Product defence

Identifying internal vulnerabilities

£26.00 (plus VAT)

Worth 1 credit on your training dashboard.
This training is designed for:
Operations, HR, security and IT roles within the product defence team

Upon completion of this course, you’ll be able to identify the business activities which affect site security and product security, and that need to be assessed for the relevant threats and to identify the vulnerabilities ready for assessment. Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course.

This course will teach you the specifics of the internal supply-chain, so that you can create a focused threat and vulnerability assessment, which is compliant to the standards.

It explains the four key threats that must be considered and the four types of vulnerability, so you’ll know exactly how to assess each of your facilities.

Your solution to site security and product security

Site security and product security has progressed over the last few years, which now means that a more detailed assessment is required which covers fraud, sabotage, and terrorism.

Knowing how to apply these requirements across food, packaging, storage, distribution and agents and brokers standards can be challenging.

This course provides a simple solution for site security and product security to identify internal vulnerabilities, that can be applied to any business. Having a set structure to work to, removes the uncertainty – allowing you to meet the requirements and implement a product defence system that actually adds value.

6 mini trainings covering site security and product security

There are a total of 6 mini trainings in this series. Identifying internal vulnerabilities is the 4th in the series. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):

Unit 1 – Understanding product defence

Unit 2 – Managing the product defence system.

Unit 3 – Identifying vulnerabilities upstream.

Unit 4 – Identifying internal vulnerabilities. (this mini training).

Unit 5 – Identifying vulnerabilities downstream.

Unit 6 – Assessing and protecting vulnerable threats.

This training has been designed to meet the following sections of the standards:

Food Safety
Issue 8
Packaging
Issue 6
Agents & Brokers
Issue 3
Storage & Distribution
Issue 4
4.2.1 Documented assessment of security

5.4.1 Provision of knowledge and information

This course is compliant to BRCGS Issue 9 draft as well!

4.4.1 Risk assessment of security

3.8.1 Obtaining information

4.3.1 Product security/ food defence

4.8.1 Provision of knowledge and information

4.2.1 Security risk assessment

10.3.3.1 Information

 

FSSC 22000
Version 5.1
IFS Food
Version 7
SQF Food Manufacturing Edition 9
2.5.3.1a) Identify food defence threats

2.5.4.1a) Identify food fraud threats

4.20.2* Fraud assessment scope

4.20.3* Monitoring of food frau

6..2* Food defence scope

6.3 Monitoring of food defence

2.7.1.2 i) and ii) Methods, responsibilities and criteria

2.7.2.2 Food fraud mitigation plan

We recommend that you complete the mini training ‘Understanding product defence‘ before taking any of the other courses in the product defence series.

It provides the foundation of the basic understanding of product defence. This allows additional learning to be overlayed, producing a gradual learning experience – preventing the learner from becoming overwhelmed.

Understanding product defence‘ will automatically be added to your cart when you purchase this course.

About the training

‘Identifying internal vulnerabilities’ eLearning will teach you how to identify threats and vulnerabilities for the internal piece of the supply-chain, ready for assessment later.

The course includes exercises and takes approx. 50 minutes without breaks.

The test is made up of 25 multiple-choice questions. 70% is required to pass and gain a certificate. The test is open book and retakes are free of charge.

Upon completion of this course, you’ll be able to identify threats and vulnerabilities internally to meet the requirements of your BRCGS, FSSC 22000, IFS or SQF certification standard. We recommend on completion of this course, that you then go on to complete the mini training ‘Assessing and protecting vulnerable threats’, where you’ll learn how to carry out the threat and vulnerability assessment and apply the required protection measures.

The supply-chain

There are three pieces to the supply-chain; upstream internal and downstream. This course focuses on the internal, which assesses the threats and vulnerabilities concerning the internal business activities.

site security and product security

Four threats and four vulnerabilities

This course provides you with a structure to use when identifying threats and vulnerabilities. Having a structure makes it easy to carry out the assessment, as answering the questions will lead you to the answers.

Reviews

There are no reviews yet.

Be the first to review “Identifying internal vulnerabilities”

Your email address will not be published.