Critical Infrastructure Protection Course
The S2 Critical Infrastructure Protection (CIP) Course is designed to prepare security professionals for assignments involving the protection of critical process facilities against sabotage and terrorist violence. This program provides a detailed exploration of risk management methods for critical infrastructure sites, adversary methods, and essential skills and knowledge necessary for developing effective security and emergency readiness programs.
The information presented in the S2 Critical Infrastructure Protection course reflects best practices in security management, anti-terrorism, physical security, and emergency preparation as may be applied to a wide range of critical infrastructure facilities. The measures presented in this course are based on the instructor’s decades of experience working as a security consultant for critical infrastructure organizations, critical evaluation of hundreds of terrorist attacks, and analysis of methods for protecting process facilities pioneered by organizations throughout the world.
Summary of topics include:
Adversaries and Threats to Critical Infrastructure • Risk Assessment Methodology • Process Analysis and Critical Asset Identification • Threat Assessment & Design Basis Threat Design • Risk Management Strategy & Critical Infrastructure • Operations Security & Protective Counterintelligence • Physical Security Design and Access Control Planning • Blast Mitigation and Process Facility Design • Protection Against Projected Charge Weapon and IEMI Threats • Emergency Response Planning & Infrastructure Design • Response to Armed Assaults • Bomb Threat Management • Suspect IED & VBIED Response • Post-Blast Response
- Recognizing risks associated with critical infrastructure including an in-depth understanding of contemporary terrorist modus operandi and methods of covert sabotage used by state-directed adversaries.
- Understanding technical characteristics of explosive events, IEMI threats, and ballistic weapons necessary for designing effective protective measures.
- Assessing facility risks and utilizing risk management principles in security planning, including:
- Understanding risk management principles and the function of risk assessment in security planning.
- Recognizing important characteristics of security related risk
- Conducting security assessments by utilizing qualitative risk assessment methodology.
- Designing prioritized security countermeasures strategies by utilizing cost-benefit analysis techniques.
- Implementing Operations Security (OPSEC) and protective counterintelligence principles to impair terrorists’ ability to gather target intelligence.
- Designing and specifying physical security measures for effective performance against terrorist armed attack and IED delivery scenarios.
- Developing effective entry control measures for validating, screening, and searching entrants at facility entry points.
- Identifying hazardous devices, possible device components, and risks associated with hazardous devices.
- Designing and specifying protective measures and facility improvements for mitigation of projected charge weapon, IED, and IEMI attacks.
- Recognizing indications of terrorist attack or impending sabotage events.
- Developing a facility-level Incident Command System and designing effective infrastructure to support emergency response operations.
- Developing safe and effective procedures for responding to a full spectrum of terrorist attack and sabotage scenarios.
DAY ONE
- Program Orientation and Training Objectives
- Adversaries and Threats to Critical Infrastructure
- Target Attractiveness and Critical Infrastructure
- Potential Adversaries
- Hostile Nations
- Terrorists / Non-State Actors
- Target Selection Criteria
- Non-Violent Activists
- Criminals
- Security Related Threat Scenarios
- Explosive Attack
- IED Attack Tactics and Threat MO
- Physical Sabotage
- Armed Assault
- Armed Occupation
- Civil Disturbance
- Arson
- Chemical/Biological/Radiological Contamination
- Cyber Attack
- DDoS
- Hacking / SCADA Vulnerability Exploitation
- Intentional Electromagnetic Interference (IEMI) Attack
- Theft
- Explosive Attack
- Natural Disaster
- Principles of Security Risk Management
- Fundamental Risk Management Concepts
- Risk Assessment Approaches
- Quantitative Risk Assessment
- Qualitative Risk Assessment
DAY TWO
- Risk Assessment Methodology for Critical Infrastructure
- Guidelines for Assessing Security Related Risk
- Asset Identification & Valuation
- Sources of Asset Information
- Identification of Undesirable Events
- Process Analysis and Critical Asset Identification
- Critical Asset Valuation
- Establishing Asset Valuation Criteria
- Threat Assessment
- Identifying Potential Adversaries
- Adversary Assessment
- Sources of Adversary Information
- Determination of INTENT and CAPABILITY
- Analysis of Critical Threat Modus Operandi
- Development of Design Basis Threats (DBTs)
- Development of Threat Rating Criteria
- Vulnerability Assessment
- Vulnerability Assessment Principles
- Vulnerability Assessment Approaches
- Vulnerability Rating Criteria
- Risk Evaluation
- Estimating Risk Probability
- Establishing Level of Risk and Risk Acceptability
- Risk Reduction Planning
- Integrated Countermeasures Theory
- Proactive Countermeasures
- Reactive/Mitigative Countermeasures
- Identifying Potential Countermeasures
- Countermeasures Cost-Benefit Analysis
- Integrated Countermeasures Theory
DAY THREE
- Operations Security (OPSEC) and Protective Counterintelligence
- Adversary Intelligence Requirements
- Adversary Intelligence Collection Methods
- Protective Counterintelligence/OPSEC
- Information Security Policies & Procedures
- Employee/Contractor Screening & Monitoring
- Background Warnings
- HUMINT Indicators
- TRAP-18 Assessment Protocol
- Surveillance Detection & Countersurveillance
- Surveillance Detection Guidelines
- Theft of ID Cards, Vehicle Stickers, etc.
- Suspicious Activity Reporting & Analysis
- Physical Security & Access Control Design
- Physical Protection System (PPS) Design Principles
- Physical Security System Functions
- Performance Definitions
- Common Design Flaws
- System Design Guidelines
- Physical Security Technology
- Intrusion Detection Systems
- System Design Considerations
- Intrusion Detection Technology
- Control Rooms & Monitoring Systems
- Area Surveillance
- CCTV
- Video Analytic Technology
- Stationary Security Posts
- Mobile Security Patrols
- IED Delivery indicators
- Security Lighting
- Principles of Security Illumination
- Illumination Design Considerations
- Lighting Systems
DAY FOUR
- Physical Security & Access Control (cont.)
- Anti-Personnel Barriers
- Anti-Personnel Barrier Options & Delay Time Performance
- AP Barrier System Design
- Ballistic Barriers
- Specification Standards & Construction Guidelines
- Vehicle Barriers
- Kinetic Energy Calculation
- AVB Barrier Specification Standards
- Passive Vehicle Barriers
- Vehicle Barrier System Design
- Pedestrian & Vehicle Entry Points
- Entry Point Design
- SPBIED Containment Portal Design
- Active AVB Barriers
- Entry Point Design
- Entry Control Measures
- Planning Considerations
- Entrant Identification & Verification Options
- Model Procedures for Critical Infrastructure Sites
- Weapon & Contraband Screening Technologies
- Vehicle Search Procedures for Entry Points
- Tactical Readiness and Facility Defense
- Physical Security Performance Analysis
- Estimate of Adversary Sequence Interruption (EASI) Model
- Adversary Sequence Diagrams
- EASI Exercises
- Anti-Personnel Barriers
- Blast & Weapon Effects Mitigation
- Blast Dynamics
- Blast Mitigation Principles
- Standoff Distance
- Environmental Influences
- Building & Equipment Construction
- Vulnerability of Process Equipment
- Protective Asset Positioning
- Blast Vulnerability Assessment Exercises
DAY FIVE
- Additional Mitigative Measures
- Projected Charge Attacks
- Defense Against Direct Fire Projected Charges
- Defense Against Indirect Fire Weapons
- Defense Against UAVBIEDs / Drone-Deployed Ordnance
- Protection Against IEMI Attacks
- Protection Against Injected Current Attacks
- RFW/Radiated IEMI Defense
- Projected Charge Attacks
- Emergency Response Planning
- Incident Response Scenarios
- Response Priorities
- Responsibilities & Incident Command Systems
- Communications Systems and Infrastructure Design
- Active Shooter/Terrorist Armed Attack Response Planning
- Bomb Threat Response Planning
- Search and Response Approaches & Procedures
- Response to Suspicious Objects
- Suspicious Vehicle Response
- Alert & Refuge Procedures
- TSWG Evacuation and Refuge Guidelines
- Post-Blast Response
- Localized Bombings
- Conventional Weapon of Mass Destruction Incidents
NOTE: The outline presented on this page describes the standard 5-day version of the S2 Institute Critical Infrastructure Protection Training Course. This program can be customized upon client request to encompass additional practical training activities including risk assessment classroom exercises, on-site group security inspections, and tabletop emergency management drills.
The S2 Critical Infrastructure Protection training course was originally developed in 2008 as a custom training program for the Organization for Security and Cooperation in Europe. The objective of the OSCE program was to improve the level of knowledge and skill of government security professionals assigned to critical infrastructure protection in the Caucuses region.
The Critical Infrastructure Protection course was adapted from the S2 Institute’s Anti-Terrorism Officer (ATO) program and specifically modified with focus on threats unique to critical infrastructure and the operational characteristics of critical process facilities (e.g., electrical power stations and ECCs, chemical plants, seaports, etc.).
Following are some highlights of the ATO program’s rich history since 2004.
Present

S2 ATO Course becomes the first advanced-level anti-terrorism training program in West Africa

S2 ATO Program becomes the basis for a new professional certification

European Commission adopts the S2 Anti-Terrorism Officer Program

The Government of the Netherlands officially endorses the S2 Anti-Terrorism Officer Program

S2 ATO Program adopted for training EEAS RSOs

S2 Institute develops a special version of the ATO Program for use by the Iraqi Ministry of Interior

S2 ATO Program is adopted by OSCE for training government security professionals in the Caucasus region
S2 ATO Program is adopted by US DoD for training Saudi and American base security personnel

S2 is contracted by US Army to train AT/FP personnel on CONUS military installations

S2 trains US Capital Police and PFPA personnel as ATO's at the US Senate

U.S. GAO inspectors endorse the S2 ATO program

S2 ATO Program is adopted for protecion of US critical infrastructure
S2 Anti-Terrorism Officer Program is created
Course Details
Instructor
Craig Gundry
Restriction Level
Level 2 – Verified Security Professionals & Law Enforcement Only
Presentation Time
40-Hrs/5-Days (8:30am to 4:30pm)
Audience
Security Professionals Responsible for Protecting Critical Infrastructure Facilities, Homeland Security Professionals
Student Testimonials

"In all of my travels and training, military and civilian, I rarely have the pleasure of encountering such professional instructors and presentations. The knowledge possessed and demonstrated by the instructor staff sets the bar for all civilian training agencies to follow…"
J. White
Advanced Training Section, U.S. SOCOM

“The instructor knew all the subjects like the back of his hand…A+++!"
SMSgt G. Enwright
Office of the Secretary of the Air Force, USAF

"The class met all of my expectations and even more."
M. Florescu
National Bank of Romania

"I have had a few terrorism / anti-terrorism classes, but none have come close to the intensity and historical background as the S2 course. Your course is what every law enforcement officer should be taking."
R. Bast
U.S. Department of Treasury

"Really excellent. A lot of practical advice that one can use in one's everyday work. Excellent."
J. Perois
Dolphin Energy

"I thought this course was very well done. The topics very relevant and up to date with what is currently going on. This is definitely a "must take" course for anyone dealing with physical security/anti-terrorism matters."
C. Vernieuw
U.S. Army Research Institute of Environmental Medicine

"Very interesting course! The in-depth instruction is very high and the knowledge of the instructor is amazing. I think this course is a must for even people already active in the spectrum."
M. Scharding
The Swatch Group

"This course triggered my deepest interests. Craig is a superb instructor due to his experience and appearance as an expert."
E. Posthumus
Government of the Netherlands

"Very relevant and a must for security professionals in the emerging dynamic services. The program is targeted to address all of the major contemporary security issues globally."
Dr. A. Acidah
Nigeria LNG Limited

“Great stuff! Presentation was of high standard…I personally give thanks to S2 for the opportunity. Thank You!”
F. Gaspar
U.S. Customs Anti-Narcotic Unit

“Outstanding course.”
J. Rector
Chief, USAF Security Forces Programs & Requirements Branch

“I think this course is really excellent. I have been involved in AT matters for a number of years, however, I found many new and valuable insights.”
J. Dos Santos
IBM Pacific Asia

“I am an intelligence and security professional with 40 years of experience in the field. I am currently the principal Analytical Risk Management instructor for the DoD Joint Counterintelligence Academy and taught the subject for CIA et al for some four years prior…I mention this to emphasize Mr. Gundry's evident expertise in the subject and the fact that old guys like me still have much to learn from others.”
A. Pattakos
US DoD | Beta Analytics International

“The course is given in a very professional manner. Will highly recommend this course!”
K. Bergwerff
Ministry of Justice, Netherlands

“The class is totally useful and helpful. The instructor is amazing...Perfect. One of the best courses I have ever taken in my professional career.”
Gen. M. Ebeid
American University in Cairo

“Excellent instruction. Very interesting course and professionally presented.”
C. Hodson
Walt Disney Corporation

"The instructor was very knowledgeable and experienced. The course was well prepared and presented.”
A. Logtenberg
European Commission

“This course takes anti-terrorism theory and puts it in a practical perspective. I would rate it very high against the other anti-terrorism training I have had.”
E. Vogt
U.S. DOJ, Federal Bureau of Prisons

“The best training I’ve ever had. Extraordinary trainer. Extremely important.”
M. Cerasoli
European Commission

“I wanted to congratulate and strongly encourage you to continue to raise the bar...my job responsibilities require continuous and active education and training and I must say that your ATO course is one, if not the best I have ever taken.”
A. Baez, M.D.
Mayo Clinic College of Medicine

“Mr. Gundry is an outstanding instructor who displays a deep understanding of his subject, who keeps the interest of the students and created a solid course”
N.W.
Central Intelligence Agency

"I thought that the course materials and additional handouts provided with the course were extremely well put together and will be useful long after completing the course. In addition, the instructor was very knowledgeable of AT/FP principles and presented the information in a clear and concise manner. This course was well worth the time and money invested.”
R. Russell
Booz Allen Hamilton

"..helpful for the project I participate in. The instructor was proficient and enthusiastic, with loads of practical experience. Very motivating!"
R. Stoel
Netherlands Forensic Institute

“Excellent, comprehensive course. Mr. Gundry is very knowledgeable and is an excellent instructor. I highly recommend this course to other security and AT professionals.”
J.W.
U.S. Coast Guard