Vulnerability Assessments (1 Day)

The objective of the block of instruction is to give the students an understanding of how to build an assessment team, conduct a Vulnerability Assessment (VA) of a given building or installation and how to evaluate the assessment. The students will understand how the resulting assessment is used in the development of a Force Protection Plan. Students will learn to utilize Vulnerability Assessment (VA) formats as tools to help develop a solid all inclusive force protection plan that supports the unit’s mission. The instructors for this block of instruction have over twenty years of combined experience conducting real world small unit deployments and operations which required the development of Vulnerability Assessments for both offensive and defensive operations.

The Vulnerability Assessments Course is an 8-hour day with instructor lecture and exercises. At the end of this block of instruction, the student will have an expanded and detailed understanding of the vulnerability assessment to include:

  1. Focus of the Vulnerability Assessment
  2. Considerations
    1. Vulnerability
    2. Criticality
    3. Damage
    4. Recovery procedures
  3. Testing and evaluating assessment
    1. Multi-echelon war-gaming
    2. Test by friendly probing
    3. Train staff and QRF leadership
    4. Maintain and update assessment for validity
  4. Purposes of assessment
    1. Uncover and isolate weaknesses
    2. Lead to planning and training
  5. Initiate periodic reviews
    1. Effectiveness over compliance
  6. Assessment team composition
    1. Physical security
    2. Engineering
    3. Operations and training
    4. MI
    5. C2
    6. Law Enforcement / EOD
    7. Threat options
    8. OPSEC
    9. Medical
  7. Elements of the assessment
    1. Purpose
      1. Aid commander in identifying weaknesses
      2. Provide commander with tool to assess and address installation weaknesses
    2. Obstacles to the defense
    3. Anticipate and mitigate effects of terrorist attack
    4. Evaluation of friendly and enemy assets
    5. Installation protection considerations
      1. Installation location
      2. Study and evaluate current plan when taking over installation
      3. Principles of defense
      4. Potential un-friendlies inside perimeter
      5. METT-T

Who Should Attend: Security and law enforcement professionals, military personnel or any other professions who are responsible for establishing security requirements for antiterrorism and force protection, crime prevention, and/or designing facilities to protect personnel and assets from terrorist and other criminals.

Download the Vulnerability Assessments Student Registration Form

Contact GTI, by calling 803-259-1935 or emailing info@gtitraining.org, and we can provide written proposal to attend training. An option to assist with funding to attend this course is GTI's Asset Trading Program (ATP). Click the link in the menu above to find out more about this program.