Certified Security Professional (CSP)

Professional Industrial Security Management Certification Program



-Entrepreneurs and corporate executives who are in managing and ensuring the protection of assets and proprietary right of their respective companies or organizations.

-Security Directors and Managers, private Agency Operators and Executives, as well as Security officers who have demonstrated their potential for advancement in the field of industrial security.

-Government employees or officers charged with implementing security and/or security-related measures and/or policies.

-Those who are interested in pursuing a career in industrial Security or are currently engaged as security practitioners, who wish to further enhance their professional competence.


-College graduate, you must have 3 years security experience with 1 year experience in a responsible charge.

-College Level with minimum of 7 years experience/involvement in security with minimum experience in a position with a “responsible charge” for at least three (3) years.

-High school graduate, you must have 9 years security experience with 3 years experience in a responsible charge.

-Retired millitary/police officer who served the government for a long period of time and with a minimum experience of at least three (3) years in a “responsible charge”.

-Those who are currently serving as property manager/HR Managers/ Building Administrators or related work can also be qualified to take the Program since they are involved in security management.

DomainScope of InstructionMethodNominal Time
Program Overview● Re-Alignment of Expectations from the Program, Resource Persons, and Participants.
● Explain the Methodology and Process of the Certification Program including the Rating System.
● Outline the Benefits and Objectives of the CSP title.
Discussion30 mins.
(Aspects of Security/Technical Component)
Physical Security● Definition of Technical Terms and related Physical Barriers
● Types of Fencing and Importance of Clear Zones
● Types of Protective Alarm System
● Purpose of Protective Alarm System
● Types of Intrusion Detection System
● Dogs & Asset Protection (K9)
● Types of Protective Lighting
● Advantages & Disadvantages of Proprietary & Contract Guards
Lecture, Discussion & Demo2.0 Hrs.
Personnel Security● Scope and Key Functions of Personnel Security
● Elements of Comprehensive Personnel Security Program
● Basic Considerations
● Applicant Screening
● Red Flags in a Screening Process
● Personnel Security Investigation
● Background Investigation
● Positive Vetting & Profiling
● Deception Detection Techniques
● Financial & Lifestyle Inquiry
● Undercover Investigations
● Exit Interview as a Loss Prevention Technique
● Anti-Competitive Clause
● Security Education
● Debriefing Techniques
Lecture, Discussion & Demo2.0 Hrs.
Protection of Sensitive Information● Proprietary Information
● What is Trade Secret and it’s Essential Elements?
● What is Secret?
● Process of Disclosure of Secret & Classified Information
● What is Patent? How it is Different from Trade Secret?
● Vulnerabilities of Sensitive Data
● What is Inadvertent Disclosure?
● Intentional Theft of Insiders
● Countermeasures to Protect Sensitive Information
● Competitive Intelligence Collection
● What is Social Engineering?
● Policy Statements on Pre-Employment, Model Agreements, Non-Competitive Covenants
● Electronic Eavesdropping, Tactics & Equipment
● What is Wiretapping & Bugging
● Designing a Proprietary Information Protection Program
Lecture, Discussion & Demo2.0 Hrs.
(Industrial Security Management)
Guard Force Information● Functional Areas of Guard Force – Leadership & Command, Operations, Administrative & Technical Service
● Principle on Authority & Responsibility
● What are the Leadership Traits & Principles?
✔ Know yourself & seek self improvement
✔ Be technically & Tactically proficient
✔ Seek responsibility & take responsibility for your actions
✔ Make sound & timely decisions
✔ Set the example
✔ Know your men and look for welfare
✔ Keep your men properly informed
✔ Develop sense of responsibility in your subordinates
✔ Ensure that the task is understood, supervised & accomplished
✔ Train your men to work as a team
✔ Employ your men in accordance with their capabilities
● Leadership Indicators
● The Art of Supervision & Control
Lecture, Discussion & Demo2.0 Hrs.
Emergency/Disaster Planning● Scope of Emergency Planning
● What is Emergency & Disaster?
● How Mitigation Process is done?
● Types of Emergencies/Disasters
● Preparing the Emergency/Disaster Plans
● The Key Steps in Planning
● Defining the Goals of Emergency Plan
● Contingency Planning & Its Framework
● Differentiating Contingency from Crisis
● Contingency Planning Guide
Lecture, Discussion & Demo2.0 Hrs.
Substance Abuse● Essence of Substance Abuse
● Definition of Useful Terms
● Commonly Abused Drugs
✔ Narcotics
✔ Depressants
✔ Stimulants
✔ Hallucinogens
✔ Other Substances
● Drug Testing Program
● Retention Time of Drugs in Urine
● Steps of Drug Testing
● Exemplar of Drug/Substance Policy in the Workplace
● Common Signs of Drug Abuse
● How Security Officers Help in the Prevention and Control of Drug Abuse?
Lecture, Discussion & Case Study2.0 Hrs.
Security Investigations● Categories of Security Investigation
✔ Background Check
✔ Incident Investigation
✔ Administrative Investigation
● Background Check as Reliability Investigation for Pre-Employment
● Importance of Standard Application Form and Interview
● Lifestyle (Financial) Investigations
● Claims Investigation
● Employee Misconduct Investigation
● Narcotics & Alcohol Investigation
● Espionage Investigation
● Explosives, Bombings & Arson Investigation
● Sabotage Investigation
● Theft Investigation
● Traffic Accident Investigation
● Undercover Investigation
● Dealing with Informants
● Surveillance and Lie-Detection Techniques
Lecture, Discussion & Demo2.0 Hrs.
Security Investigations● What is Risk and its Type?
● What is Risk Analysis
● What is Risk Management
● What is Asset?
● What is Vulnerability?
● Countermeasures
● Loss Event Profile
● Vulnerability = Probability = Criticality
● Program Implementation
● Risk Management Strategies
● Security Survey
● Conducting the Survey with Checklist and acceptable Form & Style
Lecture, Discussion & Workshop2.0 Hrs.
Security Management● Management in General and the Planning Function
● Elements of Management Cycle
● Security Management & Cost-Effectiveness
● Security Planning
● Development of Security Policies
● Financing & Budgeting
● Organizational Relationships & Principles
● Roles of Security Executive
● Staffing and Administration
● Ten Management Rules
● Program Implementation
● Problem-Solving and Decision-Making
● Security Audit/Inspection
Lecture, Discussion & Case Study2.0 Hrs
Executive Protection● “Corporate” Kidnapping – why companies invest on Executive Protection
● Why kidnapping is an industry?
● Who are most likely target?
● Places where victims are snatched?
● Responses to cases of Kidnapping
● Kidnapping – A Classic Art of Terrorism
● Categories of Kidnapping
● Psychology of Abduction
● Prevention Oriented-Planning
● Coverage of an Executive Protection Program
● Key Elements of Successful Executive Protection Plan
● 24 Hour Cycle of Protection
● Weaknesses in Executive Protection Plan
● Exemplar of Executive Protection Course
Lecture, Discussion & Case Study2.0 Hrs.
Loss Prevention● Crime Prevention & Security
● What is Loss Prevention?
● Corporate Loss Security
● Workplace Crime
● Crime Prevention & Loss Prevention
● Risk management as a Loss Prevention Tool
● What are Types of Risk?
● Role of Loss Prevention Officer
● Risk Management & Insurance
● Environmental Design
● Environmental Security: Conceptual Model
● Loss Prevention against Internal & External Threats
● Crime Analysis & Crime Prevention
● Safety & Loss Prevention
● Applicant Screening
● Financial & Lifestyle Inquiry
● Planning Management & Evaluation
● Budget for Loss Prevention
● Accountability, Accounting & Auditing
Lecture, Discussion & Case Study2.0 Hrs.
(Final Output)
Loss Prevention● Individual Oral Defense of the Security Survey and its accompanying reportsQ&A
TOTAL NO. OF HOURS (without PCB time): 22.5 hrs.

*This Program of Instruction (POI) of the Certified Security Professional (CSP) Certification Program is exclusive for the use of the Philippine Society for Industrial Security (PSIS), Inc. No part or in full of this program of instruction which consist six (6) pages shall be used, distributed, copied without express permission from the Board of Trustees, Education & Standards Committee and Professional Certification Board, respectively.

Copyright A2013-1677