Security Measures, 1986-2011
Useful Tables
Revision of SUA Convention
The basic US legislation and regulations
Maritime Transportation Security Laws
International conventions and E.U. legislation
ISPS details
Security Risk Assessment Techniques related to Ship Operations
Basic Concept
Security Assessment Course
2.2 Ship Security Assessments including On-Scene Security Surveys
On-scene survey
Ship Security Assessment
Developing and Updating Ship Security Plans
General
Instruction for Drafting Ship Security Plan (SSP)
General Policy related to Security Measures
Other Items related to Security
Duties and Responsibility of CSO/SSO, and Training
Company Security Officer (CSO)
Ship Security Officer (SCO)
Training, Drill and Exercises on Ship Security
Contingency Plan and Reporting of Security Incident
Contingency Plan
Reporting of Security Incident
Security Administration and Protective Measures
Security administration
Protective Measures
Handling of Information and Communication related to Security
Identification of information and communication related to security
Handling of security information and communication
Kinds of Ship Security Verification and validity of ISSC
Kinds of Verification
Duration and Validity of Certificate
The flag Administration’s role related to the ISPS Code
Flag Administration’s Role
Port State’s Role related to Ship Security
Port State’s Role related to Port Facility
Coastal State’s Role
Current security threats and patterns
Current security threats and patterns
Definition
Kinds of Security Threats
Types of terrorism and Example of maritime terrorism
Recognition and detection of weapons, dangerous substances and devices
Classification of Weapons and Dangerous substances
Introduction of Explosives
Types of bomb and recognition
Identifying and Responding against Explosives
Detection and Searching of Weapons and Explosives
The crowd management and control techniques
The crowd management in passenger ship
Passenger guide in emergency situations
Muster List
Characteristics and behavioral patterns of persons who are likely to threaten security:
Persons who are likely to threaten security
Characteristics and behavioral patterns of terrorists
Reason behind terrorism and characteristics of modern
terrorism
Characteristics of Modern Terrorism
Terror Groups
Terrorist Organization List of U.S. Department of State
Techniques used to circumvent security measures
Techniques used to circumvent
Countermeasures
Security and surveillance equipment and systems and their operational limitations
Ship’s Security Equipment & Systems:
Locks and Locking
Seals
Deck Protection
Screening
Port’s Security Equipment & Systems:
Port Screening
Surveillance
Gates and Barriers
Vehicle Systems
Perimeter Protection
Security threats associated with the ship/port interface
Cargo Handling
Ship’s Stores
Stowaways
Sabotage
ISPS Assessment & Plans
IMO requirements for security assessments and plans
Some Key Challenges
Maritime Risk Assessment Model
Security Assessment Principles
AS/NZS 4360:1999 – Sample Risk Management Standard
Steps in the 4360 Risk Assessment Process
Ship Security Assessments
Security Assessment Reports
Tailor Security Plan Coverage
Common Characteristics Port Facilities & Ships
IMO / ISPS Security Levels
Who Requires Security Plans
Relevant Skills and Experience
Conclusion
Part B: Cyber Security
Introduction
What is Maritime Cyber Security?
IT and OT systems
IMO related Resolutions, Circulars and Guidelines
Industry Guidance on Maritime Cyber Security
Cyber Security Risks
ISM/ISPS – Identified Risks
Company risk assessments procedure
Third party risk assessments
Risks related to Ship-Port interface
Recent cyber security regulations
Assessment of Identified Cyber Risks
Identify threats
Identify Vulnerabilities
Risk Calculation
Risk Mitigation (corrective/preventive measures)
Steps for cyber security plan preparation
Check your Cyber Security Status