CJS 250 Slingshot Academy /snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CJS 250 Slingshot Academy /snaptutorial.com

Description:

For more classes visit www.snaptutorial.com CJS 250 Week 1 Checkpoint Historical Laws and Security CJS 250 Week 1 Assignment Biography of Allan Pinkerton CJS 250 Week 2 Checkpoint Threat and Risk Assessment CJS 250 Week 2 DQ 1 and DQ 2 CJS 250 Week 3 Exercise Interview schedule CJS 250 Week 3 Assignment Security Objective Components CJS 250 Week 3 Checkpoint Risk Managment CJS 250 Week 4 Checkpoint Models of Physical Security (Appendix D) CJS 250 Week 4 DQ 1 and DQ 2 CJS 250 Week 5 Checkpoint Evaluating Safe Work Conditions Appendix E CJS 250 Week 5 Checkpoint Floor Plan CJS 250 Week 5 Assignment Security Manager Interview CJS 250 Week 6 Checkpoint Security Assessment – PowerPoint PPT presentation

Number of Views:6
Slides: 14
Provided by: studys11

less

Transcript and Presenter's Notes

Title: CJS 250 Slingshot Academy /snaptutorial.com


1
 CJS 250 Slingshot Academy snaptutorial
For more course Tutorials
www.snaptutorial.com
2
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 1 Assignment Biography of Allan
Pinkerton
CJS 250 Entire Course
CJS 250 Week 1 Checkpoint Historical Laws and
Security CJS 250 Week 1 Assignment Biography of
Allan Pinkerton CJS 250 Week 2 Checkpoint Threat
and Risk Assessment CJS 250 Week 2 DQ 1 and DQ
2 CJS 250 Week 3 Exercise Interview schedule CJS
250 Week 3 Assignment Security Objective
Components CJS 250 Week 3 Checkpoint Risk
Managment CJS 250 Week 4 Checkpoint Models of
Physical Security (Appendix D) CJS 250 Week 4 DQ
1 and DQ 2 CJS 250 Week 5 Checkpoint Evaluating
Safe Work Conditions Appendix E CJS 250 Week 5
Checkpoint Floor Plan
1. Assignment Biography of Allan Pinkerton
No study of the private security industry would
be complete without mention of Allan Pinkerton
and the Pinkerton Detective Agency. Pinkerton
made many contributions both to private security
and to national law enforcement, and the
Pinkerton Detective Agency was the forerunner to
modern private security and detective agencies.
Write a 500- to 700-word biography of
Allan Pinkerton focusing on the overlap between
private and public security in the career of
Pinkerton and the development of the Pinkerton
Detective Agency. Include the following
3
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 2 Checkpoint Threat and Risk
Assessment
CJS 250 Week 1 Checkpoint Historical Laws and
Security
CheckPoint Historical Laws and Security
Write a brief description in your own words of
the following laws, including where and when each
law originated o The Code of Hammurabi o
Dracos law o Law of the Twelve Tables o
Justinian Code o Magna Carta
CheckPoint Threat and Risk Assessment
Review Ch. 3 of the text. Complete
Appendix B.
4
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 3 Assignment Security Objective
Components
CJS 250 Week 2 DQ 1 and DQ 2
1. Assignment Security Objective Components
Read the article on p. 109 and review
pp. 113115 of the text. Address the
following points in a 700- to 1,050-word
response o What component of the overall
security objective deserves the most attention in
the environments mentioned in the article? What
components would be less pertinent for these
particular environments during a vulnerability
assessment? Why?
1. Discussion Questions Consider
the definition of security given on pp. 7172 of
the text. Can any target environment ever be
perfectly stable or predictable? Why or why not?
Why does the author stress that security efforts
for any target environment are a never-ending
process and that security objectives change over
time? How can complacency pose a problem for
security professionals? Consider
several locationsprivate or public, residential
or commercialyou are currently familiar with.
5
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 3 Exercise Interview schedule
CJS 250 Week 3 Checkpoint Risk Management
1. Exercise Interview Scheduling
Contact a manager or security personnel and
schedule a meeting for an interview to be
completed by Week Five. Post the name and title
of the person you plan to interview with the date
and time of the interview as a message to your
facilitator
1 CheckPoint Risk Management Read
the Risk Management scenario presented in
Appendix C. Complete the table in Part
I. Answer the questions in Part II.
6
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 4 DQ 1 and DQ 2
CJS 250 Week 4 Checkpoint Models of Physical
Security (Appendix D)
1 1. Discussion Questions What
are the most common features of physical
security? What are the least common? How can
extant features of a target environment be
adapted for security purposes (such as for
detection or asset protection)? Provide specific
examples. While it may be ideal for
security planners to utilize or install the
latest technology, it may not always be practical.
1. CheckPoint Models of Physical Security
Complete Appendix D.
7
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 5 Checkpoint Evaluating Safe Work
Conditions Appendix E
CJS 250 Week 5 Assignment Security Manager
Interview
Assignment Security Manager Interview
Interview a manager of security personnel.
Use the questionnaire provided in Appendix
F to record responses in detail. Space has been
provided for additional questions, but be sure to
record any additional questions as well as the
responses. Complete Part II once all
answers have been recorded.
heckPointEvaluating Safe Working Conditions
Read the summaries in Appendix E.
Answer the questions following each summary in
100 words or more. Post as an
attachment.
8
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 6 Checkpoint Security Assessment
CJS 250 Week 5 Checkpoint Floor Plan
1. CheckPoint Security Assessment
Choose two of the four settings from Ch. 9 and
carefully review the accompanying summaries,
bullet points, and floor plans.
Complete a security assessment for each setting
using Appendix G. Provide at least two
countermeasures specific to physical security and
one countermeasure specific to personnel or
security management for each setting.Explain your
choices.
CheckPoint Floor Plan Create a
description of the target environment to be used
for your final project. The environment can be
imaginary or real, but the description must
include the following o The title, purpose,
or function of the environment (Bank, for
example, or Convenience Store) o A basic
floor plan o The current security features in
plac
9
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 7 Assignment Relationship between
Private and Public Police
CJS 250 Week 6 DQ 1 and DQ 2
Assignment Relationship Between Private and
Public Police Write a 750- to
1,050-word paper discussing the relationship
between private and public police. Is this
relationship positive or negative? Provide
specific examples to support your opinion.
Discuss how the conflict regarding the
definition of public and private space influences
the relationship between private and public
police. Suggest ways this relationship
can be maintained or improved. Cite at
least three sources other than the text.
1. Discussion Questions Read the
section on the Walt Disney Corporations security
operations in Orlando on pp. 206209 of the text.
How arethe Walt Disney Corporations security
operations integrated into the overall business
operations? How are non-security personnel and
environmental features used for security purposes
and how do security personnel contribute to the
overall mission of the business operations? Why
is the integration of individual security
components into the overall security design and
the overall business mission important?
10
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 8 Checkpoint Law and Legal Issues
CJS 250 Week 7 Checkpoint Public Relations and
Professionalism
. CheckPoint Public Relations and
Professionalism Resource The
Private Arm of the Lawarticle at
Write a 250- to 300-word response discussing the
public relations image and professionalism of the
private security industry. What are some examples
from the article concerning the importance of
private security industry membershaving the same
level of professionalism as public law
enforcement officers? How can a negative image
impact the security of a community? How can this
image be improved?
1. CheckPoint Law and Legal Issues Imagine
you are responsible for training newly-hired
security personnel. You must deliver a
presentation to the new recruits on criminal
procedure and legal issues as they pertain to
security professionals. Create a 5-
to 7-slide MicrosoftPowerPointpresentation on
law and legal issues as they apply specifically
to private security professionals.
Outline the basic organization of law (criminal,
civil, and administrative). Explain
basic crime classifications.
11
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 9 Capstone CheckPoint
CJS 250 Week 8 DQ 1 and DQ 2
1. Discussion Questions Security
professionals have similar functions and duties
as the police but do not share the same level of
authority in criminal procedure. What are the
differences between private and public police in
their level of authority? What are the
limitations security professionals must
recognize? What role should
non-security personnel play in an emergency plan
and disaster response? Should these roles be
included in a procedures manual?
1. Discussion Questions Security
professionals have similar functions and duties
as the police but do not share the same level of
authority in criminal procedure. What are the
differences between private and public police in
their level of authority? What are the
limitations security professionals must
recognize? What role should
non-security personnel play in an emergency plan
and disaster response? Should these roles be
included in a procedures manual? Why or why not?

12
 CJS 250 Slingshot Academy snaptutorial
CJS 250 Week 9 Final The Security Plan
1. Final Project The Security Plan
Create a 1,400- to 1,750-word comprehensive
security plan for the target environment you
submitted in Week Five. In your plan, include the
following items o The floor plan of the
target environment o A list of threats o A
risk assessment for each threat o Current
vulnerability gaps o Countermeasures that take
each of the following components of the overall
security objective into account
13
 CJS 250 Slingshot Academy snaptutorial
For more course Tutorials
www.snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com