Security Education, Awareness and Training
SEAT from Theory to PracticeBy
- Carl Roper
- Dr. Lynn Fischer
- Joseph Grau
This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
CSO's and security managers, private security consultants, security trainers, security educators and course/program developers in the 2- and 4-year college market, private security training companies and academies.
Paperback, 400 Pages
Published: August 2005
Imprint: Butterworth Heinemann
"This book is, foremost, a study of people, and secondarily, a model for effective security training programs. This is a must-read for every security educator and instructor, and even some human resources professionals. The concepts presented here might just redefine how educators develop and teach their curriculums.â Security Management
- Chapter 1: Security Programs, Security Education, and This BookChapter 2: Starting with Some BasicsChapter 3: Goals, Objectives, and a ModelChapter 4: Performance Problem Solving: Figuring Out What's Going OnChapter 5: Security Education and the Employment Life CycleChapter 6: Motivation: Getting People to Do ThingsChapter 7: Motivation: Some Theories with Practical ApplicationsChapter 8: Planning an Awareness ProgramChapter 9: Promoting Informed Awareness: Program ImplementationChapter 10: Practical Exercise: Promoting an Informed AwarenessChapter 11: Training and Education: Going One Step BeyondChapter 12: Planning to Train: Reader ExerciseChapter 13: Moving Security Education into the Work EnvironmentChapter 14: How Not to Train: A Commonsense AlternativeChapter 15: Evaluating Security Education ProgramsChapter 16: Security Education in the Electronic AgeAppendicesIntroduction: Security Products and PresentationsA: Focus Group ProtocolB: Security PresentationsC: Security Articles: The Protection of InformationD: Security Articles: Espionage and the Theft of InformationE: Security Articles: Foreign Travel RisksF: Security Articles: The InternetG: Internet Security LinksH: Security Articles: General InterestI: Audiovisuals: Getting the Word Out to the Right Audience - The Right Way