Home
All Courses
About Us
Contact Us
Faqs
Login
✕
Home
All Courses
Security Courses
SIA Working in Private Security Industry (Distance Learning)
SIA Working in Private Security Industry (Distance Learning)
Curriculum
7 Sections
45 Lessons
8 Hours
Expand all sections
Collapse all sections
Chapter 1: The main characteristics and purpose of the private security industry
9
1.1
The key purposes of the private security industry
1.2
The aims and functions of the Security Industry Authority (SIA)
1.3
Licensable roles under the Private Security Act
1.4
Approved Contractor Scheme
1.5
Standards of behaviour
1.6
Community safety initiatives
1.7
How assignment instructions support the security operative role.
1.8
Benefits of using CCTV
1.9
Limitations of using CCTV
Chapter 2: Awareness of the law in the private security industry
5
2.1
Civil and criminal law
2.2
Trespassers
2.3
The Private Security Industry Act
2.4
Equality and diversity in the workplace
2.5
The Data Protection Act 2018 and the UK GDPR
Chapter 3: Arrest procedures relevant to security operatives
5
3.1
Arrest and limitations of arrest
3.2
The limitation of power of arrest
3.3
How to arrest
3.4
Following an arrest
3.5
The use of force
Chapter 4 : The importance of safe working practices.
9
4.1
Health and safety in the workplace
4.2
The health and safety at work etc. Act 1974
4.3
Health and safety responsibilities
4.4
Workplace Hazard and risks
4.5
Minimising risks to personal safety and security
4.6
Lone working
4.7
Safety signs and signals
4.8
Reporting health and safety accidents and incidents
4.9
Keeping personal information safe
Chapter 5: Fire procedures in the workplace
6
5.1
Fire safety measures
5.2
Elements needed for a fire to exit
5.3
Classification of fire
5.4
Fire fighting equipment
5.5
Action on discovering a fire
5.6
Fire wardens/marshals
Chapter 9: Terror threats and the role of the security operative in the event of a threat
7
6.1
Terrorism
6.2
Threat levels / Counterterrorism
6.3
Common terror attack methods
6.4
Actions to take
6.5
Suspicious packages
6.6
Suspicious activity
6.7
Responding to the suspicious behaviour
Chapter 11: Good practice for post incident management
4
7.1
Accessing help and support
7.2
Post incident support
7.3
Reflecting on and learning from conflict
7.4
Improving practice
This content is protected, please
login
and
enroll
in the course to view this content!
Call Now Button
×
How can I help you?
Modal title
Main Content