Product defence

Identifying vulnerabilities upstream

£26.00 (plus VAT)

Worth 1 credit on your training dashboard.
This training is designed for:
Procurement and technical roles within the product defence team.

Upon completion of this course, you’ll be able to identify vulnerabilities in the upstream supply-chain, ready to create your food fraud vulnerability assessment. Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course.

The course explains the two types of custody, so that you can define in your scope of custody what the business is responsible and accountable for.

A simple 5-step process for identification of threats and vulnerabilities is provided, which teaches you how to identify those which are pertinent to your business, so that your assessment is credible.

This course teaches you a technique for supply-chain mapping, saving you time by concentrating only on the vulnerable threats and assessing them to the specific point of assurance.

Learn how to create your food fraud vulnerability assessment

We’re currently in a similar situation as we were when HACCP was relatively new, where most business’ have a food fraud vulnerability assessment which is complicated and very lengthy.

As the methodology and our understanding has progressed, it means there’s now a need to review our food fraud vulnerability assessments to reduce the complexity and improve their effectiveness.

This course provides you with the method you need to do exactly that. The training leads with a philosophy of quality over quantity, which means that implementing what you’ve learn will result in a simple and extremely focused and effective food fraud vulnerability assessment.

6 mini trainings covering food fraud vulnerability assessment, product security and defence

There are a total of 6 mini trainings in this series. Identifying vulnerabilities is the 3rd in the series. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):

Unit 1 – Understanding product defence

Unit 2 – Managing the product defence system.

Unit 3 – Identifying vulnerabilities upstream. (this mini training).

Unit 4 – Identifying internal vulnerabilities.

Unit 5 – Identifying vulnerabilities downstream.

Unit 6 – Assessing and protecting vulnerable threats.

This training has been designed to meet the following sections of the standards:

Food Safety
Issue 8
Issue 6
Agents & Brokers
Issue 3
Storage & Distribution
Issue 4
5.4.2 Vulnerability assessment

5.4.4 Status verification of raw materials

5.4.1 Provision of knowledge and information

This course is compliant to BRCGS Issue 9 draft as well!

3.8.2 Vulnerability assessment

3.8.1 Obtaining information

4.8.2 Vulnerability assessments

4.8.1 Provision of knowledge and information Fraud vulnerability assessment Vulnerability assessment Information


FSSC 22000
Version 5.1
IFS Food
Version 7
SQF Food Manufacturing Edition 9 Identify food defence threats Identify food fraud threats

4.20.2* Fraud assessment scope

4.20.3* Monitoring of food frau

6.2* Food defence scope

6.3 Monitoring of food defence i) and ii) Methods, responsibilities and criteria Food fraud mitigation plan

We recommend that you complete the mini training ‘Understanding product defence‘ before taking any of the other courses in the product defence series.

It provides the foundation of the basic understanding of product defence. This allows additional learning to be overlayed, producing a gradual learning experience – preventing the learner from becoming overwhelmed.

Understanding product defence‘ will automatically be added to your cart when you purchase this course.

About the training

‘Identifying vulnerabilities upstream’ eLearning teaches you a clear and simple to use process for identifying threats and vulnerabilities from fraud, sabotage and terrorism in the upstream supply-chain.

The course includes exercises and takes approx. 80 minutes without breaks.

The test is made up of 25 multiple-choice questions. 70% is required to pass and gain a certificate. The test is open book and retakes are free of charge.

On completion of this course, you’ll be able to identify threats and vulnerabilities in your upstream supply-chain to meet the requirements of your BRCGS, FSSC 22000, IFS or SQF certification standard. We recommend that you then complete the mini training ‘Assessing and protecting vulnerable threats’ so that you can learn how to carry out the assessment and apply the required protection measures.

food fraud vulnerability assessment

5-step identification process

This course will teach you a simple to use 5-step process, so that you can identify which threats and vulnerabilities are relevant to your business, including those that come from claims. This ensures that you don’t ‘fill up’ your assessment with unnecessary threats which will overwhelm you and prevent you from taking action.

Supply chain mapping

Supply-chain mapping

This subject is new to the industry and that’s why it’s caused a considerable amount of confusion. This course demystifies this subject and provides you with some simple guidelines to follow. This will ensure that you only carry out supply-chain mapping where it’s really necessary and only to the point at which it’s needed.


There are no reviews yet.

Be the first to review “Identifying vulnerabilities upstream”

Your email address will not be published.