top of page

Asset Protection and Physical Security (APPS)

  • March 18-19, 2024

  • Nov 25-26, 2024


ARC Hotel, 140 Slater Street, Ottawa, ON


$2000 + HST

COURSE SUMMARY (This course is one of the essential courses required for Security Certification under the Infrastructure Resilience Research Group, IRRG, Office of the Dean, Faculty of Engineering and Design, Carleton University.)

The Asset Protection and Physical Security Course (APPS) provides participants with knowledge on physical security and how it aligns with security policy, standards, governance frameworks; demonstrates how security planning is integrated with departmental business and the operational requirements of all elements of the security program.

There are 3 Modules:

Module l: Security Management Framework focuses on the Policy on Government Security as a guide to define requirements necessary to support and enable the physical security foundation.  The importance of key concepts such as baseline security, threat and risk assessment methodology and security site design are discussed to set the stage for the case study in Module 2 and 3.   The modern-day physical security officer must understand the nature of their environment, adapt operational requirements, and integrate security into the overall strategic security management framework.     

Module 2: Physical Security Threat and Risk Assessment (TRA) demonstrates the interconnectivity and the relevance of the current national security environment and how physical security, and requisite safeguards must be in accordance with security standards and directives.  Identifying areas of risk and vulnerabilities, assessing likelihood of occurrences based on known threats, existing safeguards, and recommending security controls to address shortcomings and strengthen the overall security posture are some of the key elements that will be discussed. A case study will be introduced to enable participants to apply their learning experiences.   

Module 3: Physical Security Safeguards will look closely at physical security requirements and design.  The TRA methodology will be applied to the case study introduced in Module 2.    Participants will work collaboratively and individually to identify assets, assess vulnerabilities, choose physical security safeguard options that will minimize risks and demonstrate due diligence and enable them to communicate their rationale in a professional and credible manner.     


At the end of the course, you will be able to: 

  • Describe the key concepts that form the foundation of the physical security program

  • Understand the management framework and how physical security operates within this spectrum

  • Explain the interconnectivity and relevance of the local and national security environment and the day-to-day security operations

  • Establish a physical security approach to address the security needs of the organization in congruence with the culture and the strategic objectives

  • Explain how physical security requirements integrate and support business

  • Evaluate assets to establish priorities for asset and people protection

  • Conduct a security threat and risk assessment to identify assets, assess risks and vulnerabilities and profile gaps that require security controls to strengthen the security position of the organization  

Who should attend:

Physical security practitioners who want to understand and use management tools that help to provide structure and clarity to physical security decision making. 

Security project officers involved in the planning process and those who wish to learn more about the field of physical security and asset protection.

Real property and IT security professionals will benefit from understanding the physical security context and how together collectively and collaboratively they build a safe and secure work environment.


Generalists who want to expand their overall security skills and increase their career advancement opportunities. 

This course is a must have for employees involved with security program delivery and who are interested in advancing their career or competing for security positions. 

bottom of page