Classes

Private Investigator Classes

Pre Employ Back/investigation II (protect facility, employees & guests) – Types of checks: character, academic, employment, & residence history, credit history, body language of applicants among other topics

Understanding Body Language - 93% of all communication is through body language. You will learn what a turn of the hand, facial grimace, crossing of the legs and arms, among many other physical changes that will tell you if a person is trying to deceive you or not!

National & International Espionage - Long gone are the pre world war II days of spies in trench coats living clandestine lives of stealing State secrets. This is how national & international secrets are bought and sold and/or spied on via the Internet.

Advanced Cyber Crime - How to find out if you’ve been hacked, how thieves stole more than $9million in less than 12 hours & how they got caught, Cyber Espionage, how to stop hacking of individuals and companies, cyber threats to US electric grid, water supplies, railroad transportation, bridges etc.

Advanced Pre-Employment Background Investigation - Fair credit reporting, using consumer credit reports, medical, criminal and driving records, bankruptcies, military service among other topics.

Investigating Workers' Compensation Fraud - Claimant fraud, health provider fraud, employer fraud, and unfair benefit fraud among other topics.

Fire Investigation - Duties at the fire scene, safety and equipment necessary, collection of fire evidence, fire ‘behavior’, fire ‘development’, special considerations of intentionally set fires.

Accident Investigation - Skid Marks - What use skid marks are, where they are found, investigative purposes of skid marks, ‘yaw’ marks, types of pavement and skid marks, after collision skid marks, rotating wheel vs. sliding tires, and collision scrubs.

Workplace Theft - Who steals at work and why, safety measures to put into place that prevent stealing, what electronic devices to install to prevent computer hacking and/or misuse, what electronic devices to install on entry/exit points, multiple camera positioning, safety in the hiring process and the liability in hiring due diligence and retention. How companies assure correcting handling of the accusing process.

Industrial Terrorism - Protecting personnel from hostage situations through proactive prevention techniques, protecting business facilities from bomb and hostage situations, hiring security persons, creating ongoing training programs, training everyone from the secretary to CEO in how to behave, what to do, where to go, etc. in the event of an emergency or other violent event.

Tactics for Counter Terrorism - Definition of biological, chemical and nuclear terrorism. A discussion of how vulnerable the U.S. is, what we can do to protect our borders and the internal communities of this country. Brief history of past terrorist groups.

Counter Terrorism II - Foreign and American terrorists, border and US port security issues, Cyber spies and protecting computers from cyber intruders, Cyber terrorists that involve espionage, fatal violence in public businesses and schools, why shooters have chosen violence that includes killing innocent people. Identifying ‘suspicious’ behavior.

NOTE:
PI’s and/or their employees are the eyes/ears on the street to assist law enforcement because public shootings occur everywhere and all the time in this country. We never encourage a PI and/or their employees to ever try to stop the violence, only to protect themselves at whatever cost, and simply remember person/vehicle descriptions of those involved, as well as direction of travel if appropriate, and report same to law enforcement.

Electronic Sweep - Definition of Electronic Sweep, and the equipment involved to secure businesses, homes, vehicles for listening devices that are installed to break the confidentiality and/or security of those locations.

Pre-employment Background Investigation - Negligent retention, at risk issues in hiring, poor hiring practices, long term ramifications of poor hiring practices, conducting background investigations to avoid hiring someone with a criminal background, how businesses can protect themselves, databases, past employments, credit reports, previous and current employments.

Skip Trace Vehicle - How to find legally procured vehicles that have disappeared without the owner completing payments. Investigations begin with owner, go to friends, coworkers, neighbors, business the owner frequents. Other tips about what can and cannot be done legally to reclaim the vehicles.

Skip Trace Persons - Internet and other resources to find person who have disappeared, violated bail/bond and/or techniques of bounty hunting.

Cyber Crime - A borderless, and endless territory of cyberspace is open to Internet predators or all kinds that include sexual or financial predators, thefts of identities, ‘Love Bug’. Who commits cyber crimes, Internet security holes, viruses, back doors, and Trojans. Worldwide hackers and their attack methods. Sexual offenses against children, and youngsters putting themselves at risk. Big business scams, enhanced criminal penalties, money scams among others.

Identity Theft - An overview of how identities are stolen and why. Students are also advised on how to monitor their own identities to make sure that they have not been stolen. Also, methods of solving identity theft are provided.

Financial Investigation - This course will address some of the ways monies are stolen through banking and business fraud. Shared personal information between banks, outside hacking into bank information, bank and trust services that include decedent’s trust, and Intervivos Trust. Duties of bank fraud investigators and security brokers. Organized security exchanges, security market, over the counter security transactions, ownership of securities. Fraud examiner duties.

Document Retrieval - Private Record Sources, depend on state and/or county rules and regulations, where Public Records are held, trademarks or trade names - A trademark, sales tax, tax liens, Universal Commercial Code, State v. Federal liens, real estate and tax assessor, bankruptcies, criminal records for an individual, litigation, and motor vehicle records, among others.

Insurance Fraud - An overview of different scams that have been used by persons to bring a fraudulent case against an insurance company. Students are then supplied scenarios from which they will explain what investigative techniques they will utilize to solve the case.

Family Violence - The life long trauma of the cycle of violence among family members, and how, if it is not stopped will continue onto following generations. What is considered family violence?

Arrest, Search and Seizure - The study of the 4th amendment of search and seizure. What constitutes a legal and reasonable search of private premises, and the legal seizure of contraband

Use of Force - What constitutes deadly force, and when it is and is not appropriate.

Child Abuse Prevention/Investigation - Identifying physical, emotional, psychological violence as well as neglect, failure to survive situations that can sometimes result in death of the child.

Crime Scene Search - Who, what, where, how, and why was crime committed. Legal considerations of crime scene - protecting crime scene and collecting evidence without contamination. Size and type of crime scene to be considered, number of persons needed to adequately search the area, basic steps to approach a crime scene, and search methods, strip, quadrant, or circular.

Complete Crime Scene Investigation - Text book, which is specific to different types of crime scene investigation such as murder by fire, knife, drowning, shooting, smothering, etc. is included for student’s convenience. Other investigation techniques of sexual assault offense, theft of property offense, and vehicle injury and death cases, among other will be discussed.

Report Writing - The tools to write an accurate and complete report are taught, then students are given specific scenarios from which they are to write good and thorough reports.

The Level II Training Course - Required for only commissioned and non-commissioned security officer applicants.

<< Back to the Top

Security Manager

Advanced Security Manager, Ethics, TX Rules & Regs - Global cyber attacks, crippling US cyber attacks for medical, educational,utility, bankingetc. resources, due diligence in hiring, on going training among other topics.

Leadership of Security Training
- Leadership of Security Training - Instructing managers how to train employees for an emergency event.

Leadership - Developing persons into leaders who solve problems to enhance the workings of an agency. Leadership as a learned behavior, the characteristics of a leader, and ethics.

Management - Leading managers how to establish basic goals for an organization.

Leadership II - How leaders motivate and maximize the effectiveness of a unit, and how this person is a visionary in creating and accomplishing tasks.

Management II - The definition of a security manager, their functions and duties. The difference between managers and leaders. How management determines risk management and risk assessment.

<< Back to the Top

Alarm Installer

Electronic Access Control Device II & Ethics - Flow of traffic to apartments, dorms, businesses, etc. Electromagnetic locks, gate/door installation, defeating an electromagnetic lock.

Alarm Installer II -
Analyzing the threat, signaling systems, signaling circuits, closed vs. open circuits, fire & smoke detectors, fire signaling device among other topics.

Alarm Installer III – Exterior intrusion, fence associated sensors & free standing sensors.

Alarm Systems of America - Former and current electronic security, today’s electronics, types of Alarm Systems. triangle of fire, fire systems, anti theft system, stolen vehicle retrieval among other topics

Covert Alarms – Covert, buried, pressure and seismic sensors.

Alarm Systems for Structures - Electronic security for today, new electronics, different alarm systems, management, security, and ethics, other topics.

Fire Alarms - Fire systems, noncoded master coded, selective coded, dual coded. Fire sensors, annunciator, control panel, related wiring, ethics among other topics.

Vehicle Alarms - Anti theft alarms, retrieving stolen vehicles, ethics, among other topics.

Electronic Access Control Device Installer & Ethics
- Alarm systems for apartments, gated communities etc, entry codes, full duplex, monitoring devices, gate arms that meet military requirements, automatic gate or door lock/unlock cycles, and if portal is open for inordinate period of time, alarms are activated.

<< Back to the Top

Locksmith Classes

Locksmith - Starting a locksmith business adherence to State requirements, what locksmiths can/cannot legal do, understand keys, key blanks, keyways, cylinder construction & operations, lock function & design, Installation, maintenance and repair of standard lock hardware. Lock types: Pin tumbler, disk tumbler, lever tumbler, wafer tumbler, and warded locks

Locksmith - Lock Design: Mortise, Key-in-knob, Rim, Tubular deadlock, Combination or keyed padlock, Non-key and keyed locks, deadbolt locks, high security locks, UL 437 security rating, Standard Medeco keying arrangement vs. Expanded biaxial cylinder and key design, key & lock choices

Electronic Access/Exit Design Control Systems - Electric door openers, electronic door knobs, electrically operated release latch strikes and locks and troubleshooting their issues, Intermittent and continuous duty locks, monitoring, transformers, wiring.

<< Back to the Top

Guard Dog Training (as required by TX DPS)

Guard Dog Training - Bomb threat response, patrol and drug dog, how to select a dog, search patterns and technical help for detector dog handler, DPS audit information among other topics.

<< Back to the Top
Website Builder