Date | Format | Fees | ||
---|---|---|---|---|
27 Feb - 01 Mar, 2024 | Classroom | ₦250,000 | Register | |
27 Feb - 01 Mar, 2024 | Classroom | ₦250,000 | Register | |
23 Jul - 26 Jul, 2024 | Classroom | ₦250,000 | Register | |
05 Nov - 08 Nov, 2024 | Classroom | ₦250,000 | Register |
Event Details
At the end of this course the participants will be able to:
- Define the nature of their facility and how they are affected by the requirements of the ISPS code
- Identify the mandatory and guidance regulations of the ISPS code
- Develop risk assessment tools towards the Port Facility Security Assessment (PFSA)
- Construct the 3 levels of the Port Facility Security Plan (PFSP) with enhanced knowledge of security issues
- Operate and interact with the port facility security plan with the ships security officer and ships master
CONTENT:
The Background to the International Maritime Security Framework:
- Who the code applies to
- Types of port facilities
- Protection categories
- Understand the ISPS code
- Understand the relevant international conventions, codes and recommendations relating to the ISPS Code
- Understand the Parts of the International Ships and Ports Security (ISPS) Code
- Understand the Application of the ISPS Code
- Understand the Functional Requirements of the ISPS Code
- Understand the Responsibilities of Contracting Governments
- Understand the Roles of Recognised Security Organisations (RSO)
- Understand the roles and responsibilities of the Port Facility Security Officer (PFSO)
Recognition and Detection of Weapons, Dangerous Substances and Devices:
- Firearms
- Low explosives
- Incendiary devices
- Grenades
- High explosives
- Detonators
- Timers
- Batteries
- Timer power units
Introduction to Port Facility Security:
- Security administration
- Responsibilities and functions of security organizations
- Handling sensitive security-related information
- Knowledge of current security threats and patterns
- Techniques used to circumvent security
- Security equipment and systems
- Characteristics and behavioral patterns of persons likely to threaten security
- Security-related communications
TRAINING METHODOLOGY
The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.
-
Venue
Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.
Share this course