TSO offers consulting and training services for homeland security of local, state and federal governments. Our site assessments for High Value Assets (HVAs) are well-regarded within the field, due to our tremendous attention to detail. We scrupulously examine each port or facility for all potential threats, studying the enemy’s resources and assessing the client’s vulnerabilities. We then suggest mitigation to limit these threats on your assets, ports and piers.
We offer training for the basic fundamentals to the advanced tactical skills of homeland security. Whether you need us to implement your current curriculum or develop a personalized training program and course, TSO, Inc. can quickly and efficiently meet your requirements.
Homeland Security Training Areas:
- Vulnerability Risk Assessment
- Self-Defense Skills
- Tactical Handgun (Basic, Intermediate, Advanced)
- Tactical Rifle (Basic, Intermediate, Advanced)
- Weapons Transition
- Use Of Deadly Force
- Defense-In-Depth Planning and execution
- Role Player Support Services
- Antiterrorism Tactics, Techniques, and Procedures (TTP)
Training for any kind of security position is usually an intensive process that requires concentration, determination, and fervent dedication. This is especially true for homeland security training, for which there are many different online courses and in-person courses as well.
At TSO Armor, we train officers in a number of different security tactics and techniques, including how to properly handle weapons, identify security threats, and respond effectively to various situations and problems. This versatility is key, as homeland security officers need to be able to deal with a myriad of security risks and situations. We are one of the most advanced when it comes to our training techniques.
School-Based Threat, Risk, and Vulnerability Assessment (SBTRVA)
This assessment technique is used to determine the safety standards and risk factors present in a school-based community such as a college campus. This involves evaluating the physical infrastructure, identifying key exits and entrances and their security measures, and weighing the available resources available for the premises. Another aspect examined by this sort of assessment is ascertaining what threats might be present in any school environment.
This type of risk assessment can be carried out by various security organizations, including private security forces, police, and firefighters. The information gained via these types of assessments can be used in emergency planning, bolstering security, and knowing the potential risks inherent on the campus.
Operations Based Threat, Risk, and Vulnerability Assessment Training (OpBTRVA)
Operations-based threat, risk and vulnerability assessment training aims to teach participants the process of identifying the vulnerabilities present in any community’s infrastructure. Those who’ve gone through this training should be able to investigate a community and identify key risk factors and map weaknesses. Participants in this training are also educated on how to identify potential threats to a community.
The Different Training Resources Offered By the Department of Homeland Security
The Department of Homeland Security offers a myriad of training resources designed to teach potential security agents and officers how to identify vulnerabilities of premises or communities, evaluate security risks, and spot potential threats. Our training programs also focus on weapon handling and self-defense techniques, as well as psychological training and mental strengthening.
Vulnerability Risk Assessment
A vulnerability risk assessment determines whether a facility or premises has any weaknesses that can be exploited by an aggressor or security threat. In other words, our security officers & agents will examine a building or campus’s exits, entrances, and existing infrastructure in an attempt to identify any potential weak points, which can appear in the form of physical weaknesses or lessened security resources in particular areas.
There are many types of self-defense skills that can be employed by a security officer or regular civilian. Self-defense skills can include hand-to-hand combat training, which enables participants to defend themselves from assailants using physical force, knife attacks, or other close-range attack methods, as well as self-defense from gun-wielding assailants.
Self-defense skills are available in many different forms, including martial arts techniques such as jiu-jitsu, karate, judo, and taekwondo. There are also a multitude of techniques that can be taught as basic countermeasures against any generic assailant. Common techniques involve attacking an assailant’s eyes and groin areas.
Tactical Handgun (Basic, Intermediate, Advanced) Training
Tactical handgun training aims to educate participants on how to use a handgun in a variety of different environments and situations.
- Basic Tactical Handgun Training – Focuses on aspects of handgun usage relevant to a beginner, which includes using a gun’s sights, the basics of aiming and gun handling, how to reload effectively, and dealing with a weapon malfunction.
- Intermediate Tactical Handgun Training – Intermediate handgun training focuses on training elements like drawing a weapon, increasing the speed of aiming and drawing weapons, and engaging moving targets.
- Advanced Tactical Handgun Training – With a focus on increasing versatility and adaptability of participants, advanced handgun users will be educated on engaging close-range targets in close-quarters environments such as buildings. Trainees will also learn how to engage multiple targets at once, isolate individual fights, and responding to threats coming from all angles.
Tactical Rifle (Basic, Intermediate, Advanced) Training
Tactical rifle training is similar to handgun training in the sense that it slowly ramps up the difficulty when it comes to target acquisition and engagement.
- Basic Tactical Rifle Training – Basic tactical rifle training focuses on educating trainees on the basics of handling a rifle, including instructions on how to shoot, clean, and handle a rifle. Basic target acquisition, usage of iron sights, and an understanding of the rifle’s capabilities are drilled.
- Intermediate Tactical Rifle Training – This type of training is presented to those with a handle on the basics of using a tactical rifle. Intermediate techniques focus on dealing with a rifle malfunction or equipment problems, engaging multiple or moving targets, and increasing the speed of the trainee when aiming, reloading, and incapacitating targets.
- Advanced Tactical Rifle Training – Advanced trainees will learn how to use different types of equipment in conjunction with a rifle, which can include different sights and rifle attachments. Trainees will also learn how to engage with targets in a number of different environments, including outdoor situations and close-quarter buildings.
Weapons Transition Training
Weapons transition training focuses on arming security officers with the technical know-how and physical ability to switch between weapons effectively and safely in a combat situation. Whether transitioning from a primary weapon to a sidearm or secondary weapon or holstering a pistol into using a long gun, transition training focuses on helping security officers that may need to use several weapons with the ability to efficiently and quickly transition between weapons.
Use Of Deadly Force Training
An essential part of training any security officer, this type of education focuses on identifying when deadly force is allowed or necessary. This includes threat assessment, which helps trainees identify whether an assailant is armed with a deadly weapon and/or in a position to pose a deadly threat. This type of training emphasizes the need for trainees to exhaust all available options before resorting to deadly force.
Defense-In-Depth Planning and Execution
Defense-in-depth planning refers to cybersecurity planning techniques that are used to identify key weaknesses in an IT infrastructure and plan out possible responses to any potential security threats. Since cybersecurity threats can pose incredible risks to physical security forces and their available resources in any potential emergency situation, knowing the weakness of any digital infrastructure is key to protecting security forces from cyber-attacks that may cripple the communication abilities or response times of a security force.
Role Player Support Services
Our role player support services help arm security forces with the necessary information and equipment utilized to respond to security threats. This can include the usage of an operations center and information facilities to arm security forces with documents and key intelligence in any case of a security threat.
Antiterrorism Tactics, Techniques, and Procedures (TTP)
There are a number of different antiterrorism tactics, techniques, and procedures that can be utilized in the midst of a security threat. These procedures mainly focus on identifying and preventing terrorist attacks before they occur, but there are a plethora of tactics and procedures utilized once a security threat has been identified and is underway.
One of the first things identified by security personnel is the scope and purpose of the attack: identifying what is being targeted, why it is being targeted, and how much area is under threat is key to responding to a terrorist attack. Security officers need to know how much space is under threat and how much ground has been compromised. Identifying the tactics being taken by terrorists is also key to responding effectively. Identifying whether assailants have taken hostages, planted explosive devices, or hijacked equipment or vehicles is key to knowing how to approach the situation.
There are a number of different procedures that can be utilized to respond to each one of these threats, but it all depends on the information that is being taken in by security forces and intelligence agencies, as without intel, security officers will be unable to respond effectively.