Certified Protection Officer
Encyclopedia
The IFPO
(International Foundation for Protection Officers) Board of Directors established and maintains a voluntary certification process (the Certified Protection Officers course) based on current and valid standards that measure competency in the practice of private security for Security Officers. The IFPO requires that all programs that offer a certification must be maintained by the individual through a recertification process. The CPO certificate is valid for a period of 2 years, at which time a recertification must be achieved.
The CPO course is available as a Distance Learning (Self-Study) Course.
Qualified Certified Protection Officers (CPO) can also obtain the designation of CPO Instructor (CPOI). This is a designation that requires qualification and the proper credentials.
IFPO
The International Foundation for Protection Officers is a non-profit organization headquartered in Tampa, FL. Established in January 1988 to help address the training and certification needs of Security / Protection Officers and their Supervisors in North America and the UK.The IFPO offers several...
(International Foundation for Protection Officers) Board of Directors established and maintains a voluntary certification process (the Certified Protection Officers course) based on current and valid standards that measure competency in the practice of private security for Security Officers. The IFPO requires that all programs that offer a certification must be maintained by the individual through a recertification process. The CPO certificate is valid for a period of 2 years, at which time a recertification must be achieved.
The CPO course is available as a Distance Learning (Self-Study) Course.
Qualified Certified Protection Officers (CPO) can also obtain the designation of CPO Instructor (CPOI). This is a designation that requires qualification and the proper credentials.
Simplified Course Outline
- Physical SecurityPhysical securityPhysical security describes measures that are designed to deny access to unauthorized personnel from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts...
Applications - AlarmAlarmAn alarm device or system of alarm devices gives an audible or visual alarm signal about a problem or condition.Alarm devices include:* burglar alarms, designed to warn of burglaries; this is often a silent alarm: the police or guards are warned without indication to the burglar, which increases...
System Fundamentals - Access ControlAccess controlAccess control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system...
- Information Security
- Protection Officers and Emergency ResponseEmergency serviceEmergency services are organizations which ensure public safety and health by addressing different emergencies. Some agencies exist solely for addressing certain types of emergencies whilst others deal with ad hoc emergencies as part of their normal responsibilities...
- Strikes, Lockouts and Labour Relations
- Workplace violenceWorkplace violenceWorkplace violence refers to violence that originates from employees or employers and threatens employers and/or other employees.-Definition:The definition of work related violence that has received pan-European acceptance is as follows:...
- Effective CommunicationTelecommunicationTelecommunication is the transmission of information over significant distances to communicate. In earlier times, telecommunications involved the use of visual signals, such as beacons, smoke signals, semaphore telegraphs, signal flags, and optical heliographs, or audio messages via coded...
s - Environmental Crime ControlCrime prevention through environmental designCrime prevention through environmental design is a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts...
Theory - Emergency PlanningEmergency managementEmergency management is the generic name of an interdisciplinary field dealing with the strategic organizational management processes used to protect critical assets of an organization from hazard risks that can cause events like disasters or catastrophes and to ensure the continuance of the...
and DisasterDisasterA disaster is a natural or man-made hazard that has come to fruition, resulting in an event of substantial extent causing significant physical damage or destruction, loss of life, or drastic change to the environment...
Control - Use of force continuumUse of force continuumA use of force continuum is a standard that provides law enforcement officials & security officers with guidelines as to how much force may be used against a resisting subject in a given situation. In certain ways it is similar to the military rules of engagement...
- EthicsEthicsEthics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right and wrong, virtue and vice, justice and crime, etc.Major branches of ethics include:...
and Professionalism