Health, Safety & Security

Training Course: Risk, Security Threat, and Vulnerability Assessment (TRVA)


Register Now
Quick Inquiry
Discount Group Download Brochure (38)

HE234806

11 - 15 May 2025

Cairo (Egypt)

Hotel : Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Cost : 3575 € Euro

Introduction

One of the most crucial aspects of security risk management is the Threat, Risk, and Vulnerability Assessment (TRVA). Security decisions are far too frequently made without a thorough understanding of the danger and weaknesses that affect a company and its assets. The purpose of this course is to give participants a deeper understanding of the most recent security planning and assessment principles and techniques. Threats and risks will be discussed in the course, along with how they affect security operations and evaluation. It will define and evaluate vulnerability and show how risk mitigation depends on the interdependence of risk, threat, and vulnerability; physical, technological, and human elements of security, the course will provide tools and methodologies for understanding critical Threat, Risk, and Vulnerability aspects, allowing delegates to take an effective approach to security

Objectives

  • Robust understanding of Threat, Risk, and Vulnerability methodologies

  • knowledge of hazard and risk identification, assessment, and evaluation in context, including various threats, risks, and treatment choices

  • Understanding of Asset identification, protection, and criticality

  • Ability to understand Risk Management Process when liaising with stakeholders

  • Understanding scenario planning; classifying threats, attack types, likelihood, and effects esteem for integrated security systems

  • Insight into innovative security practices

Target Audience 

  • Security managers and

  • practitioners

  • Physical protection

  • professionals

  • Security consultants

  • Aviation security

  • Critical infrastructure security

  • Hotel security

  • Public installations

  • Event Security

  • Building managers

  • Individuals who are looking to develop their security skills and professional knowledge.

Outlines

Day 1

Introduction

  • gather relevant information from different sources sufficient to identify and evaluate clients’ assets

  • assemble and account for all pertinent data to support the asset evaluation.

  • use logical and systematic analysis of information to evaluate clients’ assets

  • determine the potential impact on your clients through the loss of identified assets

  • Consider important standards that can have an impact on the assets of your client's security.

  • prioritizes the value of identified assets by criteria agreed with your clients

  • evaluate relevant information according to its usefulness

  • maintain the security and confidentiality of information relevant to your client’s assets

  • Information about assets: nature, value, cost of replacement, the potential impact on the client

  • sources of information: internal to the client, external to the client, publicly available, confidential,

  • official or restricted

  • assets: people, property, premises, information, reputation, brand,

  • Financial, commercial, public relations, operational, and business interruption effects

  • critical requirements: commercial, contractual, regulatory, insurance

Day 2

Identify and evaluate threats to clients’ assets

  • gather relevant information from different sources sufficient to identify and evaluate threats to clients’

  • assets

  • collates and takes account of all relevant information to support the evaluation of threats, including the

  • sources of threats

  • logically and methodically analyze data to determine the threats to the assets of the customer.

  • categorizes threats and possible methods of attack on assets and potential security measures

  • evaluate relevant information to determine its usefulness

  • maintain the security and confidentiality of information relevant to threats to your client's assets

  • information about threats: sources, possibility, and probability of attack, the capability of the source

  • sources of information: internal to the client, external to the client, publicly available, confidential,

  • official or restricted

  • sources of threats: external to the client, internal to the client

  • threats: commercial, financial, criminal, natural disaster or hazard, political, actual, potential,

  •  accidental, deliberate

Day 3

Determine the risks to the protection of the client's assets

  • take account of sufficient valid information to determine the risk to clients’ assets

  • determine the level of risk to clients’ assets, based on systematic analysis and evaluation of threats

  • and vulnerabilities

  • inform clients promptly of situations where there are imminent risks to assets

  • produce reports that contain accurate and complete details of risk and security measure options,

  • where applicable

  • record information in a suitable and retrievable format

  • maintain the security and confidentiality of information relevant to risks to clients’ assets

  • information about: assets, threats, vulnerabilities, and other relevant factors

  • risk to assets: very high, high, medium, low

  • assets: people, property, premises, information, reputation, brand

Day 4

Identify and evaluate vulnerabilities in clients’ current security arrangements

  • gather relevant information from different sources sufficient to identify and evaluate vulnerabilities in

  • clients’ security arrangements

  • collate and take account of all relevant information to support the evaluation of vulnerabilities

  • use logical and systematic analysis of information to identify and evaluate vulnerabilities in clients’

  • security arrangements

  • evaluate relevant information according to its usefulness

  • identify actual and potential vulnerabilities in clients’ security arrangements

  • maintain the security and confidentiality of information relevant to the vulnerabilities in your clients’

  • security arrangements

  • Vulnerabilities include unauthorized access, theft (of data or property), damage, interference with operations (by internal or external parties), and kidnapping or harm to employees or contractors.

  • security arrangements: permanent, temporary, staff security awareness

Day 5

Practical Group Training Exercises

  • assign a topic for investigation, resulting in the trainees' needing to report their results to the others. Both the trainer and the participant offer helpful criticism to the trainee members after each presentation.

  • Total class participation cumulating with a presentation and instructional debrief on each subject before moving on to the next objective

Health, Safety & Security

Training Course: Risk, Security Threat, and Vulnerability Assessment (TRVA)


Register Now
Quick Inquiry
Discount Group Download Brochure (38)

HE234806

11 - 15 May 2025

Cairo (Egypt) - Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Hotel : Holiday Inn & Suites Cairo Maadi, an IHG Hotel

Cost: 3575 € Euro


  About Cairo

Cairo is a mesmerizing assortment of iconic monuments, bustling markets, and ancient sites encircled by a vast and sprawling metropolis. At its core lies a maze-like medieval quarter. A world away from the modern side of the city, it boasts a seductive blend of intricate mosques, jostling crowds, madrasas, and traditional hammams. No visit could be complete without visiting the awe-inspiring Giza Pyramids that preside over the city's horizon. Whether you come to delve into the city's ancient past, dive into colorful souqs, sip mint tea and contemplate thousands of years of history or explore the city's cosmopolitan side, you'll be left with memories to last a lifetime.


  Things to do and places to visit in Cairo

The multi-layered capital of Egypt offers its visitors lively markets, authentic restaurants, and a multitude of ancient sights and archeological findings. Gaze in wonder at the Pyramids, take an awe-inspiring look at Tutankhamen's burial mask, shop for handmade souvenirs in the bazaars or hop on a sunset cruise down the Nile and embrace the sensory overload that is Cairo.

Take a vacation in Cairo and you can:

  • Visit the Great Sphinx of Giza, one of Ancient Egypt's great mysteries.
  • Explore the ramparts of the Salah El-Din Citadel.
  • Join locals drinking coffee at Fishawi Café, one of Cairo's first cafes and most important meeting spots.
  • Marvel at the seemingly endless historical artifacts on display at the Egyptian Museum.
  • Learn about the Ummayad, Ottoman, and Ayyubbid dynasties and more at the Museum of Islamic Art.
  • Haggle for souvenirs and gifts at the Khan el-Khalili souk.
  • See one of the world's oldest universities at the Al-Azhar Mosque, one of the city's original mosques.
  • Take a tour of the showstopping Giza pyramids.
  • Savor local cuisine such as mezze in the old city.
  • Wander through the labyrinth-like streets of Coptic Cairo, the city's ancient quarter, and spot Roman relics.
 22 Portman Square, Marylebone, London W1H 7BG, UK
 3 Oudai street, Aldouki, Giza, Giza Governorate, Egypt
 0020233379764
 00201095004484
 00201102960555
 00201102960666
 19 Mayıs Mahallesi, 19 Mayis Street No 2 Sisli, 34360 Istanbul/Turkey
 00905357839460
 Australia Street, Raouche Beirut, Lebanon .، Beirut, Lebanon
 0096181746278
 811 Massachusetts Avenue, Boston, Massachusetts, 02118, USA
 6 Beirut Street - Fifth Circle Abdoun, P.O. Box 831370, 11183 Amman, Jordan
Copyright Global Horizon Training Center © 2019