Training Course: ISPS Company & Ship Security Officer

MM234666 27 Apr - 1 May 2025 Cost : 2625 € Euro
Register Inquiry Choose Date

Introduction

This training course equips participants with an extensive understanding of the ISPS Code and its requirements based on model courses 3.20 & 3.19. Upon successful completion, the trainees will be able to acquire qualification as Company Security Officer (CSO) and Ship Security Officer (SSO).

Built your knowledge, understanding, and proficiency as required by STCW 2010 and the ISPS Code to undertake the tasks, duties, and responsibilities as Company Security Officer (CSO) or Ship Security Officer (SS

Assist current and future CSOs/SSOs, to develop effective and practical skills in order to carry out their tasks effectively

Help companies apply the ISPS Code and achieve compliance

Course Objectives of ISPS Company & Ship Security Officer

By the end of this course participants will:

  • Achieve ISP's understanding according to IMO model courses 3.19-3.20
  • Develop, implement, maintain and supervise Ship Security Plans
  • Identify threats and vulnerabilities and assessment of security risks
  • Be aware of methods for inspecting on and monitoring security measures onboard ships
  • Carry out the opera on, testing and calibrate on of security equipment and systems Enhance security awareness and vigilance of company staff (ship and shore)
  • Grasp through analysis other International conventions like SUA etc.
  • Learn the main requirements of the US (i.e. 33CFR as amended)
  • Know all the Basics from the Guide to Mari me Security & the ISPS Code 2012 edit on Use practical case studies and exercises to learn possible measures for compliance with the maritime security requirements as laid down in the ISPS Code.

Target Audience of ISPS Company & Ship Security Officer

Personnel involved in maritime security matters coming from shipping companies Designated Person Ashore

  • Company Security Officer
  • Quality Manager
  • Operation Manager
  • Superintendents
  • Internal Auditors
  • Masters
  • Officers and crew involved in security issues onboard

Course Outlines of ISPS Company & Ship Security Officer

Part A: ISP's code for CSO & SSO and other International Conventions - ISP's details

Part A: ISPS for CSO/SSO

Introduction

  • UNCLOS

  • Maritime Zones

  • 1988 SUA Convention

  • Security Cases-Incidents

  • Stowaways & Illegal Migrants

  • Drugs & weapons smuggling

  • Sabotage & Arson

  • Undeclared and/or incorrectly packed dangerous goods

  • Oil Theft

  • 11 September 2001

  • Diplomatic Conference December 2002 Conference resolution 1

ISPS (CSO-SSO) & International Conventions

  • The ISPS Code’s Background

    • History

    • Progress

  • The application of SOLAS Ch. XI-2

    • New provisions of SOLAS Ch. XI-2

    • Application of SOLAS Ch. XI-2

    • SOLAS Ch. XI-2, Contents

  • The ISPS Code’s Purpose and Objective

    • Purpose

    • Objectives

  • The definitions used in SOLAS XI-2 and ISPS Code Part a and B

    • General

    • Safety and Security

    • SOLAS Ch.XI-2 Reg.1 – Definitions

    • ISPS Part A, Sec.2 – Definitions

    • Basic Tools

  • The ISPS Code's Functional Requirements

    • Implications for the ship

  • The ISPS Code's Detailed Requirements

    • ISPS Code, Part A Requirements

    • ISPS Code, Part B Requirements

    • Compliance and Use of Checklists

    • Solas Reg XI-2/9 Control & Compliance

    • Guide to Maritime Security ISPS edition 2012-Useful Tables

    • Cross-reference of Government & Industry Responsibilities

    • IMO Guidance material on Maritime Security Measures, 1986-2011

    • Useful Tables

    • Revision of SUA Convention

  • The basic US legislation and regulations

    • Maritime Transportation Security Laws

  • International conventions and E.U. legislation

ISPS details

  • Security Risk Assessment Techniques related to Ship Operations

    • Basic Concept

    • Security Assessment Course

  • 2.2 Ship Security Assessments including On-Scene Security Surveys

    • On-scene survey

    • Ship Security Assessment

  • Developing and Updating Ship Security Plans

    • General

    • Instruction for Drafting Ship Security Plan (SSP)

    • General Policy related to Security Measures

    • Other Items related to Security

  • Duties and Responsibility of CSO/SSO, and Training

    • Company Security Officer (CSO)

    • Ship Security Officer (SCO)

    • Training, Drill and Exercises on Ship Security

  • Contingency Plan and Reporting of Security Incident

    • Contingency Plan

    • Reporting of Security Incident

  • Security Administration and Protective Measures

    • Security administration

    • Protective Measures

  • Handling of Information and Communication related to Security

    • Identification of information and communication related to security

    • Handling of security information and communication

  • Kinds of Ship Security Verification and validity of ISSC

    • Kinds of Verification

    • Duration and Validity of Certificate

  • The flag Administration’s role related to the ISPS Code

    • Flag Administration’s Role

    • Port State’s Role related to Ship Security

    • Port State’s Role related to Port Facility

    • Coastal State’s Role

Current security threats and patterns

  • Current security threats and patterns

    • Definition

    • Kinds of Security Threats

    • Types of terrorism and Example of maritime terrorism

  • Recognition and detection of weapons, dangerous substances and devices

    • Classification of Weapons and Dangerous substances

    • Introduction of Explosives

    • Types of bomb and recognition

    • Identifying and Responding against Explosives

    • Detection and Searching of Weapons and Explosives

  • The crowd management and control techniques

    • The crowd management in passenger ship

    • Passenger guide in emergency situations

    • Muster List

  • Characteristics and behavioral patterns of persons who are likely to threaten security:

    • Persons who are likely to threaten security

    • Characteristics and behavioral patterns of terrorists

    • Reason behind terrorism and characteristics of modern

    • terrorism

    • Characteristics of Modern Terrorism

    • Terror Groups

    • Terrorist Organization List of U.S. Department of State

  • Techniques used to circumvent security measures

    • Techniques used to circumvent

    • Countermeasures

  • Security and surveillance equipment and systems and their operational limitations

    • Ship’s Security Equipment & Systems:

    • Locks and Locking

    • Seals

    • Deck Protection

    • Screening

  • Port’s Security Equipment & Systems:

    • Port Screening

    • Surveillance

    • Gates and Barriers

    • Vehicle Systems

    • Perimeter Protection

    • Security threats associated with the ship/port interface

    • Cargo Handling

    • Ship’s Stores

    • Stowaways

    • Sabotage

ISPS Assessment & Plans

  • IMO requirements for security assessments and plans

  • Some Key Challenges

  • Maritime Risk Assessment Model

  • Security Assessment Principles

  • AS/NZS 4360:1999 – Sample Risk Management Standard

  • Steps in the 4360 Risk Assessment Process

  • Ship Security Assessments

  • Security Assessment Reports

  • Tailor Security Plan Coverage

  • Common Characteristics Port Facilities & Ships

  • IMO / ISPS Security Levels

  • Who Requires Security Plans

  • Relevant Skills and Experience

  • Conclusion

Part B: Cyber Security

Introduction

  • What is Maritime Cyber Security?

  • IT and OT systems

  • IMO related Resolutions, Circulars and Guidelines

  • Industry Guidance on Maritime Cyber Security

Cyber Security Risks

  • ISM/ISPS – Identified Risks

  • Company risk assessments procedure

  • Third party risk assessments

  • Risks related to Ship-Port interface

  • Recent cyber security regulations

  • Assessment of Identified Cyber Risks

  • Identify threats

  • Identify Vulnerabilities

  • Risk Calculation

  • Risk Mitigation (corrective/preventive measures)

  • Steps for cyber security plan preparation

  • Check your Cyber Security Status

 22 Portman Square, Marylebone, London W1H 7BG, UK
 3 Oudai street, Aldouki, Giza, Giza Governorate, Egypt
 0020233379764
 00201095004484
 00201102960555
 00201102960666
 19 Mayıs Mahallesi, 19 Mayis Street No 2 Sisli, 34360 Istanbul/Turkey
 00905357839460
 Australia Street, Raouche Beirut, Lebanon .، Beirut, Lebanon
 0096181746278
 811 Massachusetts Avenue, Boston, Massachusetts, 02118, USA
 6 Beirut Street - Fifth Circle Abdoun, P.O. Box 831370, 11183 Amman, Jordan
Copyright Global Horizon Training Center © 2019