World Institute for Security Enhancement

The WORLD INSTITUTE provides Homeland Security Training and Consultation, to Industry and Government Agencies by an Internationally Respected Faculty. The INSTITUTE focuses on Protection of the Nation's Critical Infrastructure & Key Resources, through Specialized Training, promoting Life Safety & National Security issues, providing Research & Development and serving as a "Think Tank". Some areas of concentration include Threat Assessment, Risk Analysis, Contingency Planning, Incident Management, Disaster Recovery, Business Continuity, Homeland Security and Information Technologies.
World Institute for Security Enhancement is based in Wilmington, NC, USA
World Institute for Security Enhancement courses are provided at our training sites across the United States and throughout the World. Most Open Session Courses have been submitted, reviewed and are "Approved by the North Carolina Private Protective Services Board". This Board regulates and licenses all Private Investigative, Security & CounterIntelligence activity within the State of North Carolina.
The INSTITUTE serves as a Homeland Security training school and has appointed an Academic Advisory Council, with an international reputation, to provide guidance and enhance the faculty. Members of this Council include individuals with a wide range of academic, technical, and practical experience in the areas of Training, Design, Operations, Research, Management and Implementation of Homeland Security and Life Safety.
Homeland SecurityHomeland Security
Airport Aviation Safety - Balancing Security Issues with the Terrorist Threat instructor led traininggroup study and discussioncoursewareworkshop / seminar : Using the most qualified expertise available, the World Institute for Security Enhancement provides practical programs designed to improve security at the National, State and Local level to those who want to respond effectively to issues following the tragedies of September 11, 2001. The issues are tailored specifically to meet the needs of Airport more...
Bomb Threat Planning Management instructor led traininggroup study and discussioncoursewareworkshop / seminar : Bombings, attempted bombings and bomb threats can cause extreme disruption, fear, and even panic in organizations whose personnel are not trained to handle such situations. Inappropriate and costly management decisions are often made due to a lack of organizational planning and a methodology for handling bomb threats, suspicious packages, and actual devices. This Bomb Threat Planning and Management program is aimed at personnel in government and private industry who wish to improve their understanding of the growing bombing trend, and who are responsible for or have a vested interest in more...
Case Management Report Writing group study and discussioncoursewareworkshop / seminar : This powerful fiveday training program has been designed to teach the professional investigator the latest skills and techniques used in case management, case screening and report writing procedures. Thre are several dimensions to this program that will teach the skills needed in case management and report writing. You will leave the training program feeling competent to conduct and maintain an investigative case folder and write a clear and concise prosecution summary for your industry or criminal justice system. For the practitioners who are just starting to work with the criminal justice system, you will find this training seminar an invakuabkle aid. It will teach you the required more...
Competitive Counter-Intelligence instructor led traininggroup study and discussioncoursewareworkshop / seminar : As international business competition increases and the need for information becomes essential to success and survival, U. S. Corporations must understand how they can protect themselves and collect information at the same time. Now more than ever global competition demands accurate and timely business intelligence. Also foreign intelligence organizations who previously targeted government organizations are now directing their efforts at industry which is seldom prepared to defend against such sophisticated adversaries. Management which buries it's head in the sand will eventually find itself no longer competitive and ultimately consumed. This course is designed to provide information which more...
Computer Forensic Analysis instructor led traininggroup study and discussioncoursewareworkshop / seminar : Since the mid-1980's when the predecessor to the modern Internet became popular, computer crimes have been committed. In today's modern world, computers are not just an instrument of the crime, but can be the fruit of the crime as well. Once thought to be the realm of the socially outcast, brilliant but misguided youth (the "hacker"), computer crime has spread both in quantity and in scope. Use of the computer in everyday life has become so widespread that more traditional crimes such as murder and extortion now involve computers. Even more frightening is the prospect of computer criminals attacking your online more...
Countering Terrorism the Asset Threat Spectrum instructor led traininggroup study and discussioncoursewareworkshop / seminar : The primary objectives of this program are to equip the attendees with an understanding of the current international politico-economic climate which impacts on diplomacy and business, and addresses the prospects for the short and medium term. When the Berlin Wall came tumbling down in November, 1989 it affected more than the traffic flow through the once divided city. It marked the end of the Cold War which, despite all its crises and tribulations, was also a time of certainties, of permanent friends and permanent enemies. It has already become a more...
Covert Investigations Surveillance Technologies instructor led traininggroup study and discussioncoursewareworkshop / seminar : INTRODUCTION: Covert Investigations & Surveillance Technologies are excellent methods of acquiring information; however they require sound techniques and the use of experienced, trained investigators and sate-of-the-art technology. They are closely related because in each instance, the investigator banishes his or her official standing to an obscure identity in order to accomplish the mission. In undercover operations, the investigator may assume an entirely different identity, often requiring extensive preparations. Because of the total involvement, and in some cases, more...
Design Application of Industrial Security Systems instructor led traininggroup study and discussioncoursewareworkshop / seminar : Experience indicates that most Facility Protection Systems are poorly designed and easily breached. The integrity of Industrial Security depends on the conceptual design philosophy, including a thorough Requirements Document and a complete Facility Development Plan (FDP) prior to the selection, placement, and utilization of detection equipment. A Threat Assessment must first more...
Dignitary Protection Operational Planning instructor led traininggroup study and discussioncoursewareself directedworkshop / seminartrain the trainer : The Dignitary Protection & Operational Planning course is a comprehensive and intensive five (5) day, sixty plus (60+) hour program. This Public Figure course is drawn from the programs we have provided for Corporate, Military, Law Enforcement and Government personnel in the Americas, the Orient, Middle East, and Europe. more...
Executive VIP Protection Planning instructor led traininggroup study and discussioncoursewareworkshop / seminar : Primary objective of this program is to provide the attendees with an understanding of how to prevent and lessen the likelihood of a criminal or terrorist attack against themselves, their family, or those they provide protective services to. Sophisticated criminal or terrorist attacks are always difficult to detect or predict. They often appear to be committed without any warning or reason by individuals who just happen to act on a target of opportunity. In reality, quite often these acts of terrorism or criminal activity are well planned. They are more often carried out by intelligent, calculating individuals. They may be committed to a cause and strongly believe the use of violence or more...
Executive Protection Tactical Medical instructor led traininggroup study and discussioncoursewareworkshop / seminar : The primary objective of the Executive Protection Tactical Medic program is to provide attendees with an understanding of how to provide out of hospital care in a Hostile environment. The Executive Protection Tactical Medic program was specifically designed for the Tactical Medical Operator. Not all entities operating in the tactical or complex environments are able to engage the use of traditional medical providers. This course was designed to bring forward critical, life saving skills to the tactical operators at the more...
Harbor Maritime Security - Protecting the World's Ports instructor led traininggroup study and discussioncoursewareDVDworkshop / seminar : To train personnel to ensure that all attendees can apply a standard level of adequate and timely security within the Harbor & Maritime Security environments. This course is intended to exceed the training requiremenets set forth by the International Maritime Organization's (IMO), 'Port Facility Security Officer' and the United States Maritime Transportation Security Act of 2002. Using the most qualified expertise more...
Homeland Security - Protecting the Nations Critical Infrastructure instructor led trainingcourseware : In light of September 11, 2001, the President of the United States of America proposed and was granted the creation of the Department of Homeland Security. This is the most significant transformation of the U. S. government in over a half-century. The creation of this cabinet-level agency was an important step in the President's national strategy for homeland security. The mission of the Department more...
Incident Response for Business Industry instructor led traininggroup study and discussioncoursewareworkshop / seminar : Awareness is the key. Each state has a limited Weather Cycle. Terrorism, and Ideologue attacks, are on a twelve (12) month cycle, with no breaks. The Department of Transportation estimates there are more than 8200 hazardous materials. At least 45 mandate evacuation. Federal Government reports have identified likely terrorist targets: Government Buildings; Public more...
Interviews & Interrogations instructor led traininggroup study and discussioncoursewareworkshop / seminar : All Business & Industrial entities take property loss and other, civil and/ or criminal incidents very seriously. They recognize fraud and other employee offenses for exactly what they are: an enemy without pity, conscience, or fear; an enemy that doesn't care whose property they take, whose business it ruins, whose body it maims or whose life it takes. Industrial fraud and other crime are an enemy that refuses to give up, one that, even when beaten to the smallest extent, can result in catastrophic proportions. Interviewing & Interrogations in a large Business or more...
Risk Management for Government Industry instructor led traininggroup study and discussioncoursewareworkshop / seminar : Experience indicates that most Industrial Facilities are poorly designed and easily breached. The integrity of Facility Protection depends on Security Management Techniques and the Layered Countermeasure philosophy, including a complete Threat Assessment of requirements and a thorough Risk Analysis (TARA), prior to the selection, more...
Root Issues Cuasal Effects- Impacts Consequences-Cyber group study and discussionDVDworkshop / seminar : "Securing CyberSpace?" INFORMATION INSECURITY? IS New Technology Helping You Succeed ...OR, Is The Cyber Criminal/ Terrorist One Step Ahead? IS The Nation's Critical Infrastructure At Risk? Unique Program: This intensive three day interactive presentation has the unique quality of looking at the more...
Securing CyberSpace - Protection of Computers Proprietary Information instructor led traininggroup study and discussioncoursewareworkshop / seminar : MINDSET OF THE HACKER In the rapidly advancing world of Information Technology, it is time to focus on more than just the technical complexities of Information Security, and to take a little time to study the mind of the "Information Criminal" or "Hacker". > What is the motivation of the Information Criminal? > How easily available is "confidential" information? > What technical challenges has he overcome? > What are his new technology challenges and  more...
Securing Educational Facilities - Safety on Campus A Balanced Approach instructor led traininggroup study and discussionworkshop / seminar : In light of recent events on the campus of Virginia Tech, and elsewhere, it is evident that isolated incidents as well as terrorist threats continue to capture the attention of the public. This sometimes creates more confusion and wasted effort than anything else - as evidenced by the commotion surrounding the Federal Government's Duct Tape advisory during the aftermath of September 11, 2001. But there are specific steps that Campuses can more...
Securing Mass Transit - Enhancing Passenger Safety instructor led traininggroup study and discussioncoursewareworkshop / seminar : Using the most qualified expertise available, the World Institute for Security Enhancement provides practical workshops designed to improve security at the feceral, municipal, state and local level to those who want to respond effectively to issues following the tragedies of September 11, 2001. This program is tailored specifically to meet the needs of Mass Transit System personnel, security officials & officers, law enforcement and practitioners within the more...
Technical Surveillance CounterMeasures instructor led traininggroup study and discussioncoursewareworkshop / seminar : To acquaint the security director and the Technical Surveillance CounterMeasures (TSCM) inspector with the nature of the eavesdropping threat and the ways that it can be countered. To provide the attendee with information that he can apply to his own situation when designing and maintaining his eavesdropping defense. METHOD of PRESENTATION The subject is presented in a series of class lectures, technical demonstrations & practical exercises that include the following: Eavesdropping Techniques: Methods of more...
Technical Surveillance Countermeasures-Tactical instructor led traininggroup study and discussioncoursewareworkshop / seminar : PROGRAM OBJECTIVES To acquaint the Technical Security Specialist and the Technical Surveillance CounterMeasures (TSCM) "Sweeper" with the nature of the eavesdropping threat and the ways that it can be countered. To provide the attendee with information and an operational approach that he can apply to his own situation when designing and maintaining his eavesdropping defense. To introduce the attendee with the traditional "Tradecraft" approach and it's relationship to the emerging more...
Understanding Security Technologies instructor led traininggroup study and discussionworkshop / seminar : The integrity of Industrial Security depends on a thorough understanding of Industrial Security Technologies, prior to the selection, placement, and utilization of detection equipment. Industrial Security Systems include Access Control Systems, Closed Circuit Television Systems and Intrusion Detection Systems and other industrial components. Exasmples of systems and components will be discussed and evaluated.
InvestigationsInvestigations
Investigative Techniques Procedures instructor led traininggroup study and discussioncourseware : Processing a crime scene includes the application of diligent and careful methods by investigators to recognize, identify, preserve, and collect facts and items of evidentiary value that may assist in reconstructing that which actually occurred. It is of the utmost importance to the success of any investigation that the investigating officer makes no errors at the crime scene or during follow-up investigations. Also the first officer on the scene must avoid diminishing or destroying potential clues which may eventually lead to the apprehension of the criminal. The investigator must be trained in all aspects of criminal investigation. This powerful five day training course has been more...
Head Office
310 North Front StreetSuite 4345WilmingtonNC28401USA
Training and Seminar Locations
Want to Sell More contingency planning training?
Custom Search
tcw11-v473M-11/14/17-01:30:17-()[A]-[B]-[B] -00:51:18