Identifying internal vulnerabilities
£26.00 (plus VAT)
Operations, HR, security and IT roles within the product defence team

This product defence training series is written by Kassy Marsh who is a PCQI Lead Instructor (certificate #79fa1998) and co-authored the book Assessing Threat Vulnerability for Food Defence. The methodology used is traceable to PAS 96.
Upon completion of this course, you’ll be able to identify the business activities which affect site security and product security, and that need to be assessed for the relevant threats and to identify the vulnerabilities ready for assessment. Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course.
This course will teach you the specifics of the internal supply-chain, so that you can create a focused threat and vulnerability assessment, which is compliant to the standards.
It explains the four key threats that must be considered and the four types of vulnerability, so you’ll know exactly how to assess each of your facilities.
Your solution to site security and product security
Site security and product security has progressed over the last few years, which now means that a more detailed assessment is required which covers fraud, sabotage, and terrorism.
Knowing how to apply these requirements across food, packaging, storage, distribution and agents and brokers standards can be challenging.
This course provides a simple solution for site security and product security to identify internal vulnerabilities, that can be applied to any business. Having a set structure to work to, removes the uncertainty – allowing you to meet the requirements and implement a product defence system that actually adds value.
6 mini trainings covering site security and product security
There are a total of 6 mini trainings in this series. Identifying internal vulnerabilities is the 4th in the series. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):
Unit 1 – Understanding product defence
Unit 2 – Managing the product defence system.
Unit 3 – Identifying vulnerabilities upstream.
Unit 4 – Identifying internal vulnerabilities. (this mini training).
This training has been designed to meet the following sections of the standards:
BRCGS Food Safety Issue 9 |
BRCGS Packaging Issue 6 |
BRCGS Agents & Brokers Issue 3 |
BRCGS Storage & Distribution Issue 4 |
4.2.2 Documented assessment of security
5.4.2 Provision of knowledge and information |
4.4.1 Risk assessment of security
3.8.1 Obtaining information |
4.3.1 Product security/ food defence
4.8.1 Provision of knowledge and information |
4.2.1 Security risk assessment
10.3.3.1 Information
|
FSSC 22000 Version 5.1 |
IFS Food Version 7 |
SQF Food Manufacturing Edition 9 | FSMA |
2.5.3.1a) Identify food defence threats
2.5.4.1a) Identify food fraud threats |
4.20.2* Fraud assessment scope
4.20.3* Monitoring of food frau 6..2* Food defence scope 6.3 Monitoring of food defence |
2.7.1.2 i) and ii) Methods, responsibilities and criteria
2.7.2.2 Food fraud mitigation plan |
Intentional adulteration rule (Final 2016) |
We recommend that you complete the mini training ‘Understanding product defence‘ before taking any of the other courses in the product defence series.
It provides the foundation of the basic understanding of product defence. This allows additional learning to be overlayed, producing a gradual learning experience – preventing the learner from becoming overwhelmed.
‘Understanding product defence‘ will automatically be added to your cart when you purchase this course.
About the training
‘Identifying internal vulnerabilities’ eLearning will teach you how to identify threats and vulnerabilities for the internal piece of the supply-chain, ready for assessment later.
The course includes exercises and takes approx. 50 minutes without breaks.
The test is made up of 25 multiple-choice questions. 70% is required to pass and gain a certificate. The test is open book and retakes are free of charge.
Upon completion of this course, you’ll be able to identify threats and vulnerabilities internally to meet the requirements of your BRCGS, FSSC 22000, IFS or SQF certification standard. We recommend on completion of this course, that you then go on to complete the mini training ‘Assessing and protecting vulnerable threats’, where you’ll learn how to carry out the threat and vulnerability assessment and apply the required protection measures.
The supply-chain
There are three pieces to the supply-chain; upstream internal and downstream. This course focuses on the internal, which assesses the threats and vulnerabilities concerning the internal business activities.
Four threats and four vulnerabilities
This course provides you with a structure to use when identifying threats and vulnerabilities. Having a structure makes it easy to carry out the assessment, as answering the questions will lead you to the answers.

Find out more about our endorsement programme
Reviews
There are no reviews yet.