Maritime Security & Safety Management

Main Topics of Study

Commercial Seaports and Modes of Maritime

  • Transport
  • Commercial Seaports
  • Container Terminals
  • Bulk Cargo Terminals
  • Cruise Ship Terminals
  • Nontraditional Ports
  • Stakeholders
  • Terminal Owners
  • Terminal Operators
  • Stevedore Company
  • Longshoremen
  • Intermodalism
  • Modes of Maritime Transport
  • Tankers
  • LNG Tankers
  • Chemical Tankers
  • Container Ships
  • Freighters
  • Bulkers
  • Oceangoing Tugboats
  • Cruise and Passenger Ships

Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation

  • Purchase of Goods
  • Documents Used to Export and Import Cargo:
  • BilI of Lading
  • Shipper’s Export Declaration
  • Certificate of Origin
  • Commercial Invoice
  • Insurance Certificate
  • Export License
  • Consular Invoice
  • Inspection Certificate
  • Documents Specific to Import Cargo Only:
  • Arrival Notice
  • Pro forma Invoice
  • Customs Entries Forms
  • Freight Release
  • Delivery Order
  • Duty Drawback
  • Bank Draft
  • Letter of Credit
  • Business Entities in Commercial Maritime Transportation

International Maritime Security Regulation and Programmes

  • Objectives
  • Introduction
  • The ISPS Code
  • Amendments to SOLAS
  • WCO’s Framework of Standards to Secure and Facilitate Global Trade

Vulnerabilities in the Cargo Supply Chain

  • Vulnerabilities and Their Potential Impact
  • Recommended Security Practices at the Production/Loading Phase
  • Recommended Security Practices at the Export Phase
  • Carriers and Seaports
  • Recommended Security Practices at the Importation/Distribution Phase
  • Ports of Entry and Importers
  • Special Vulnerabilities in the Maritime Environment
  • Cargo Theft
  • Internal Conspiracies and Techniques Used to Circumvent Security
  • Container Seals
  • “Red Flags” of Possible Criminal/Terrorist Surveillance

Plagues of the Seas: Piracy and Stowaways

  • Definition and Historical Beginnings
  • Highlights of Recent Cases of Piracy
  • Trends in Piracy
  • The Linkage Between Piracy, Organized Crime, and Terrorism
  • Stowaways.
  • The Motivation of the Stowaway
  • Techniques and Tactics used by Stoways

Drug Smuggling via Maritime Cargo, Containers and Vessels

  • Illegal Drug Origins and Production
  • Maritime Smuggling Routes and Trends
  • Drug Smuggling Methods and Techniques

Terrorism and Commercial Maritime Transportation

  • Review of the History of Terrorism
  • Current Trends in Terrorism
  • Types of Weapons Utilized
  • Explosives
  • Small Arms and Infantry Weapons
  • Weapons of Mass Destruction (WMDs)
  • Terrorist Targeting of Ships and Ports
  • Use of Ships, Cargo, and Containers to Transport
  • Terrorists and Materials

Strategic Blueprint for World-Class Seaport

  • External Security Ring
  • Intelligence Operations
  • Government and Law Enforcement Liaison
  • Perimeter Security Ring
  • Inner Security Ring
  • Site and Asset-Specific Security Rings
  • Vessel Security Ring
  • Key Vessel Security Procedures
  • Pre departure Search for Contraband and Unauthorized Persons
  • Security Personnel Employment and Training
  • Pre-Employment Screening
  • Basic Security Training
  • Security Officer Equipment
  • Port Security Director
  • Port Facility Security Plan

Port Security Management

  • The Port Security Director
  • The Systems Approach, ISO Certifications, Strategic
  • Planning, and Metric Management
  • A Multi organisational Approach Toward Port Security
  • The Importance of Comprehensive Job Descriptions
  • Planning and Conducting Security-Related Training
  • Intelligence and its Role in Maritime Security
  • Risk Management and Port Security
  • Contingency Planning
  • The Incident Command System (ICS) and the National
  • Incidents Management System (NIMS)
  • Testing Training and Planning Through Exercises and Drills

Threat Mitigation Strategies

  • Mitigating Pirate Attacks
  • Hostage Survival and Rescue
  • Cargo Container Inspection Techniques
  • Security Equipment, systems, and Devices Used to Detect Contraband and Unauthorized Persons in a Container

Information Security and Assurance

  • History of Information Security
  • The Information Security Function in a Maritime Company
  • Key Concepts in the Field of Information Security
  • Essential Infosec Objectives
  • Levels of Computer Security
  • Common Vulnerabilities in the Electronic Commerce Environment
  • Human Threats to Information Security
  • Technical Risks