Product defence
Identifying vulnerabilities upstream
£26.00 (plus VAT)
Procurement and technical roles within the product defence team.
Upon completion of this course, you’ll be able to identify vulnerabilities in the upstream supply-chain, ready to create your food fraud vulnerability assessment. Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course.
The course explains the two types of custody, so that you can define in your scope of custody what the business is responsible and accountable for.
A simple 5-step process for identification of threats and vulnerabilities is provided, which teaches you how to identify those which are pertinent to your business, so that your assessment is credible.
This course teaches you a technique for supply-chain mapping, saving you time by concentrating only on the vulnerable threats and assessing them to the specific point of assurance.
Learn how to create your food fraud vulnerability assessment
We’re currently in a similar situation as we were when HACCP was relatively new, where most business’ have a food fraud vulnerability assessment which is complicated and very lengthy.
As the methodology and our understanding has progressed, it means there’s now a need to review our food fraud vulnerability assessments to reduce the complexity and improve their effectiveness.
This course provides you with the method you need to do exactly that. The training leads with a philosophy of quality over quantity, which means that implementing what you’ve learn will result in a simple and extremely focused and effective food fraud vulnerability assessment.
6 mini trainings covering food fraud vulnerability assessment, product security and defence
There are a total of 6 mini trainings in this series. Identifying vulnerabilities is the 3rd in the series. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):
Unit 1 – Understanding product defence
Unit 2 – Managing the product defence system.
Unit 3 – Identifying vulnerabilities upstream. (this mini training).
Unit 4 – Identifying internal vulnerabilities.
This training has been designed to meet the following sections of the standards:
Food Safety Issue 8 | Packaging Issue 6 | Agents & Brokers Issue 3 | Storage & Distribution Issue 4 |
5.4.2 Vulnerability assessment 5.4.4 Status verification of raw materials 5.4.1 Provision of knowledge and information | 3.8.2 Vulnerability assessment 3.8.1 Obtaining information | 4.8.2 Vulnerability assessments 4.8.1 Provision of knowledge and information | 3.5.3.1 Fraud vulnerability assessment 10.3.3.2 Vulnerability assessment 10.3.3.1 Information
|
FSSC 22000 Version 5.1 | IFS Food Version 7 | SQF Food Manufacturing Edition 9 | |
2.5.3.1a) Identify food defence threats 2.5.4.1a) Identify food fraud threats | 4.20.2* Fraud assessment scope 4.20.3* Monitoring of food frau 6.2* Food defence scope 6.3 Monitoring of food defence | 2.7.1.2 i) and ii) Methods, responsibilities and criteria 2.7.2.2 Food fraud mitigation plan |
We recommend that you complete the mini training ‘Understanding product defence‘ before taking any of the other courses in the product defence series.
It provides the foundation of the basic understanding of product defence. This allows additional learning to be overlayed, producing a gradual learning experience – preventing the learner from becoming overwhelmed.
‘Understanding product defence‘ will automatically be added to your cart when you purchase this course.
About the training
‘Identifying vulnerabilities upstream’ eLearning teaches you a clear and simple to use process for identifying threats and vulnerabilities from fraud, sabotage and terrorism in the upstream supply-chain.
The course includes exercises and takes approx. 80 minutes without breaks.
The test is made up of 25 multiple-choice questions. 70% is required to pass and gain a certificate. The test is open book and retakes are free of charge.
On completion of this course, you’ll be able to identify threats and vulnerabilities in your upstream supply-chain to meet the requirements of your BRCGS, FSSC 22000, IFS or SQF certification standard. We recommend that you then complete the mini training ‘Assessing and protecting vulnerable threats’ so that you can learn how to carry out the assessment and apply the required protection measures.
5-step identification process
This course will teach you a simple to use 5-step process, so that you can identify which threats and vulnerabilities are relevant to your business, including those that come from claims. This ensures that you don’t ‘fill up’ your assessment with unnecessary threats which will overwhelm you and prevent you from taking action.
Supply-chain mapping
This subject is new to the industry and that’s why it’s caused a considerable amount of confusion. This course demystifies this subject and provides you with some simple guidelines to follow. This will ensure that you only carry out supply-chain mapping where it’s really necessary and only to the point at which it’s needed.
Reviews
There are no reviews yet.