Course Listing For TAM Courses

  • This course discusses the processes used to identify assets and address areas of threats. This course will define threat assessment, and provide knowledge to determine the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality. It will cover how to manage the effects of a threat versus the threat itself and make the appropriate response. This will entail a collection of data, threat monitoring, safety of those involved as well as methods that are combined through various collaborations of assessments with internal and external entities based on sound security methods.

  • This course encompasses the personal and corporate standards of ethical behaviors that are expected. Studied topics in ethics will help security and threat professionals to uphold the expertise, commitment, responsibility, and objectivity in their work and to distinguish right from wrong in decision and align with their organization’s culture.

  • This course will discuss the need for personnel to develop credentials for compliance towards various types of security, from physical security to security administration that focuses on the protection of assets and gain abilities in applying those processes. This course compares industry standards and practices for personnel security currently used in the workplace.

  • This course looks at risks to preempt waiting for a security breach leading to evaluating security procedures affecting both physical and informational security. Practicing proper assessment will be discussed as the foundation of physical security and why public and private organizations are falling victim to high-profile cyberattacks and ransomware. The course will show where physical security assessments will identify potential threats and major effects in your facility security systems and show the complexity of measures needed to protect networks, infrastructures, applications, products, and proprietary data.

  • This course discusses implementation of threat assessment and how inadequate threat assessments may result in compromised or unauthorized access. It also discusses how communication, its delivery, and protection needs to be of the highest standard to lead to more success and that a clear message is the most appropriate path to adequate communication. The course will include a discussion of security personnel contributions and how they guide and help develop an appropriate incident response plan based on the identified threats from threat assessment activities.

  • This course discusses the controls that are put in place in order to keep undesirable actions on the outside and desirable actions internal as this can expend a great deal of time and resources. The course looks at possible bad decisions on the part of users in the organization and how to nullify those decisions with appropriate countermeasures. The course helps students become aware of threats that are propagated through actions and behavior.

  • This course discusses aligning the Security Budget with overall business goals and concepts. As the budget should support the execution of the strategic plan, building a proper budget is a core competency of an effective security program. In addition to hiring and training good people, they need to adapt to the desired security culture. This course answers the question of why each item should be present within a budget and if it should be examined on a yearly or more regular basis. As it is critical to look at the organization’s overall needs, understanding why security is vital to the organization’s health is discussed at length.

  • This course identifies the needs of personnel that are assigned to a threat assessment team and to be able to study concerning behavior actions within an organization or individual. The threat assessment team is a group of officials convened to identify, assess, and address threats or potential threats to security. Team members learn how to evaluate and process situations against behavioral or unlawful actions. For this to occur, the establishment of a reporting system is imperative for past, present, and future determinations. Each of these positions are very important to manage a collaborative effort in identification, assessment, and counteraction of threat events. Students work to understand how important information sharing, as well as communication, is for a desired end result.