Security Management

Why Attend

This course will provide participants with an insight into the fundamentals of managing modern and effective security operations.

It will address a wide variety of topics such as security policies and procedures, risk management, access management, and investigation, to enable all participants to understand the principles of security and risk management.

The course will provide practical and up-to-date security management skills and techniques that can be implemented within each participant’s organization and security team.

Course Methodology

This course is highly interactive and includes group discussions, case studies, and syndicate work. It also includes practical exercises that enable all participants to apply the advanced knowledge they gained and demonstrate their skills in security management.

Course Objectives

By the end of the course, participants will be able to:

  • Explain the process of designing procedures
  • Conduct a security survey
  • Explain risk management
  • Describe and understand access control systems
  • Explain the management and selection of manpower
  • Apply basic investigation procedures
  • Utilize crisis management techniques

Target Audience

Managers and security staff wishing to develop an understanding of security management techniques and to further their knowledge of the security function, approach, and strategy.

Target Competencies

  • Security management
  • Developing Security policies and procedures
  • Handling Physical security
  • Conducting Risk assessment
  • Incident management
  • Conducting Incident investigation


South Africa

Training Dates:

Each course starts every Monday of each week. Please book your training on a date that is a Monday.

Course Duration:

Unit Standard:

NQF Level:

Number of Credits:

Course Fees

Note: Please fill in the online application form on the left or bottom if this page to receive a quotation with detailed pricing from AATICD.

How to Apply:

To Apply Simply Fill in the Online Enquiries / Applications form on the Right Sidebar or Bottom of this website


When filling the online application form; please take note of your desired Training Month, Duration in Weeks and Training Session. This will give us the exact dates you will be attending your classes.

Also note that Tuition Fees must be paid upfront on or before training start date. This is to ensure that all resources are made availabe for you before you start. You will not be allowed into training if fees are not paid and verified.

Also note that Tuition Fees Cancellations must be made 14 business working days before the starting date of training. This will allow us to do a 50% refund of the total amount paid. If cancellations are made thereafter note that no refund will be made to delegates.

Tuition Fees include teas and lunch as well as either a laptop or tablet which a delegate will take home free of charge.

Tuition Fee DOES NOT include Accommodation, Dinners and other Extra Curricular Activities or Incidentals. Delegates are expected to fund this on their own. AATICD will not be held accountable for any incidents to delegates.

In-House Trainings are also available for 3 or more delegates for any duration. Please consult with our Administration for such In-House training bookings.

Course Outline

  • Security policies and procedures
    • What the policies and procedures cover
    • Who should design the policies and procedures
    • Why security policies are of use to companies
    • Why security procedures are of use to companies
  • Security operations management
    • What operations management is
    • What are the responsibilities
    • How the remainder of the security team fits in
  • Perimeter and building security
    • Measures available
    • Developing security on sites
    • Managing security on sites
  • Introduction to security surveying
    • Understanding the risks
    • Considering security options
    • Communicating results to the client
  • Security risk management
    • Introduction to security risk management
    • What risk management means
    • Who applies risk management
    • Risk mitigation
    • Risk management continuum
  • Access Management
    • Types of access systems
    • How the access systems are used
    • Introduction to CCTV
    • Intruder detection
    • Implementing the systems
  • Manpower selection and development
    • Selecting the right profile
    • Screening of individuals
    • Vetting of individuals
    • On-going professional training
  • Introduction to investigations
    • Gathering of information
    • Purpose of the investigation
    • Requirements of the investigation
    • Upholding Credibility
    • Keeping Documentation
    • Legal aspects
  • Crisis management
    • Dealing with a crisis
    • Fall back planning
    • Post-incident considerations