Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk
Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks
Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding
Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan
Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security
Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures
Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention