Return

Perimeter Protection Systems

In the course of this seminar the users are taught in detail the aspects of perimeter protection and detection which are described in common rules and recommendations. The knowledge which is substantial for the application is communicated. The participants learn about the components of perimeter protection and detection systems and are enabled to evaluate these on their effectiveness and usefulness – also under financial aspects. Knowledge on calls for tenders and planning examples complete the know-how earnings.

Duration : 2 days (2 x 9 units of 45 minutes)

Countries Running the Course

If this course is not available in your country, please contact with your member training.

• manufacturers and distributors
• planer and installer of security techniques
• responsible and charged persons for security in companies, organisations and authorities
• security consultants and planners
• employees of insurances
• police authorities
• private security companies

Basic knowledge or experience in the field of electronic and mechanical security measurements are helpful.

At the end of the course the students will have gained:
• knowledge of the relevant Security guidelines for Perimeter
• substantial knowledge for application of the guidelines as well as perimeter protection
• knowledge about components of perimeter protection and detection systems
• ability to evaluate the effectiveness and usefulness (also under financial aspects) of perimeter protection and detection systems
• knowledge on calls for tenders and planning examples

• risk analysis – target definition – overview on measurements
• compatibility of structural, physical and organisational and electronic measures
• scope, definitions and sector concept
• danger and risk analysis
• structural-physical measures and barriers
• signalling and detection systems
• types of messages
• activation and deactivation
• connection to alarm management systems and intrusion detection techniques
• organisational measures
• system documentation and issues on interfaces
• operation and maintenance
• cost estimate on base of examples
• case examples/implementation exercises

None

Attest