Identifying vulnerabilities downstream
£26.00 (plus VAT)
Product defence team members who manage contractors, such as logistics and contractor management.
On completion of this course, you’ll be able to identify the business activities completed by each contractor in the downstream supply-chain, and which need to be assessed for the relevant threats, to identify the vulnerabilities ready for assessment. Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course.
This course will teach you the specifics of the downstream supply-chain, so that you can create a focused threat and vulnerability assessment, which is compliant to the standards.
It explains the four key threats that must be considered, and the four types of vulnerability, and how these relate to the contractors that your business uses.
Managing product defence when using a contractor
Although the topic of product defence including fraud has developed over recent years, there has been a lack of clarity around threats in the downstream supply-chain. The standards refer to fraud downstream, but it’s not clear how this must be applied. The agents and brokers standard refers to contractors when applying product defence but still, it’s not clear what this means.
This course shines a light on this subject. It identifies contractors as the main focus and explains how their management for product defence must be linked to supplier (contractor) management systems.
On completion of this course you’ll be able to implement robust product defence measures throughout your downstream supply-chain simply by linking them to your supplier management systems.
6 mini trainings
There are a total of 6 mini trainings in this series. Identifying vulnerabilities downstream is the 5th in the series. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):
Unit 5 – Identifying vulnerabilities downstream. (this mini training).
This training has been designed to meet the following sections of the standards:
|Agents & Brokers|
|Storage & Distribution|
|4.2.1 Documented assessment of security|
5.4.1 Provision of knowledge and information
|4.4.1 Risk assessment of security|
3.8.1 Obtaining information
|4.3.1 Product security/ food defence|
4.8.1 Provision of knowledge and information
|5.2.1 XS Vehicle security risk assessment|
|SQF Food Manufacturing Edition 9|
|188.8.131.52a) Identify food defence threats|
184.108.40.206a) Identify food fraud threats
|4.20.2* Fraud assessment scope|
4.20.3* Monitoring of food frau
6..2* Food defence scope
6.3 Monitoring of food defence
|220.127.116.11 i) and ii) Methods, responsibilities and criteria|
18.104.22.168 Food fraud mitigation plan
About the training
Identifying vulnerabilities downstream eLearning will teach you how to assess and identify vulnerable threats when using contractors. It provides clarity, so that it’s clear who’s accountable and who’s responsible for product defence downstream.
The course includes exercises and takes approx. 45 minutes without breaks.
The test is made up of 25 multiple-choice questions. 70% is required to pass and gain a certificate. The test is open book and retakes are free of charge.
Upon completion of this course, you’ll be able to identify threats and vulnerabilities in the downstream supply-chain to meet the requirements of your BRCGS, FSSC 22000, IFS or SQF certification standard. We recommend on completion of this course, that you then go on to complete the mini training ‘Assessing and protecting vulnerable threats’, where you’ll learn how to carry out the threat and vulnerability assessment and apply the required protection measures.