top of page
Tamkene Wide Logo .png
Tamkene Wide Logo .png

Protection Officer Training Course

Protection Officer Training aligned with ASIS PSO.1, ISO 18788, and OSHA General Duty Clause standards.

Course Title

Protection Officer

Course Duration

1 Day

Competency Assessment Criteria

Practical Assessment and knowledge Assessment

Training Delivery Method

Classroom (Instructor-Led) or Online (Instructor-Led)

Service Coverage

In Tamkene Training Center or On-Site: Covering Saudi Arabia (Dammam - Khobar - Dhahran - Jubail - Riyadh - Jeddah - Tabuk - Madinah - NEOM - Qassim - Makkah - Any City in Saudi Arabia) - MENA Region

Course Average Passing Rate

98%

Post Training Reporting 

Post Training Report + Candidate(s) Training Evaluation Forms

Certificate of Successful Completion

Certification is provided upon successful completion. The certificate can be verified through a QR-Code system.

Certification Provider

Tamkene Saudi Training Center - Approved by TVTC (Technical and Vocational Training Corporation)

Certificate Validity

2 Years (Extendable with additional training hours)

Instructors Languages

English / Arabic / Urdu / Hindi

Training Services Design Methodology

ADDIE Training Design Methodology

ADDIE Training Services Design Methodology (1).png

Course Overview

This comprehensive Protection Officer Training course provides participants with essential knowledge and practical skills required for effective security operations and workplace protection in various organizational environments. The course covers fundamental security principles along with hands-on techniques for threat assessment, incident response, and emergency coordination procedures.


Participants will learn to apply ASIS PSO.1 Management System for Quality of Private Security Company Operations, ISO 18788 Management System for Private Security Operations, OSHA General Duty Clause Section 5(a)(1), and NFPA 730 Guide for Premises Security to ensure comprehensive security management and personnel protection. This course combines theoretical security concepts with practical hands-on training and real-world scenario applications to ensure participants gain valuable skills applicable to their security environment while emphasizing professional conduct and regulatory compliance.

Key Learning Objectives

  • Understand protection officer fundamentals and legal responsibilities

  • Implement effective threat assessment and risk evaluation procedures

  • Apply proper access control and perimeter security techniques

  • Execute comprehensive incident response and emergency coordination protocols

  • Develop effective communication and documentation procedures

  • Apply appropriate use of force principles and de-escalation techniques

  • Implement surveillance and observation methodologies for security operations

  • Apply proper emergency evacuation and crisis management procedures

Group Exercises

  • Security post orders development including (duty assignments, procedure documentation, emergency protocols)

  • Incident report templates including (documentation formats, information requirements, legal considerations)

  • Risk assessment worksheets including (threat identification, vulnerability evaluation, control measures)

  • Emergency response procedures including (notification protocols, coordination requirements, escalation procedures)

Knowledge Assessment

  • Security fundamentals evaluations including (ASIS PSO.1 standards, legal authority limitations, professional conduct requirements)

  • Threat assessment exercises including (risk identification, vulnerability analysis, mitigation planning)

  • Access control procedure testing including (system operation, visitor management, credential verification)

  • Incident response assessments including (emergency protocols, communication procedures, documentation requirements)

Course Outline

1. Protection Officer Fundamentals and Legal Framework

  • Security officer roles including (protection duties, observation responsibilities, incident response, emergency coordination)

  • Legal authority including (citizen's arrest powers, trespassing laws, property rights, liability considerations)

  • ASIS PSO.1 standards including (quality management, operational procedures, performance requirements)

  • Professional conduct including (ethics, customer service, confidentiality, appearance standards)


2. Threat Assessment and Risk Evaluation

  • Threat identification including (criminal activity, terrorism indicators, workplace violence, natural disasters)

  • Risk assessment methodologies including (vulnerability analysis, impact evaluation, likelihood determination)

  • Security surveys including (physical assessment, procedural review, technology evaluation)

  • Crime Prevention Through Environmental Design (CPTED) including (natural surveillance, access control, territorial reinforcement, maintenance)


3. Access Control and Perimeter Security

  • Access control systems including (key card systems, biometric devices, visitor management, credential verification)

  • Perimeter security including (barrier systems, lighting assessment, surveillance coverage, patrol routes)

  • Vehicle control including (parking enforcement, vehicle inspection, delivery coordination)

  • Visitor Management including (registration procedures, escort protocols, badge issuance, departure verification)


4. Incident Response and Emergency Procedures

  • Incident classification including (security breaches, medical emergencies, fire alarms, suspicious activities)

  • Emergency response including (notification procedures, coordination protocols, evacuation assistance)

  • Incident Command System (ICS) basics including (command structure, communication flow, resource coordination)

  • Evidence preservation including (scene protection, witness coordination, documentation requirements)


5. Communication and Documentation

  • Communication protocols including (radio procedures, emergency notifications, report writing, chain of command)

  • Documentation requirements including (incident reports, daily logs, witness statements, evidence handling)

  • Technology utilization including (surveillance systems, communication equipment, access control monitoring)

  • Report Writing including (factual documentation, chronological sequence, objective observations, legal requirements)


6. Use of Force and De-escalation Techniques

  • Use of Force Continuum including (officer presence, verbal direction, physical control, defensive tactics)

  • De-escalation techniques including (active listening, calm communication, conflict resolution, tension reduction)

  • Restraint procedures including (handcuffing techniques, escort methods, medical considerations)

  • Legal considerations including (reasonable force, documentation requirements, liability issues, witness coordination)

Practical Assessment

  • Access control operation including (system navigation, visitor processing, credential verification)

  • Incident response simulation including (emergency coordination, communication protocols, documentation completion)

  • De-escalation demonstration including (communication techniques, conflict resolution, professional interaction)

  • Report writing exercise including (incident documentation, factual recording, proper formatting)

Gained Core Technical Skills

  • Comprehensive security operations and protection procedure implementation

  • Threat assessment and risk evaluation methodology proficiency

  • Access control system operation and visitor management expertise

  • Incident response and emergency coordination capabilities

  • Regulatory compliance with ASIS, ISO 18788, and OSHA standards

  • Professional communication and documentation skills

  • Use of force and de-escalation technique application

  • Surveillance and observation methodology implementation

Training Design Methodology

ADDIE Training Design Methodology

Targeted Audience

  • Security Officers beginning protection officer careers

  • Corporate Security Personnel responsible for facility protection

  • Access Control Operators managing entry points

  • Loss Prevention Specialists protecting organizational assets

  • Emergency Response Coordinators supporting security operations

  • Facility Management Staff overseeing security programs

  • Contract Security Personnel requiring standardized training

  • Supervisors overseeing protection officer operations

Why Choose This Course

  • Essential security operations competency development

  • Professional protection officer certification preparation

  • Comprehensive legal and regulatory compliance training

  • Practical incident response skill building

  • Industry-recognized security protocol mastery

Note

Note: This course outline, including specific topics, modules, and duration, is subject to change and also can be customized based on the specific needs and requirements of the client.

Course Outline

1. Protection Officer Fundamentals and Legal Framework

  • Security officer roles including (protection duties, observation responsibilities, incident response, emergency coordination)

  • Legal authority including (citizen's arrest powers, trespassing laws, property rights, liability considerations)

  • ASIS PSO.1 standards including (quality management, operational procedures, performance requirements)

  • Professional conduct including (ethics, customer service, confidentiality, appearance standards)


2. Threat Assessment and Risk Evaluation

  • Threat identification including (criminal activity, terrorism indicators, workplace violence, natural disasters)

  • Risk assessment methodologies including (vulnerability analysis, impact evaluation, likelihood determination)

  • Security surveys including (physical assessment, procedural review, technology evaluation)

  • Crime Prevention Through Environmental Design (CPTED) including (natural surveillance, access control, territorial reinforcement, maintenance)


3. Access Control and Perimeter Security

  • Access control systems including (key card systems, biometric devices, visitor management, credential verification)

  • Perimeter security including (barrier systems, lighting assessment, surveillance coverage, patrol routes)

  • Vehicle control including (parking enforcement, vehicle inspection, delivery coordination)

  • Visitor Management including (registration procedures, escort protocols, badge issuance, departure verification)


4. Incident Response and Emergency Procedures

  • Incident classification including (security breaches, medical emergencies, fire alarms, suspicious activities)

  • Emergency response including (notification procedures, coordination protocols, evacuation assistance)

  • Incident Command System (ICS) basics including (command structure, communication flow, resource coordination)

  • Evidence preservation including (scene protection, witness coordination, documentation requirements)


5. Communication and Documentation

  • Communication protocols including (radio procedures, emergency notifications, report writing, chain of command)

  • Documentation requirements including (incident reports, daily logs, witness statements, evidence handling)

  • Technology utilization including (surveillance systems, communication equipment, access control monitoring)

  • Report Writing including (factual documentation, chronological sequence, objective observations, legal requirements)


6. Use of Force and De-escalation Techniques

  • Use of Force Continuum including (officer presence, verbal direction, physical control, defensive tactics)

  • De-escalation techniques including (active listening, calm communication, conflict resolution, tension reduction)

  • Restraint procedures including (handcuffing techniques, escort methods, medical considerations)

  • Legal considerations including (reasonable force, documentation requirements, liability issues, witness coordination)

Why Choose This Course?

  • Essential security operations competency development

  • Professional protection officer certification preparation

  • Comprehensive legal and regulatory compliance training

  • Practical incident response skill building

  • Industry-recognized security protocol mastery

Note: This course outline, including specific topics, modules, and duration, is subject to change and also can be customized based on the specific needs and requirements of the client.

Practical Assessment

  • Access control operation including (system navigation, visitor processing, credential verification)

  • Incident response simulation including (emergency coordination, communication protocols, documentation completion)

  • De-escalation demonstration including (communication techniques, conflict resolution, professional interaction)

  • Report writing exercise including (incident documentation, factual recording, proper formatting)

Course Overview

This comprehensive Protection Officer Training course provides participants with essential knowledge and practical skills required for effective security operations and workplace protection in various organizational environments. The course covers fundamental security principles along with hands-on techniques for threat assessment, incident response, and emergency coordination procedures.


Participants will learn to apply ASIS PSO.1 Management System for Quality of Private Security Company Operations, ISO 18788 Management System for Private Security Operations, OSHA General Duty Clause Section 5(a)(1), and NFPA 730 Guide for Premises Security to ensure comprehensive security management and personnel protection. This course combines theoretical security concepts with practical hands-on training and real-world scenario applications to ensure participants gain valuable skills applicable to their security environment while emphasizing professional conduct and regulatory compliance.

Key Learning Objectives

  • Understand protection officer fundamentals and legal responsibilities

  • Implement effective threat assessment and risk evaluation procedures

  • Apply proper access control and perimeter security techniques

  • Execute comprehensive incident response and emergency coordination protocols

  • Develop effective communication and documentation procedures

  • Apply appropriate use of force principles and de-escalation techniques

  • Implement surveillance and observation methodologies for security operations

  • Apply proper emergency evacuation and crisis management procedures

Knowledge Assessment

  • Security fundamentals evaluations including (ASIS PSO.1 standards, legal authority limitations, professional conduct requirements)

  • Threat assessment exercises including (risk identification, vulnerability analysis, mitigation planning)

  • Access control procedure testing including (system operation, visitor management, credential verification)

  • Incident response assessments including (emergency protocols, communication procedures, documentation requirements)

Targeted Audience

  • Security Officers beginning protection officer careers

  • Corporate Security Personnel responsible for facility protection

  • Access Control Operators managing entry points

  • Loss Prevention Specialists protecting organizational assets

  • Emergency Response Coordinators supporting security operations

  • Facility Management Staff overseeing security programs

  • Contract Security Personnel requiring standardized training

  • Supervisors overseeing protection officer operations

Main Service Location

Suggested Products

20-hour Healthcare: Administration Safety Training Course
20-hour Healthcare: Administration Safety
70-hour Oil and Gas Safety and Health Train-the-Trainer Training Course
70-hour Oil and Gas Safety and Health Train-the-Trainer
155-hour Oil and Gas Safety and Health Specialist Training Course
155-hour Oil and Gas Safety and Health Specialist
164-hour Oil and Gas Safety and Health Supervisor Training Course
164-hour Oil and Gas Safety and Health Supervisor
47-hour Construction Safety and Health Train-the-Trainer Training Course
47-hour Construction Safety and Health Train-the-Trainer
130-hour Construction Safety and Health Specialist Training Course
130-hour Construction Safety and Health Specialist
145-hour Construction Site Safety Supervisor Training Course
145-hour Construction Site Safety Supervisor
162-hour Construction Safety and Health Manager Training Course
162-hour Construction Safety and Health Manager
192-hour Construction Safety and Health Professional Training Course
192-hour Construction Safety and Health Professional
10-hour Employee Occupational Safety and Health Training Course
10-hour Employee Occupational Safety and Health
10-hour General Industry: Warehouse Safety Training Course
10-hour General Industry: Warehouse Safety
10-hour General Industry: Restaurant Safety Training Course
10-hour General Industry: Restaurant Safety
233-hour Oil and Gas Safety and Health Professional Training Course
233-hour Oil and Gas Safety and Health Professional
192-hour Oil and Gas Safety and Health Manager Training Course
192-hour Oil and Gas Safety and Health Manager
32-hour Safety Committee Member Training Course
32-hour Safety Committee Member
36-hour Safety Committee Chair Training Course
36-hour Safety Committee Chair
36-hour OSH Supervisor Training Course
36-hour OSH Supervisor
36-hour OSH Train-the-Trainer Training Course
36-hour OSH Train-the-Trainer
44-Hour OSH Specialist Training Course
44-Hour OSH Specialist
48-hour OSH Manager Training Course
48-hour OSH Manager
bottom of page