Apprenticeship training course
Professional security operative (level 2)
There are 2 training providers who offer this course. Check if a training provider can deliver this training in the apprentice's work location.
Information about Professional security operative (level 2)
To be an organisation’s first line of defence.
- Knowledge, skills and behaviours
-
View knowledge, skills and behaviours
Knowledge
- Relevant industry and operative specific regulations, legislation, guidance, and procedures (for example assignment instructions, SOPs, EOPs).
- The importance of following legislation, monitoring risk, compliance, control, and the completion of legal documentation.
- Impact of reputational damage for the individual, organisation, and security industry.
- The security systems, applications, technology, and equipment used, how to identify faults or errors and the remedial action to take.
- Organisational structure, vision, values, and business needs.
- Own role within the team, the team’s role within the organisation and how it contributes to achieving organisational objectives.
- Methods for identifying weapons (for examples explosive and incendiary items, firearms, bladed weapon) and other prohibited items that can cause security risks.
- Emergency procedures, incidents and disruptions that may occur in a security environment and the appropriate action or reporting process to take in the event of an incident.
- The movements and behaviours of people.
- Awareness of working environment and areas.
- Security industry regulators and associations and the role they play.
- The importance of communications and its impact on customer service, the organisation (including subversive activity) and its stakeholders.
- The principles, processes, and technology for controlling access into an area.
- Methods to identify the needs of others and communication strategies for different situations.
- How to use communication methods and technology systems to enable appropriate work and statutory information to be recorded or transmitted (for example, technology and methods for handover).
- Principles of equality, diversity, and inclusion and the impact on the organisation.
- The channels to communicate ideas for improvement.
- How to identify suspicious items and activities, and the principles of HOT and the 4C’s.
- Why items are prohibited and how to identify them.
- Check calls and welfare check procedures for lone workers.
- The importance of operating body worn cameras in the appropriate setting and according to organisational requirements.
- Prohibited articles relevant to assignment instructions and how to deal with them.
- Working securely online (including password management) and recognising suspicious communication such as email, websites, social media, pop-ups.
- Negative impact of allowing certain behaviours, items or objects into certain areas and the reputational damage they may cause.
- The unique threats and risks across a wide range of sites or locations.
- Dynamic Risk Assessments for visits to a site or location.
- Methods to mitigate gaps in physical security measures using monitoring equipment.
- Internal and external factors that can affect systems/equipment performance.
- The purpose and requirements of searching people, premises, vehicles or items for operational security.
- Importance of checking ID cards and access credentials for operational security.
- Different search methodologies, techniques, and patterns and why a search methodology may change for operational security.
- Different patrol patterns and fixed post position requirements and what to look for when deployed in those positions.
- Methods to find alternative routes of work areas using a site map.
- Methods for gathering and storing images (for example CCTV, mobile device recordings, drones) for evidential use in operational security.
- Relevant industry and operative specific regulations, legislation, guidance, and procedures (for example assignment instructions, SOPs, EOPs).
- The importance of following legislation, monitoring risk, compliance, control, and the completion of legal documentation.
- Impact of reputational damage for the individual, organisation, and security industry.
- The security systems, applications, technology, and equipment used, how to identify faults or errors and the remedial action to take.
- Organisational structure, vision, values, and business needs.
- Own role within the team, the team’s role within the organisation and how it contributes to achieving organisational objectives.
- Methods for identifying weapons (for examples explosive and incendiary items, firearms, bladed weapon) and other prohibited items that can cause security risks.
- Emergency procedures, incidents and disruptions that may occur in a security environment and the appropriate action or reporting process to take in the event of an incident.
- The movements and behaviours of people.
- Awareness of working environment and areas.
- Security industry regulators and associations and the role they play.
- The importance of communications and its impact on customer service, the organisation (including subversive activity) and its stakeholders.
- The principles, processes, and technology for controlling access into an area.
- Methods to identify the needs of others and communication strategies for different situations.
- How to use communication methods and technology systems to enable appropriate work and statutory information to be recorded or transmitted (for example, technology and methods for handover).
- Principles of equality, diversity, and inclusion and the impact on the organisation.
- The channels to communicate ideas for improvement.
- How to identify suspicious items and activities, and the principles of HOT and the 4C’s.
- Why items are prohibited and how to identify them.
- Check calls and welfare check procedures for lone workers.
- The importance of operating body worn cameras in the appropriate setting and according to organisational requirements.
- Prohibited articles relevant to assignment instructions and how to deal with them.
- Working securely online (including password management) and recognising suspicious communication such as email, websites, social media, pop-ups.
- Negative impact of allowing certain behaviours, items or objects into certain areas and the reputational damage they may cause.
- The unique threats and risks across a wide range of sites or locations.
- Dynamic Risk Assessments for visits to a site or location.
- Methods to mitigate gaps in physical security measures using monitoring equipment.
- Internal and external factors that can affect systems/equipment performance.
- Responsibility for reporting vehicle defects and understand their personal liability for CViT operatives.
- The process and procedures to take if involved in a road traffic accident in a CViT vehicle.
- Vehicle and bay loading insurance limits.
- Tracking systems and cameras in a CViT vehicle.
- CViT vehicle's maximum pay load weight.
- Legal parking and speed limit rules for specially-adapted CViT vehicles.
- Impact of reputational damage for the organisation and security industry caused by careless, unsympathetic, reckless, or unsafe driving techniques when operating a CViT vehicle.
- Methods to find alternative routes of work areas for CViT using road maps.
- Route planning around electric vehicle charging (EVC) points for CViT.
- Relevant industry and operative specific regulations, legislation, guidance, and procedures (for example assignment instructions, SOPs, EOPs).
- The importance of following legislation, monitoring risk, compliance, control, and the completion of legal documentation.
- Impact of reputational damage for the individual, organisation, and security industry.
- The security systems, applications, technology, and equipment used, how to identify faults or errors and the remedial action to take.
- Organisational structure, vision, values, and business needs.
- Own role within the team, the team’s role within the organisation and how it contributes to achieving organisational objectives.
- Methods for identifying weapons (for examples explosive and incendiary items, firearms, bladed weapon) and other prohibited items that can cause security risks.
- Emergency procedures, incidents and disruptions that may occur in a security environment and the appropriate action or reporting process to take in the event of an incident.
- The movements and behaviours of people.
- Awareness of working environment and areas.
- Security industry regulators and associations and the role they play.
- The importance of communications and its impact on customer service, the organisation (including subversive activity) and its stakeholders.
- The principles, processes, and technology for controlling access into an area.
- Methods to identify the needs of others and communication strategies for different situations.
- How to use communication methods and technology systems to enable appropriate work and statutory information to be recorded or transmitted (for example, technology and methods for handover).
- Principles of equality, diversity, and inclusion and the impact on the organisation.
- The channels to communicate ideas for improvement.
- How to identify suspicious items and activities, and the principles of HOT and the 4C’s.
- Why items are prohibited and how to identify them.
- Check calls and welfare check procedures for lone workers.
- The importance of operating body worn cameras in the appropriate setting and according to organisational requirements.
- Prohibited articles relevant to assignment instructions and how to deal with them.
- Working securely online (including password management) and recognising suspicious communication such as email, websites, social media, pop-ups.
- Negative impact of allowing certain behaviours, items or objects into certain areas and the reputational damage they may cause.
- The unique threats and risks across a wide range of sites or locations.
- Dynamic Risk Assessments for visits to a site or location.
- Methods to mitigate gaps in physical security measures using monitoring equipment.
- Internal and external factors that can affect systems/equipment performance.
- The purpose and requirements of searching people, premises, vehicles or items for mobile security.
- Different search methodologies, techniques, and patterns and why a search methodology may change for mobile security.
- Responsibility for reporting vehicle defects and understand their personal liability for mobile security.
- The process and procedures to take if involved in a road traffic accident in a mobile patrol vehicle.
- Tracking systems and cameras in a mobile patrol vehicle.
- Mobile patrol vehicle's maximum pay load weight.
- Legal parking and speed limit rules for specially adapted mobile patrol vehicles.
- Impact of reputational damage for the organisation and security industry caused by careless, unsympathetic, reckless, or unsafe driving techniques when operating a mobile patrol vehicle.
- Methods to find alternative routes of work areas for mobile security using road maps.
- Route planning around electric vehicle charging (EVC) points for mobile security.
- Relevant industry and operative specific regulations, legislation, guidance, and procedures (for example assignment instructions, SOPs, EOPs).
- The importance of following legislation, monitoring risk, compliance, control, and the completion of legal documentation.
- Impact of reputational damage for the individual, organisation, and security industry.
- The security systems, applications, technology, and equipment used, how to identify faults or errors and the remedial action to take.
- Organisational structure, vision, values, and business needs.
- Own role within the team, the team’s role within the organisation and how it contributes to achieving organisational objectives.
- Methods for identifying weapons (for examples explosive and incendiary items, firearms, bladed weapon) and other prohibited items that can cause security risks.
- Emergency procedures, incidents and disruptions that may occur in a security environment and the appropriate action or reporting process to take in the event of an incident.
- The movements and behaviours of people.
- Awareness of working environment and areas.
- Security industry regulators and associations and the role they play.
- The importance of communications and its impact on customer service, the organisation (including subversive activity) and its stakeholders.
- The principles, processes, and technology for controlling access into an area.
- Methods to identify the needs of others and communication strategies for different situations.
- How to use communication methods and technology systems to enable appropriate work and statutory information to be recorded or transmitted (for example, technology and methods for handover).
- Principles of equality, diversity, and inclusion and the impact on the organisation.
- The channels to communicate ideas for improvement.
- How to identify suspicious items and activities, and the principles of HOT and the 4C’s.
- Why items are prohibited and how to identify them.
- Check calls and welfare check procedures for lone workers.
- The importance of operating body worn cameras in the appropriate setting and according to organisational requirements.
- Prohibited articles relevant to assignment instructions and how to deal with them.
- Working securely online (including password management) and recognising suspicious communication such as email, websites, social media, pop-ups.
- Negative impact of allowing certain behaviours, items or objects into certain areas and the reputational damage they may cause.
- The unique threats and risks across a wide range of sites or locations.
- Dynamic Risk Assessments for visits to a site or location.
- Methods to mitigate gaps in physical security measures using monitoring equipment.
- Internal and external factors that can affect systems/equipment performance.
- Importance of checking ID cards and access credentials for control room operatives.
- Importance of calibrating control room equipment.
- Methods for gathering and storing images (for example CCTV, mobile device recordings, drones) for evidential use for control room operatives.
- The purpose and requirements of virtually searching premises for control room operatives.
- Different search methodologies, techniques, and patterns and why a search methodology may change for control room operatives.
Skills
- Follow assignment instructions relevant to operational duties.
- Carry out work in compliance with all regulations, guidance, legislation and organisational policies and procedures.
- Use security systems, applications and software, technology and equipment in line with organisational and operational requirements.
- Take action in the event of an incident, disruption, alarm activation or emergency, liaising with relevant people, escalating when necessary and recording actions and outcomes to meet guidance or organisational requirements.
- Complete and maintain accurate documentation or reports to meet current legislation, guidance, or organisational requirements.
- Challenge suspicious activities on or around the site and apply SCaN principles (see, check, and notify).
- Deliver customer service to all stakeholders, responding to the needs of individuals.
- Navigate a site plan or map of their working environment and areas.
- Carry out observation of designated areas, report and record any irregularities mitigating security and safety threats.
- Use digital communication applications and information management systems to communicate, learn, share, and record information.
- Use personal protection equipment (PPE) correctly.
- Use verbal and non-verbal communication skills (for example the 'Power of Hello’) when interacting with individuals.
- Use an appropriate tone of voice in all communications that reflect the organisations or client’s values.
- Contribute to review and improve the daily operating processes and procedures.
- Defuse potential conflict situations.
- Identify the component parts of explosive and incendiary items, firearms, and other prohibited items.
- Carry out dynamic risk assessments at sites or locations.
- Carry out various searches (for example, of areas, people, vehicles or items) in a operational security capacity.
- Apply operational security access control systems, procedures, and forms of authorisation in crowded space environments or publicly accessible locations.
- Identify, handle or potentially confiscate sensitive material, dangerous or prohibited items.
- Patrol assigned areas for operational security to control access, detect and respond to unwanted activities, communicate, and report findings.
- Deploy the correct type of barrier in an operational security context safely.
- Follow assignment instructions relevant to operational duties.
- Carry out work in compliance with all regulations, guidance, legislation and organisational policies and procedures.
- Use security systems, applications and software, technology and equipment in line with organisational and operational requirements.
- Take action in the event of an incident, disruption, alarm activation or emergency, liaising with relevant people, escalating when necessary and recording actions and outcomes to meet guidance or organisational requirements.
- Complete and maintain accurate documentation or reports to meet current legislation, guidance, or organisational requirements.
- Challenge suspicious activities on or around the site and apply SCaN principles (see, check, and notify).
- Deliver customer service to all stakeholders, responding to the needs of individuals.
- Navigate a site plan or map of their working environment and areas.
- Carry out observation of designated areas, report and record any irregularities mitigating security and safety threats.
- Use digital communication applications and information management systems to communicate, learn, share, and record information.
- Use personal protection equipment (PPE) correctly.
- Use verbal and non-verbal communication skills (for example the 'Power of Hello’) when interacting with individuals.
- Use an appropriate tone of voice in all communications that reflect the organisations or client’s values.
- Contribute to review and improve the daily operating processes and procedures.
- Defuse potential conflict situations.
- Identify the component parts of explosive and incendiary items, firearms, and other prohibited items.
- Carry out dynamic risk assessments at sites or locations.
- Carry out vehicle safety checks and basic maintenance on CViT vehicles.
- Operate specially adapted vehicles' security system including load and unload mode.
- Calculate the shortest and safest route between vehicle and collection point.
- Read maps to find locations for CViT and re-route in case of traffic or diversions (paper map and/or sat nav technology).
- Use communications and mapping equipment when operating a CViT vehicle.
- Follow assignment instructions relevant to operational duties.
- Carry out work in compliance with all regulations, guidance, legislation and organisational policies and procedures.
- Use security systems, applications and software, technology and equipment in line with organisational and operational requirements.
- Take action in the event of an incident, disruption, alarm activation or emergency, liaising with relevant people, escalating when necessary and recording actions and outcomes to meet guidance or organisational requirements.
- Complete and maintain accurate documentation or reports to meet current legislation, guidance, or organisational requirements.
- Challenge suspicious activities on or around the site and apply SCaN principles (see, check, and notify).
- Deliver customer service to all stakeholders, responding to the needs of individuals.
- Navigate a site plan or map of their working environment and areas.
- Carry out observation of designated areas, report and record any irregularities mitigating security and safety threats.
- Use digital communication applications and information management systems to communicate, learn, share, and record information.
- Use personal protection equipment (PPE) correctly.
- Use verbal and non-verbal communication skills (for example the 'Power of Hello’) when interacting with individuals.
- Use an appropriate tone of voice in all communications that reflect the organisations or client’s values.
- Contribute to review and improve the daily operating processes and procedures.
- Defuse potential conflict situations.
- Identify the component parts of explosive and incendiary items, firearms, and other prohibited items.
- Carry out dynamic risk assessments at sites or locations.
- Carry out various searches (for example, of areas, people, vehicles or items) in a mobile security capacity.
- Patrol assigned areas for mobile security to control access, detect and respond to unwanted activities, communicate, and report findings.
- Deploy correct type of barrier in a mobile security context safely.
- Carry out vehicle safety checks and basic maintenance on mobile security vehicles.
- Read maps to find locations for mobile security response and re-route in case of traffic or diversions (paper map and/or sat nav technology).
- Use communications and mapping equipment when operating a mobile security vehicle.
- Follow assignment instructions relevant to operational duties.
- Carry out work in compliance with all regulations, guidance, legislation and organisational policies and procedures.
- Use security systems, applications and software, technology and equipment in line with organisational and operational requirements.
- Take action in the event of an incident, disruption, alarm activation or emergency, liaising with relevant people, escalating when necessary and recording actions and outcomes to meet guidance or organisational requirements.
- Complete and maintain accurate documentation or reports to meet current legislation, guidance, or organisational requirements.
- Challenge suspicious activities on or around the site and apply SCaN principles (see, check, and notify).
- Deliver customer service to all stakeholders, responding to the needs of individuals.
- Navigate a site plan or map of their working environment and areas.
- Carry out observation of designated areas, report and record any irregularities mitigating security and safety threats.
- Use digital communication applications and information management systems to communicate, learn, share, and record information.
- Use personal protection equipment (PPE) correctly.
- Use verbal and non-verbal communication skills (for example the 'Power of Hello’) when interacting with individuals.
- Use an appropriate tone of voice in all communications that reflect the organisations or client’s values.
- Contribute to review and improve the daily operating processes and procedures.
- Defuse potential conflict situations.
- Identify the component parts of explosive and incendiary items, firearms, and other prohibited items.
- Carry out dynamic risk assessments at sites or locations.
- Carry out various searches (for example, of areas, vehicles, or items) from the control room.
- Apply control room access control systems, procedures, and forms of authorisation in crowded space environments or publicly accessible locations.
- Scan and track assigned areas for control room to control access, detect and respond to unwanted activities, communicate, and report findings.
- Deploy correct type of barrier in a control room context safely.
- Identify and use components of a control room system.
- Gather and store CCTV footage for evidential use.
Behaviours
- Be vigilant, always paying close attention to detail.
- Be professional, calm and positive role model to others in attitude to work.
- Solution-focused displaying problem solving attributes.
- Respectful to colleagues and stakeholders always.
- Act reliably and responsibly.
- Committed to continued professional development (CPD) to maintain and enhance competence and share learning with others.
- Follow employer’s or client’s code of conduct relating to behaviour, appearance and conduct.
- Build appropriate working relationships and respect boundaries. Be co-operative and flexible.
- Act honestly and with integrity.
- Be vigilant, always paying close attention to detail.
- Be professional, calm and positive role model to others in attitude to work.
- Solution-focused displaying problem solving attributes.
- Respectful to colleagues and stakeholders always.
- Act reliably and responsibly.
- Committed to continued professional development (CPD) to maintain and enhance competence and share learning with others.
- Follow employer’s or client’s code of conduct relating to behaviour, appearance and conduct.
- Build appropriate working relationships and respect boundaries. Be co-operative and flexible.
- Act honestly and with integrity.
- Be vigilant, always paying close attention to detail.
- Be professional, calm and positive role model to others in attitude to work.
- Solution-focused displaying problem solving attributes.
- Respectful to colleagues and stakeholders always.
- Act reliably and responsibly.
- Committed to continued professional development (CPD) to maintain and enhance competence and share learning with others.
- Follow employer’s or client’s code of conduct relating to behaviour, appearance and conduct.
- Build appropriate working relationships and respect boundaries. Be co-operative and flexible.
- Act honestly and with integrity.
- Be vigilant, always paying close attention to detail.
- Be professional, calm and positive role model to others in attitude to work.
- Solution-focused displaying problem solving attributes.
- Respectful to colleagues and stakeholders always.
- Act reliably and responsibly.
- Committed to continued professional development (CPD) to maintain and enhance competence and share learning with others.
- Follow employer’s or client’s code of conduct relating to behaviour, appearance and conduct.
- Build appropriate working relationships and respect boundaries. Be co-operative and flexible.
- Act honestly and with integrity.
- Apprenticeship category (sector)
- Protective services
- Qualification level
-
2
Equal to GCSE - Course duration
- 12 months
- Maximum funding
-
£6,000
Maximum government funding for
apprenticeship training and assessment costs. - Job titles include
-
- Alarm receiving centre operator
- Alarm response officer
- Cash carrying crew
- Cash driver
- Cctv officer
- Cctv operator
- Cit driver
- Control centre operator
- Control room operative
- Cvit driver
- Cvit operative
- Door supervisor
- Driver guard
- Event security officer
- First line of defence officer
- Loss prevention officer
- Mobile officer
- Mobile response officer
- Mobile security patrol operative
- Multi-drop delivery driver
- Relief officer
- Secure driver
- Security control room operative
- Security guard
- Security officer
- Security operative
- Security receptionist
View more information about Professional security operative (level 2) from the Institute for Apprenticeships and Technical Education.