Assessing and protecting vulnerable threats
£26.00 (plus VAT)
All members of the product defence team.
On completion of this course, you’ll be able to complete your threat and vulnerability assessment to determine vulnerable threats that you’ve identified upstream, internally and in the downstream supply-chain, and then determine the necessary protection measures.
Please note, it’s recommended that you complete the mini training ‘Understanding product defence’ before starting this course. You will also need to complete at least one of the following, so that you know how to identify the vulnerable threats you need, to go into the assessment:
- Identifying vulnerabilities upstream.
- Identifying internal vulnerabilities.
- Identifying vulnerabilities downstream.
This course will teach you the methodology you need to assess vulnerable threats and determine those which are significant.
It explains how to then apply protection measures to significant vulnerabilities and the monitoring techniques that should be used.
Examples are provided so that you can see how the assessment can be documented.
Threat and vulnerability assessment method
The standards expect the team who carry out your threat and vulnerability assessments to be trained in the method that you use.
This means you must have a defined and clear method which determines which threats and vulnerabilities are significant. So that you can then train your team.
This course provides you with a simple method for your threat and vulnerability assessment, which can be used to assess the vulnerabilities that you’ve identified upstream, internally and downstream. This means that you can incorporate the method into your own procedures and then train your team using these mini trainings – so that you don’t have to develop and deliver your own training.
6 mini trainings for threat and vulnerability assessment
There are a total of 6 mini trainings in this series. Assessing and protecting vulnerable threats is the last. You can complete the other mini trainings or go for our super course which contains all 6 (saving you £26):
Unit 6 – Assessing and protecting vulnerable threats. (this mini training).
This training has been designed to meet the following sections of the standards:
|Agents & Brokers|
|Storage & Distribution|
|5.4.2 Vulnerability assessment|
5.4.3 Output from the vulnerability assessment
4.2.1 Documented assessment of security
4.2.2 Additional controls to mitigate risks
4.2.3 Authorised access (protection measures)
|3.8.2 Vulnerability assessment|
3.8.3 Output from the vulnerability assessment
4.4.1 Risk assessment of security
4.4.2 Site access (protection measures)
4.4.3 External storage (protection measures)
|4.3.1 Product security/ food defence|
4.8.2 Vulnerability assessments
4.8.3 Products at risk of adulteration or substitution
|188.8.131.52 Output from the vulnerability assessment|
10.3.3.2 Vulnerability assessment
184.108.40.206 Vulnerability assessment review
4.2.1 Threat assessment
4.2.3 Site security procedures
5.2.2 Vehicle security procedures
|SQF Food Manufacturing Edition 9|
|220.127.116.11a) Assess food defence threats|
18.104.22.168a) Assess food fraud threats
22.214.171.124a) Food defence plan
126.96.36.199a) Food fraud plan
188.8.131.52b) Develop and implement food defence protection measures
184.108.40.206b) Develop and implement food fraud protection measures
|4.20.3* Implement controls|
6.3 Control measures
|220.127.116.11 iii) iv) v) vi) and vii) Protection methods|
We recommend that you complete the mini training ‘Understanding product defence‘ before taking any of the other courses in the product defence series.
It provides the foundation of the basic understanding of product defence. This allows additional learning to be overlayed, producing a gradual learning experience – preventing the learner from becoming overwhelmed.
‘Understanding product defence‘ will automatically be added to your cart when you purchase this course.