This course is free and editable. Yours to re-brand and tailor to your needs!
This course will help you understand access control. It will discuss why access control is important, the threats it addresses, and how to achieve effective access control within the company premises. Source: “8-hour Pre-Assignment Training Course for Security Guards” by New York State Division of Criminal Justice Services (NYS DCJS)
Click through the microlessons below to preview this course. Each lesson is designed to deliver engaging and effective learning to your team in only minutes.
This course is free and completely editable. Update the text, add your own slides or re-brand the entire course — with our no-code authoring tool, the sky’s the limit!
Follow the interactions on each screen or click the arrows to navigate between lesson slides.
Access Control for Security Officers Course - Lesson Excerpt
Access Control and Why It's Important
From the previous scenario, you know that you need to be selective in allowing access within the company’s premises. This is the concept of access control.
Access control is the process of limiting the entry or access of people, vehicles, or objects into the company’s facilities or area of jurisdiction.
It also means being selective of whom to give information about the company.
The security of any facility greatly depends on what physically or electronically goes into or out of the company’s premises.
Access control is important to you as a security officer and the company because it is one of the best ways to prevent crime and control loss within the company due to theft or injury.
Being selective about giving access to company information or resources, as well as entry and exit within company premises, will deter damage to company property.
Knowing what goes into and out of the company will help you ensure the safety of visitors, customers, and fellow employees.
As a security officer, why should you use access control methods? Select all that apply
Access Control for Security Officers Course - Lesson Excerpt
**Threats to Access Control **
Day or night, your building or facility is always under threat.
When you're on duty, it is your responsibility to respond to threats.
To be more prepared, you have to be on your feet and be aware of what goes on inside and outside your facility.
Knowing the four factors which can determine the level of access control that is needed in the building or facility will help you protect your jurisdiction better.
Which of the following is not a factor that can determine the level of access control needed in a facility? Select all that apply
Overt Threats Overt threats are common things you need to watch out for such as theft, general crime, and fires. Covert threats on the other hand are those that are less common or displayed. Recall, DETECT, DETER, and REPORT to respond to these threats more quickly.
Sabotage This is usually done through subversive and treacherous tactics such as damaging company property or equipment. Sabotage can be done internally by fellow employees or externally by visitors, customers, and the like. You can catch saboteurs by consistently following your directives.
Espionage This is the infiltration or covert surveillance of the company or facility either by employees, visitors, or competitors. It is your job to protect the company from espionage to avoid giving rival companies a greater competitive advantage.
Terrorism This is the illegal use of force or intimidation on people or property to support a radical cause. There are cases wherein bombers bring live explosives to buildings or facilities. By observing access control, you'll be able to prevent the entry of terrorists within your jurisdiction.
Access Control for Security Officers Course - Lesson Excerpt
Methods to Achieve Effective Access Control
Since you're already familiar with the threats you need to watch out for, the next thing you need to know are the types of access control and the methods you can employ.
Here's one scenario: While you're on duty, an unfamiliar person visits your station and is asking for entry to a secured area of the building.
The person claims that he is an employee and will only be doing maintenance work.
You look at the person and see that they are wearing the company ID.
Aside from those already mentioned, you can also make use of log-in procedures.
As a security officer, you can ask employees and visitors to follow procedures before you give them entry or access.
Some log-in procedures that you may employ are: Meticulous checking of bags or other hand carried items. Fingerprint scanning for employees. Facial recognition before entry. Attendance checking
By following log-in procedures, security officers like you would be aware of all occupied areas in the building or facility in case of emergencies and prevent any untoward incidents from occuring.
EdApp is an award winning, mobile first microlearning platform with integrated authoring and delivery. EdApp contributes training courses that have been created by the in house instructional design specialists.
Course rating
Fun and easy to learn.
awesome