March 2005
Intermediate to advanced
256 pages
5h 28m
English
Security Standard 1 (Chapter 8): Identify Identities
| Exercise 1. | _____Identify “personal” identities |
| Exercise 2. | _____Organize “personal” identities and determine entry points |
| Exercise 3. | _____Identify “business” identities |
| Exercise 4. | _____Organize “business” identities and determine entry points |
Security Standard 2 (Chapter 8): Match Identities
| Exercise 1. | _____Determine “internal” job titles |
| Exercise 2. | _____Match “internal” job titles with “personal” and “business” identities |
| Exercise 3. | _____Determine “external” job titles |
| Exercise 4. | _____Match “external” job titles with “personal” and “business” identities |
Security Standard 3 (Chapter 9): The Security Job Analysis
| Exercise 1. | _____Identify job tasks |
| Exercise 2. | _____Create checklist of job tasks |
| Exercise 3. | _____Administer checklist to incumbent-experts |
| Exercise 4. | _____Score checklist |
| Exercise 5. | _____The security job description |
Security Standard 4 (Chapter 10): Recruitment for Security
| Exercise 1. | _____“Snowballing” |
| Exercise 2. | _____Involve current employees |
| Exercise 3. | _____Solicit new applicants |
| Exercise 4. | _____Use personnel agencies |
Security Standard 5 (Chapter 11): Personnel Selection for Security
| Exercise 1. | _____The Cognitive Ability Test: Option A |
| Exercise 2. | _____The Cognitive Ability Test: Option B |
Security Standard 6 (Chapter 12): Select for Motivation
| Exercise 1. | _____The Motivation Test: Option A |
| Exercise 2. | _____The Motivation Test: ... |
Read now
Unlock full access