
Tier 1
Classroom Training
Workplace Violence & Active Shooter course:
Incident statistics and examples
Identification and warning signs
Prevention and intervention
De-escalation strategies
How to Avoid | Deny | Defend
How to get help
Basic Lifesaving Skills course:
How to stop the bleeding
Proper application of a tourniquet
Everyday items used to save lives
How to get help
Hybrid Training focuses on the principles of Avoid, Deny, Defend within all populated areas of a facility. This differs from Scenario Training in that there are no scenarios or drills. Trainees attend a two hour lecture and then return to their assigned work centers.
Instructors then visit each work area to discuss how Avoid, Deny, Defend could be utilized in that specific area. Training topics include: discussions on structural vulnerabilities, how to use your surroundings to your benefit, what options are best suited for your specific work area, and more.
Tier 2
Hybrid Training
Tier 3
Scenario Training
Scenario-based training simulates realistic incidents, in a controlled environment, ranging from workplace violence to active shooter scenarios. All scenarios are conducted under the close supervision of our staff, who utilize the highest level of safety protocols.
This method provides the most realistic training possible through the incorporation of role players, training equipment, and defensive and offensive tactics. This training technique is fast paced and requires participant’s physical interaction.
Policy Reviews:
A comprehensive, independent assessment of existing policies and Emergency Action Plans (EAP’s) to identify areas for improvement while ensuring federal and state compliance.
Policy Formation:
Workshops that provide insight and guidance to create effective policies and EAP’s. Tailored to your expectations and compliant with federal and state requirements.
Policy
Development
Vulnerability
Assessments
Vulnerability Assessments:
A physical security assessment tests, evaluates, and proposes recommendations. Report recommendations may contain: photos, diagrams, a written summary of findings, and a proposed improvements prioritization chart.
VA 1:
For clients taking their first steps towards security or those who already have basic measures in place. VA 1 offers expert resources for physical security proposals and enhancements.
VA 2:
For clients with established security measures in place, VA 2 puts them to the ultimate test. Our highly skilled team will act as adversaries in an attempt to bypass security measures to expose vulnerabilities.