Product defence

Assessing and protecting vulnerable threats

£26.00 (plus VAT)

Worth 1 credit on your training dashboard.
This training is designed for:
All members of the product defence team.

On completion of this course, you’ll be able to complete your threat and vulnerability assessment to determine vulnerable threats that you’ve identified upstream, internally and in the downstream supply-chain, and then determine the necessary protection measures.

Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course. You will also need to complete at least one of the following, so that you know how to identify the vulnerable threats you need, to go into the assessment:

  • Identifying vulnerabilities upstream.
  • Identifying internal vulnerabilities.
  • Identifying vulnerabilities downstream.

This course will teach you the methodology you need to assess vulnerable threats and determine those which are significant.

It explains how to then apply protection measures to significant vulnerabilities and the monitoring techniques that should be used.

Examples are provided so that you can see how the assessment can be documented.

Threat and vulnerability assessment method

The standards expect the team who carry out your threat and vulnerability assessments to be trained in the method that you use.

This means you must have a defined and clear method which determines which threats and vulnerabilities are significant. So that you can then train your team.

This course provides you with a simple method for your threat and vulnerability assessment, which can be used to assess the vulnerabilities that you’ve identified upstream, internally and downstream. This means that you can incorporate the method into your own procedures and then train your team using these mini trainings – so that you don’t have to develop and deliver your own training.

6 mini trainings for threat and vulnerability assessment

There are a total of 6 mini trainings in this series. Assessing and protecting vulnerable threats is the last. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):

Unit 1 – Understanding product defence

Unit 2 – Managing the product defence system.

Unit 3 – Identifying vulnerabilities upstream.

Unit 4 – Identifying internal vulnerabilities.

Unit 5 – Identifying vulnerabilities downstream.

Unit 6 – Assessing and protecting vulnerable threats. (this mini training).

This training has been designed to meet the following sections of the standards:

Food Safety
Issue 8
Issue 6
Agents & Brokers
Issue 3
Storage & Distribution
Issue 4
5.4.2 Vulnerability assessment

5.4.3 Output from the vulnerability assessment

4.2.1 Documented assessment of security

4.2.2 Additional controls to mitigate risks

4.2.3 Authorised access (protection measures)

This course is compliant to BRCGS Issue 9 draft as well!

3.8.2 Vulnerability assessment

3.8.3 Output from the vulnerability assessment

4.4.1 Risk assessment of security

4.4.2 Site access (protection measures)

4.4.3 External storage (protection measures)

4.3.1 Product security/ food defence

4.8.2 Vulnerability assessments

4.8.3 Products at risk of adulteration or substitution Output from the vulnerability assessment Vulnerability assessment Vulnerability assessment review

4.2.1 Threat assessment

4.2.3 Site security procedures

5.2.2 Vehicle security procedures


FSSC 22000
Version 5.1
IFS Food
Version 7
SQF Food Manufacturing Edition 9 Assess food defence threats Assess food fraud threats Food defence plan Food fraud plan Develop and implement food defence protection measures Develop and implement food fraud protection measures

4.20.3* Implement controls

6.3 Control measures iii) iv) v) vi) and vii) Protection methods

We recommend that you complete the mini training ‘Understanding product defence‘ before taking any of the other courses in the product defence series.

It provides the foundation of the basic understanding of product defence. This allows additional learning to be overlayed, producing a gradual learning experience – preventing the learner from becoming overwhelmed.

Understanding product defence‘ will automatically be added to your cart when you purchase this course.



Currently, there’s only one comprehensive method available, which is provided in the book ‘Assessing Threat and Vulnerability for Food Defence’ by Adele Adams and Kassy Marsh.

This is the method used by Techni-K and so, will be used in this course with one element improved to combine the decision trees from the original methodology into one – this is intended to simplify the process.

threat and vulnerability assessment

Monitoring techniques

The course provides clear guidance on the types of monitoring technique which are; the risk register, PPRs, CCPs and VTPs. Which means you’ll know exactly how to monitor the protection measures that you identify.


There are no reviews yet.

Be the first to review “Assessing and protecting vulnerable threats”

Your email address will not be published.