Cjs 250 complete class week 1 9 includes all dqs, checkpoints, assignments, capstone and final

Page 6

CheckPoint: Law and Legal Issues Imagine you are responsible for training newly-hired security personnel. You must deliver a presentation to the new recruits on criminal procedure and legal issues as they pertain to security professionals. Resource: Ch. 11 in Identifying and Exploring Security Essentials Due Date: Day 5 [Individual forum] presentation on law and PowerPoint Create a 5- to 7-slide Microsoft legal issues as they apply specifically to private security professionals. Outline the basic organization of law (criminal, civil, and administrative). Explain basic crime classifications. Define the two types of Tort law, particularly as they impact security professionals. Provide detailed speaker’s notes. Post your presentation as a Microsoft® PowerPoint® attachment.

CJS 250 Week 9-Capstone Checkpoint Capstone CheckPoint Due Date: Day 4 [Individual forum] Post your response to the following: Every target environment will have its own unique security needs and demands, and offer security professionals distinct challenges and opportunities. In a 200- to 300-word response, answer the following questions: Why is it important for a security professional to know the particular target environment to which they are assigned extremely well? How can experienced security professionals prepare themselves for challenges and opportunities that they have never encountered before? Do you think it is possible that experience with one type of environment can actually be a drawback for security professionals approaching another type of environment for the first time? If so, how?

CJS 250 Week 9 Final Project - The Security Plan Final Project: The Security Plan Resource: Appendix A Due Date: Day 7 [Individual forum] Create a 1,400- to 1,750-word comprehensive security plan for the target environment you submitted in Week Five. In your plan, include the following items: o The floor plan of the target environment o A list of threats o A risk assessment for each threat o Current vulnerability gaps o Proposed countermeasures, which take into account each of the following components of the overall security objective:


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.