Product defence

Identifying vulnerabilities downstream

£26.00 (plus VAT)

Worth 1 credit on your training dashboard.
This training is designed for:
Product defence team members who manage contractors, such as logistics and contractor management.

On completion of this course, you’ll be able to identify the business activities completed by each contractor in the downstream supply-chain, and which need to be assessed for the relevant threats, to identify the vulnerabilities ready for assessment. Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course.

This course will teach you the specifics of the downstream supply-chain, so that you can create a focused threat and vulnerability assessment, which is compliant to the standards.

It explains the four key threats that must be considered, and the four types of vulnerability, and how these relate to the contractors that your business uses.

Managing product defence when using a contractor

Although the topic of product defence including fraud has developed over recent years, there has been a lack of clarity around threats in the downstream supply-chain. The standards refer to fraud downstream, but it’s not clear how this must be applied. The agents and brokers standard refers to contractors when applying product defence but still, it’s not clear what this means.

This course shines a light on this subject. It identifies contractors as the main focus and explains how their management for product defence must be linked to supplier (contractor) management systems.

On completion of this course you’ll be able to implement robust product defence measures throughout your downstream supply-chain simply by linking them to your supplier management systems.

6 mini trainings

There are a total of 6 mini trainings in this series. Identifying vulnerabilities downstream is the 5th in the series. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):

Unit 1 – Understanding product defence

Unit 2 – Managing the product defence system.

Unit 3 – Identifying vulnerabilities upstream.

Unit 4 – Identifying internal vulnerabilities.

Unit 5 – Identifying vulnerabilities downstream. (this mini training).

Unit 6 – Assessing and protecting vulnerable threats.

This training has been designed to meet the following sections of the standards:

Food Safety
Issue 8
Issue 6
Agents & Brokers
Issue 3
Storage & Distribution
Issue 4
4.2.1 Documented assessment of security

5.4.1 Provision of knowledge and information

This course is compliant to BRCGS Issue 9 draft as well!

4.4.1 Risk assessment of security

3.8.1 Obtaining information

4.3.1 Product security/ food defence

4.8.1 Provision of knowledge and information

5.2.1 XS Vehicle security risk assessment Information


FSSC 22000
Version 5.1
IFS Food
Version 7
SQF Food Manufacturing Edition 9 Identify food defence threats Identify food fraud threats

4.20.2* Fraud assessment scope

4.20.3* Monitoring of food frau

6..2* Food defence scope

6.3 Monitoring of food defence i) and ii) Methods, responsibilities and criteria Food fraud mitigation plan

About the training

Identifying vulnerabilities downstream eLearning will teach you how to assess and identify vulnerable threats when using contractors. It provides clarity, so that it’s clear who’s accountable and who’s responsible for product defence downstream.

The course includes exercises and takes approx. 45 minutes without breaks.

The test is made up of 25 multiple-choice questions. 70% is required to pass and gain a certificate. The test is open book and retakes are free of charge.

Upon completion of this course, you’ll be able to identify threats and vulnerabilities in the downstream supply-chain to meet the requirements of your BRCGS, FSSC 22000, IFS or SQF certification standard. We recommend on completion of this course, that you then go on to complete the mini training ‘Assessing and protecting vulnerable threats’, where you’ll learn how to carry out the threat and vulnerability assessment and apply the required protection measures.

Contractor management roles

Clear roles and responsibilities

Ensuring that your business knows which parts of the supply-chain, including those downstream that it’s responsible and accountable for is critical to product defence. This course provides this clarity and ensures that it has solid links to supplier management, where the protection measures will be applied.

threats and vulnerabilities

Five threats and four vulnerabilities

This course provides you with a structure to use when considering threats and vulnerabilities.

Having a structure makes it easy to ensure that the contractor carries out the assessment.


There are no reviews yet.

Be the first to review “Identifying vulnerabilities downstream”

Your email address will not be published.