Security Guard Crowd Control Duties and Techniques Explained

Basic Security Guard Training – Unit 5, Lesson D


Crowd Control for Security Guards

A crowd is a group of people gathered in one place with a common focus or purpose. Such gatherings may require preventive actions by security personnel to ensure public safety and maintain law and order. Situations like demonstrations, disasters, riots, or sporting events are common examples that demand effective crowd control and basic security guard procedures.

Types of Crowds

Understanding the different types of crowds is essential for performing crowd control security duties. Each type behaves differently, and knowing how to manage them can reduce risks.

1. Acquisitive Crowd

These individuals are motivated by the desire to obtain something—such as during sales, auctions, or when supplies are limited. They usually act independently and have no leader.

2. Expressive Crowd

This group gathers to express emotions or protest, such as in political rallies, peace marches, or conventions. They can become agitated if not properly managed.

3. Spectator Crowd

They gather out of curiosity, entertainment, or instruction—such as during parades, sporting events, or performances. Though initially calm, the mood may change quickly based on external factors.

4. Sightseer Crowd

These people come to witness an event like a fire, accident, or disaster. While some may offer help, others may simply stand and watch, creating obstructions.

5. Hostile Crowd

A dangerous crowd with aggressive intentions—such as during strikes, violent protests, or mob situations. These are the most challenging for security guard crowd control efforts and often require police intervention.

Crowd Control – What It Means

Crowd control security is the organized method of managing large groups to prevent disorder and ensure safety. Crowds behave differently than individuals; they are unpredictable and often harder to manage. If not controlled, they may force their way out, causing damage or injury.

Key Crowd Control Security Duties

As part of your crowd control security duties, a security guard must:

  • Remain calm and alert at all times
  • Be friendly but firm
  • Never attempt to control a large crowd alone
  • Request assistance when the situation escalates
  • Maintain safe distances and monitor crowd behavior constantly

Essential Crowd Control Equipment

To carry out security guard crowd control, the following tools can be used:

  • Barriers and barricades
  • Ropes or tapes
  • Loudspeakers or megaphones to give instructions

How to Control a Crowd as a Security Guard

Learning how to control a crowd as a security guard requires practice, planning, and situational awareness. Follow these general guidelines:

  • Approach the crowd with a calm and confident attitude
  • Use loudspeakers to give clear instructions
  • Isolate aggressive or disruptive individuals
  • Divide the crowd into smaller, manageable groups
  • Use rational crowd members to calm others
  • Ensure exit paths are clear to avoid panic
  • Provide first-aid support to children, the elderly, and injured persons
  • Avoid reacting to verbal abuse—only act if there’s a physical threat
  • Inform the police if the crowd shows signs of aggression

Security Guard Crowd Control in Hostile Situations

Hostile crowds are dangerous. If you believe the situation is getting out of control:

  • Do not engage alone
  • Call for immediate security backup
  • Notify the local police
  • Observe the crowd from a safe distance

In extreme cases, proper crowd control security depends on the quick response of trained personnel and cooperation with law enforcement.

Conclusion

Every security guard should be well-versed in crowd control and basic security guard strategies to handle unpredictable situations confidently. Whether dealing with peaceful gatherings or aggressive protests, your crowd control security duties are vital in preventing chaos, protecting lives, and maintaining order.

Full security guard course.

Role of Security Guard in Case of Emergency: Duties, Reactions & Procedures

Basic Security Guard Training Unit 5 Lesson (C)


What is an emergency in security?

An emergency in security refers to any unexpected and serious situation that requires immediate action to protect life, property, and health.

These emergencies can occur without warning and demand a quick and organized response. Common emergencies at a worksite may include fire outbreaks, bomb threats, medical emergencies, equipment failure (such as lift malfunctions), floods, earthquakes, or disease outbreaks.

Types of Emergency Situations:

  1. Man-made Emergencies:
  • Accidents
  • Major crimes
  • Equipment failure (e.g., escalator/lift issues)
  1. Natural Emergencies:
  • Floods
  • Earthquakes
  • Public health emergencies (e.g., disease outbreaks like a plague)

Impact of Emergencies:

  • Danger to life (e.g., heart attack, stroke)
  • Danger to health
  • Damage to property

Role of Security Guard in Case of Emergency

The role of a security guard in case of emergency is crucial from the moment an incident begins until it is resolved. Security guards must respond immediately and effectively to reduce harm to people and minimize property damage. You should:

  • Remain calm and focused during emergencies. Panic spreads quickly, so staying composed reassures others.
  • Ask for help by contacting the supervisor, control room, emergency services, or police.
  • Use all available resources, such as guiding people to shelter areas or assembly points.
  • Follow emergency plans specific to the site and lead others accordingly.
  • Know the evacuation routes, safe exits, and procedures.

Security Guard Emergency Response Procedures

Effective security guard emergency response procedures include:

  1. Prepare in Advance:
    Be familiar with the site’s emergency plan. Practice evacuation procedures regularly and ensure everyone on site knows what to do.
  2. Know Your Role:
    Understand your specific responsibilities during emergencies. Set up the assembly area and lead people to safety.
  3. Know How to Respond:
    You may need prior training and emergency drills to know how to handle different scenarios effectively.
  4. Know What Happens:
    After evacuation, conduct a headcount to ensure everyone is safe.
  5. Expect the Unexpected:
    Have backup plans in place in case usual exits or routes are blocked. Always keep fire doors unlocked and emergency exits clear.
  6. Regular Duties That Support Emergency Preparedness:
  7. Check that fire doors are always unlocked
  • Test emergency lighting and alarms regularly
  • Ensure emergency equipment is in working condition
  • Keep contact lists up to date
  • Know where first aid kits and fire extinguishers are located
  • Assist disabled, elderly, or young individuals during evacuation

Assembly Area

An assembly area is a pre-determined safe location where everyone gathers after evacuation. It is crucial for headcounts and receiving further instructions.

Important Notes on Emergency Situations:

  • Search and rescue operations should only be performed by trained professionals.
  • Never re-enter a damaged or evacuated building unless authorized by emergency officials.

In Summary

  • What is an emergency in security? It is a serious, unexpected situation needing immediate action to protect life, health, and property.
  • Emergency types include both natural and man-made incidents.
  • People react differently in emergencies—shock, disbelief, panic. A calm and prepared security guard can save lives.
  • The role of a security guard in case of emergency includes keeping calm, helping people, using site resources, and following proper procedures.
  • The most effective security guard emergency response procedures involve planning, preparation, clear communication, and leadership.

By following these guidelines, a security guard can play a vital role in ensuring safety during any emergency.

Full course click here

Top IT company dubai, United Arab Emirates

Dubai is one of the world’s fast-growing city. It has changed from desert to ultra-high town and has been growing continuously in the last 20years. Together with its development, there is a technology boom in many sectors, the result for that, thousands of It company in Dubai have arisen.

Information technology is one of the most demanded job areas in Dubai as well as all over the United Arab Emirates. Since the thriving of the IT company in Dubai, the demand for the IT professional remained high at all times.

In this post, I give you a list of the top information technology company in Dubai and you can look for the available position on their official website.

The IT professionals are including;

  1. computer & information and research scientists,
  2. systems managers,
  3. hardware and software engineers,
  4. programmers,
  5. database administrators,
  6. network systems and data communications analysts,
  7. systems analysts,
  8. network and computer systems administrators,
  9. and computer support specialists.

Numerous organizations that specialize in IT in Dubai are located in Dubai Internet City. You can use this link to reach the names of an IT company or all the IT companies in Dubai http://www.dic.ae/business-partners/. 

Although finding a job in Top IT company in Dubai is a tough task, some great ways can help you to find a job with a good company those are as follows;

  • Search for a job on the official websites
  • working with recruitment agencies
  • Visit our job portal 

Why are many IT companies thriving in Dubai?

In the first place, the Dubai government created an information technology park is called DIC (Dubai Internet City) and the second place allows the company 100% foreign ownership until 50yrs.

Because of the taxation and customs related benefit, most of the top international companies moved their regional headquarters to Dubai.

The topmost high-tech companies such as Facebook, LinkedIn, Google, Dell, Intel, Huawei, Samsung, SAP, Microsoft, IBM, Oracle Corporation, Tata Consultancy, 3M, Sun Microsystems, Cisco, HP, Nokia, Cognizant and Accenture have a regional headquarters in Dubai.

The to Information technology companies in Dubai;

SNCompanySNCompany
1Accel Frontline JLT53ISYX Technologies
2Advanced Global Technologies (AGT Infotech)54Javelin Communications FZ LLC
3Alan Technology LLC55Kobonaty
4AL Kendi Computer Systems56Liveware Technology Services
5Alpha Byte Computers LLC57Loditech Technologies LLC
6Alpha Data Processing Services LLC58Mass Technologies
7Andryan IT Solutions59Multimission Software LLC
8Annet Technologies ME FZE60NIBZ Infosol Pvt Ltd
9Aphidas61NEOSYS
10AppsTec Consulting62NET Desire Technologies
11Arab Canadian Computer Co. LLC63Next Links
12Atom Options Computers LLC64Nexus Computer Systems
13Awok.com65Olive Technologies
14Bitech International66Omnix International LLC
15BBI-Consultancy67Optimus Technology and Telecom
16Blue DOT Information Technology68Orbit Shield Global Fzc
17Brandevous Solutions69Pacific Controls
18Burhani Computers Trading LLC70Pancyber
19CAD Gulf LLC71Perfect Computers
20Cantaloupe Consulting72Pixel Digitel System LLC
21Certios IT73QuickData Network Installation & Maintenance LLC
22Cognizant Technology Solutions74Raqmiyat
23CominTouch Technology LLC75Redington Middle East
24CompuBase76Resemble Systems
25
Computron
77
Saitech International
26CSC78Samsotech LLC
27Cubicflux79Sarvah Technology Solutions
28Cubic Information Systems80Security Infrastructure Solutions
29Digital Factors Fzco81Smart World
30ECS ME LLC82Software Solutions LLC
31Edgematics Technologies83Soltius Middle East FZ LLC
32eSpire Infotech84Spice Technologies
33EZE Dubai85Spire Solutions
34Fluid Codes86Techlink Systems LLC
35Frontline Information Technology87Telelogix IT Services
36FVC88UK Infotech International LLC
37Global Technology Services LLC89Unicorp
38Glorious Technologies LLC90Unity Infotech Solutions LLC
39Gulf Business Machines91Wavepac Infosystems LLC
40Gulf Computers92Websight Computer Systems
41Gulf IT Network Distribution Fz LLC93Wipaq Technology LLC
42Hadiya Shop94Wisoft Solutions
43I4research95Xerox Emirates
44IBM Corporation Middle East96Xlsys Technologies
45Industrial Application Software (IAS) Middle East97Xlerate Technologies NZ Ltd
46Infotouch FZ LLC98Emitac Mobile Solutions LLC
47Innokat LLC99Oasis Distribution
48Integra Technologies FZE100Dicetek LLC
49Integrated Communication Network (ICN)101GapBridge Software Services
50Intertec Systems LLC102Halian
51Intertek Moody103emaratech
52Intex UAE104Cyret Technologies
105VISA Card106Mastercard

 

Scope and the payment; 

There are not less than 5000 IT companies in UAE and not less than thousands of companies are located in DIC (Dubai Internet City). We have chosen only hundreds of companies out of thousands for our listing because these companies are well known in UAE and have a good reputation among the public.

The salary variation has existed among the companies even though a similar nature of business. Companies from western countries willing to pay higher than local companies. On the other hand, companies of Asian national remain less payer.

Remember that salary depends on your negotiation skills in the interview because the UAE has not minimum wage policy.

When you talk about the scope of this occupation still remained strong and have lots of change to the expats. The UAE nationals are not sufficient to fill the vacuum of the demand in the IT sector.

Literally, government or non-government organizations love to hire the westerner first, and Asians come to second for employing the IT company in Dubai.

To get a job in the information technology sector in Dubai, Either you should apply online or drop your CV to the company office. Other vital players in the UAE job market are recruitment agencies here is the full list of the top recruitment agencies in the UAE visit now

Conclusion: Dubai is the regional hub of the IT companies and there are a lot of chances for the IT professional to be employed. Nowadays Dubai has become the number one to attract IT professionals around the world. If you want to work with top It companies in Dubai always visit their website for getting the information about available vacancies.

You may interested?

Top travel agency in UAE that provides you a visa.

Top 10 recruitment agencies in Dubai and UAE

How to Deal with Bomb Threats in the Workplace?

Basic security guard training Unit 5 Lesson (B)


Bomb threats may be rare, but they are hazardous situations that must be handled with care and professionalism.

Even if the majority of threats turn out to be hoaxes or pranks, any explosive device has the potential to cause death, injury, and significant damage. Therefore, every security guard must be trained in how to deal with a bomb threat in the workplace.

Who Makes Bomb Threats and Why?

Understanding the potential source of a bomb threat can help prevent and respond. Bomb threats may come from:

  • Disgruntled co-workers or family members – Those who wish to cause harm to someone they blame for personal issues.
  • Unhappy customers – People dissatisfied with products or services who feel ignored or mistreated.
  • Angry employees – Especially those recently terminated or mistreated by management.
  • Protestors – Individuals with political, social, or religious motivations.
  • Pranksters – People who enjoy causing panic without any real intention of harm.

Where Can a Bomb Threat Occur?

A bomb threat can be made in or against any location where public fear can be triggered. Common targets include:

  • Offices
  • Schools
  • Government buildings
  • Malls and markets
  • Events and gatherings
  • Vehicles and parking areas

Common Methods of Making Bomb Threats

Threats may be received through:

  • In person
  • Telephone calls
  • Emails
  • Letters or suspicious packages

How to Deal with a Bomb Threat in the Workplace

1. If You Receive a Threat In Person:

  • Remain calm and composed to prevent panic.
  • Try to keep the reporting person nearby if safe to do so.
  • Gather full details about what was seen or heard.
  • Note their physical appearance, behavior, and timing.
  • Write a detailed report of the incident immediately.

2. If You Receive a Threat Over the Telephone:

Use a bomb threat checklist to ask the caller important questions:

Bomb Threat Telephone Checklist:

  • When is the bomb going to explode?
  • Where is the bomb right now?
  • What does it look like?
  • What type of bomb is it?
  • What will trigger it to explode?
  • Did you place the bomb? Why?
  • What is your name?
  • What is your location?
  • Are there others involved?

While on the call:

  • Signal someone discreetly to listen from another line.
  • Stay calm and focus on collecting information.
  • Listen for background noise (sirens, machines, voices).
  • Try to identify the caller’s accent, tone, or emotional state.
  • Notify the emergency contact and follow site procedures immediately.

3. If You Receive a Threat by Letter or Package:

Check for the following signs:

  • Feel: Is it lumpy, stiff, or unusually heavy?
  • Appearance: Poorly written or typed, unfamiliar sender, vague recipient like “Manager” or “Director.”
  • Smell: Explosives may smell like almonds or fuel.
  • Packaging: Reused or unprofessional-looking, with excessive tape or stamps.
  • Sound: Listen for ticking, sloshing, or mechanical noises.

Do not open or handle the package. Report it to your supervisor and evacuate the area if needed.

Bomb Threat Security Response: Five Key Principles

  1. Have a Prepared Plan – Follow the emergency plan provided for your site.
  2. Evacuation Priorities – Assist elderly people, children, women, and those with special needs first.
  3. Emergency Response Coordination – Alert your emergency response team and external agencies.
  4. Consult Building Experts – They understand exit routes, structure, and hidden areas.
  5. Search Procedures – Follow systematic bomb search methods.

Three Common Bomb Search Methods

  • Grid Method – Divide the area into squares and search each systematically.
  • Concentric Circle Method – Start at the center and move outward in circles.
  • Bottom-to-Top Method – Begin from the lowest floor and move upward.

How to Identify Suspicious Items

Bombs are often hidden in everyday objects and may not resemble traditional bombs. Be alert for:

  • Unattended bags (briefcases, sports bags)
  • Items placed in garbage bins or machinery
  • Vehicles parked in odd locations
  • Items that seem out of place or unfamiliar

Use CCTV cameras to review recent activity and detect suspicious behavior around the item.

Steps to Take if You Discover a Suspicious Device

  • Do not touch or move the item.
  • Clear the area to a radius of at least 100 meters.
  • Do not use mobile phones or radios near the device (could trigger detonation).
  • Call your planned emergency contact or police via landline.
  • Secure the area and prevent unauthorized access.
  • Keep people away from the device rather than attempting to move it.
  • Do not disturb the environment around the device.
  • Maintain calm and assist emergency services upon arrival.

Post-Evacuation Procedures

  • Conduct a headcount or roll call if possible.
  • Do not allow anyone to re-enter the building until cleared by the police or bomb squad.
  • Stay available to brief emergency responders with the information you collected.
  • Prepare and submit a full incident report.

Handling False Alarms and Hoaxes

  • Treat every threat as real until confirmed otherwise.
  • Avoid blaming the reporting person unless there’s clear malicious intent.
  • All false alarms must still be documented and analyzed for learning.

Training and Drills

To improve bomb threat security, your site should:

  • Conduct regular drills on evacuation and threat handling.
  • Train guards to identify suspicious packages.
  • Review and update the site-specific response plan.
  • Ensure every staff member knows emergency contact numbers.

Coordination with Emergency Services

  • Immediately notify the police, fire department, and bomb disposal team.
  • Cooperate fully and provide them with:
    • Description of the threat or package
    • Site maps and access routes
    • Information about evacuation status
  • Do not interfere with their investigation.

Summary: How to Deal with Bomb Threats Effectively

  • Always take bomb threats seriously.
  • Stay calm and follow procedures.
  • Use a checklist when receiving phone threats.
  • Know and follow your site’s emergency response plan.
  • Use approved search methods for suspicious items.
  • Do not touch or approach any suspected device.
  • Evacuate 100 meters away and inform the authorities.
  • Assist emergency teams and keep detailed notes.
  • Perform regular training and maintain full awareness at all times.

THE COMPLETE COURSE

CCTV System: Complete Security Guard CCTV Training Guide

Basic security guard training Unit 4 Lesson (E)


Introduction to CCTV System

A CCTV system (Closed-Circuit Television) is one of the most essential tools in modern security. It involves using video cameras to transmit footage to a limited set of monitors. These systems monitor and secure sensitive locations such as banks, stores, offices, warehouses, and industrial zones.

For every CCTV security guard, having solid knowledge and proper security guard CCTV training is essential to operating and managing the surveillance system effectively.

Why CCTV Is Important in Security

A properly installed CCTV system helps security guards:

  • Monitor large or sensitive areas.
  • Detect and prevent criminal activity.
  • Record footage that can be used as legal evidence.
  • Ensure the safety of employees and customers.
  • Monitor high-risk or remote zones.

With effective security guard CCTV training, guards become skilled in surveillance operations and proactive response to incidents.

Where CCTV Is Commonly Used

  • Retail stores to reduce theft and shoplifting.
  • Banks and ATMs for 24/7 monitoring.
  • Parking areas to track vehicle movement.
  • Industrial plants to observe hazardous processes.
  • Offices to ensure employee safety and productivity.
  • Public events for crowd monitoring and incident control.

Types of CCTV Cameras and Equipment

A trained CCTV security guard must be familiar with the types of equipment:

  • Stationary Camera – Mounted in one direction permanently.
  • PTZ Camera – Pan, tilt, and zoom control for better tracking.
  • Dome Camera – Used indoors; discreet and tamper-proof.
  • Bullet Camera – Long-range outdoor surveillance.
  • Monitor – Displays real-time or recorded video.
  • Joystick – Used to control PTZ cameras.
  • DVR (Digital Video Recorder) – Records, stores, and manages footage.
  1. Core Components of a CCTV System

    1. Security camera

camera

 

 

 

Cameras are the eyes of the CCTV system. Common types include dome, bullet, PTZ, and covert cameras. They transmit footage to the DVR for storage or live monitoring.

 

2.  DVR

DVR

 

The DVR captures and stores video from each camera. It allows playback, backup, and configuration of the cameras. DVR systems typically support 4, 8, or 16 camera channels.

 

 

3. CCTV cable

cctv cable

  • Power Cable: Supplies electricity to the camera.

  • Signal Cable: Transmits footage to the DVR system.

 

 

4. BNC Connectors

BNC connectorThese connectors link the CCTV cables to the DVR and allow secure signal transmission.

 

 

5. CCTV Power Supply

power supply

Converts high voltage to suitable camera power (usually 12VDC or 24VAC). It ensures stable operation and protects against power surges.

 

How Security Guards Use CCTV

Security guard CCTV training involves understanding procedures such as:

  • Monitoring live footage from multiple cameras.

  • Reporting unusual or suspicious activity.

  • Identifying individuals or incidents using footage.

  • Controlling PTZ cameras to follow a person or area.

  • Documenting incidents based on recorded footage.

  • Communicating with supervisors or police with evidence.

Legal and Ethical Considerations

Security guards must follow local laws when using CCTV:

  • Never install cameras in private spaces (e.g., restrooms).

  • Always protect and restrict access to recorded footage.

  • Footage should only be shared with authorized personnel or police.

  • Understand and respect privacy rights.


Daily CCTV Maintenance Checklist

TaskStatus
Clean camera lenses
Check the camera angle and focus
Ensure all cameras are online
Test DVR recording
Inspecting cables and connectors
Confirm timestamp accuracy

Common Surveillance Challenges

  • Camera blind spots
  • Power failure or voltage fluctuation
  • Storage full on DVR
  • Night vision issues
  • Camera tampering

Guards must report technical issues immediately and follow up on maintenance requests.

Sample Incident Report Based on CCTV

Date: 13/04/2025
Time: 21:45
Camera #03 – Parking Lot
Incident: An individual was seen attempting to open parked vehicles. The subject appeared suspicious and left the area upon noticing the camera. The footage was saved and reported to the supervisor.
Action Taken: Alerted on-duty staff, saved recording, and prepared report for management.

Benefits of CCTV for Security

  • More cost-effective than hiring multiple guards.
  • Prevents crimes through visible surveillance.
  • Reduces employee theft or misuse of resources.
  • Provides reliable legal evidence.
  • Boosts employee and customer confidence.
  • Encourages professional behavior.
  • Enables efficient remote monitoring.

Conclusion

The CCTV system is a powerful surveillance tool for every security professional. Through security guard CCTV training, guards can maximize its benefits to protect people and property, detect suspicious behavior, and respond effectively to incidents. Every CCTV security guard must be confident in camera operations, legal handling of footage, and use of the system in daily security tasks.

Full course

Security Alarm System and Alarm Response Procedures

Basic security guard training Unit 4 Lesson (D)


A security alarm system is critical in detecting emergencies and notifying authorities or responsible personnel. From ancient methods like bells or barking dogs to modern digital systems, alarms have evolved to improve alarm response security in workplaces and residences.

Today’s systems monitor:

  • Unauthorized entry
  • Fire or smoke
  • Equipment failure
  • Hazardous conditions (toxic gas, temperature changes, etc.)

Types of Alarm Systems

  1. Intrusion Alarms – Triggered by unauthorized access.
  2. Fire Alarms – Detect fire, smoke, and heat levels.
  3. Distress Alarms – Alert emergencies such as personal threats or medical conditions.

Main Components of a Security Alarm System

A modern security alarm system includes:

  • Sensor: Detects changes (motion, smoke, pressure).
  • Transmitter: Sends the signal to the control panel.
  • Annunciator (Control Panel): Processes the signal and triggers a suitable alarm response.

Types of Alarm Monitoring

  • Local Alarm: Audible alarm alerts people nearby.
  • Central Station Monitoring: Alerts go to a centralized control room.
  • Remote Monitoring: Sends alerts directly to responsible individuals.

Alarm Response Procedures for Security Guards

Alarm response security is critical for any security guard because Proper alarm response procedures can prevent damage, reduce risk, and ensure safety.

Best Alarm Response Practices:

  • Always treat all alarms as genuine.
  • Have a response plan ready and know the site layout.
  • If possible, observe the situation before approaching.
  • Respond with at least one other security personnel.
  • If a weapon is visible, do not engage directly—report from a safe distance.
  • Use your communication device to update the control room or authorities.

Understanding False Alarms

Even though many alarms are false, guards must apply the same alarm response procedures as for a real incident.

Types of False Alarms:

  1. Technical Issues – Faulty installation or malfunction.
  2. Accidental Triggers – By wind, pets, or operator error.
  3. Power Surges – May reset the system and trigger an alert.

Alarm Activation Statistics:

  • Genuine intrusion: ~0.01%
  • Malfunction: ~19.69%
  • Human error: ~45.80%
  • Unknown causes: ~34.50%

Distress Alarms

A distress alarm signals trouble or an emergency for people or equipment.

Examples:

  • Panic buttons in banks or offices
  • Medical alarms in hospitals
  • Equipment alarms in industrial settings

These systems improve alarm response security by allowing quicker action in critical situations.

Control Room and Its Functions

The control room is the command center for handling all alarms.

Control Room Tasks:

  • Monitor CCTV systems
  • Record and review surveillance footage
  • Announce emergency instructions
  • Receive alerts from fire and intrusion systems
  • Coordinate with external emergency services

The control room ensures a coordinated and professional alarm response during emergencies.

Maintaining Professional Alarm Response Security

Security personnel must maintain a clean, organized control room and ensure only authorized access. The professionalism of the space reflects the organization’s alarm response procedures and readiness.

Communication Protocols During Alarm Response

Effective communication is essential for a timely and coordinated alarm response.

Essential Protocols:

  • Always report to the control room first.
  • Use two-way radios or an intercom to update status.
  • Speak in clear, short, professional codes (e.g., “All Clear,” “Code Red Intrusion at Zone 3”).
  • Use the phonetic alphabet if needed (e.g., “Zone B like Bravo”).

During False Alarms:

  • Calmly inform the control room it’s a false alarm.
  • Do not reset the system unless authorized.

Personal Safety of Security Guards

Security guards must prioritize their safety during alarm response.

Key Safety Measures:

  • Never engage directly with armed suspects.
  • Do not enter confined areas alone during an alarm investigation.
  • Stay visible and communicate location at all times.
  • Wear protective gear when available.
  • Use flashlights, batons, or whistles for signaling.
  • Retreat and report if danger is imminent.

Summary

  • Use a security alarm system to detect threats early.
  • Understand key components: sensor, transmitter, and control panel.
  • Follow proper alarm response procedures to handle emergencies effectively.
  • Distress and intrusion alarms require immediate attention and action.
  • The control room plays a central role in coordinating alarm response security.

Full course 

Security patrol basic security guard training.

Basic security guard training Unit 5 Lesson (C)


A security patrol is an important part of the security guard duty. In which a guard tours to keep watch over the area, which makes you more visible and deters crime. Staying in a post you can not observe a large portion of the site but go for patrol you can cover more area and can observe what is going on in the surroundings.

The security guard is hired to protect people, property, and information. A uniformed guard deters crime against people or property by being there. When you patrol on as regular basis the widened area can protect you.

The main purpose of the patrol is to maintain security in the premises under your authority. The patrol helps you to identify the situation around your site and take action if it requires.

PURPOSE OR RESPONSIBILITY OF PATROL;
  1. detect hazards:- like housekeeping, hazards (garbage pile and recycle bin). Maintenance hazards ( leaks, burnt-out lights). The equipment hazard (sparkling electrical wire, overheated boiler, sprinkler system), etc.
  2. detect emergencies such as floods, fires snow melting, etc.
  3.  For keeping the site safe reporting injuries, giving first aid, and escorting them if they feel unsafe.
  4. To make sure the area is secured from intrusion. such as vandalism, break, and entry theft, shoplifting, and assault etc.
  5.  Reporting the machinery that not working properly such as heating and cooling systems.
  6.  Check for damaged property
  7.  and protect information by ensuring only authorized people are in controlled areas.
  8. Check the unusual sound and their sources
  9.  Check for unusual conditions and improve community relations by giving help and information to the public.
  10.  Report and record It is very important to record in your notebook the thing that was found unusual in the process of patrol and report to the supervisor.

The 5 types of Patrol;

  1. Reactive: patrol after the incident happened
  2. Proactive: You do Patrol to prevent the incidents. (You think and you do)
  3. Control area:  Patrol for dominating or controlling the area. (you do patrol as post order)
  4. Random:  You do the patrol randomly. (not fixed time or route)
  5. Directed: Someone asked or directed you to do patrol. (Sometimes control room or supervisor directs you go patrol to check something.) 
Method of security patrol;
  1. Foot patrol
  2. Bicycle
  3. Vehicle
  4. Visual (CCTV/Mirror)

What senses will you use a security patrol?

  1. Sight:
  • Be observant
  • Check for unusual conditions
  1. Hearing:

Check for unusual sounds and investigate their sources

Examples include running water, smashing glass, and malfunctioning equipment.

  1. Smell:

Examples include smoke, gas, and overheated machinery

  1. Touch:
  • Air Currents
  • Temperature change
  1. Taste:

Use with caution

What should you check and do while on patrol?
The security guard generally performs their duty on the day and night shifts. Either shift you work it does not matter. You have to go for a patrol as per the circumstances around you. The security guards who work on a holiday, have to patrol constantly even it is daylight.

Patrol at the night time is more sensitive than patrol at the daytime. Because of poor illumination, the criminals generally make a plan for the night. But, you can take advantage of the dark to observe closely what is going around you without being visible. Here are important things you should do in the patrol.

Do in the patrol;
  • Turn off equipment when the operation is not indicated
  • Check for;
      • unusual sounds and their source
      • unusual ordos.
      • damage property
      • All  security processes
      • unusual conditions
      • running water
  • Checking Doors and Buildings
  • Use your flashlight effectively
  • Be cautious with windows and glass doors
  • Be careful entering a dark room
  • Don’t smoke while on patrol
What to do if you suspect the crime has been committed?

If you find someone has committed the crime you should respond quickly and appropriately. These following things are so important to follow.

  1. Call the police
  2. Ask other guards for backup if available.
  3. If other guards are not for back up you should wait until the police come.
You should do the following states to accomplish a patrol;
  1. Prepare for patrol.
  • Make sure, you study your post orders and know your site well.
  • Gather and analyze the information on taking over duty.
  • Check all patrol equipment working fine.
2. When you patrol:
  • Complete patrol as the first time avoids routine.
  • use all of your senses, and be aware of the unusual things.
  • don’t rely on your memory. Always use your notebook
  • Be visible. Meet the people on your site.
3. Patrol safely
  • Seek for backup if someone confronts you.
  • walking quietly and trying not to be seen at night
  • Look for hazardous materials and avoid them.
  • Try to develop your powers of observation
IN SUMMARY:
  • The goal of security is to identify and prevent problems that affect the client.
  •  Patrol is the most common way to identify problems
  • Understand the general patrol responsibilities
  • Make sure you have the correct equipment and that it is working when on-site
  • There are 5 major types of patrol
  • Never carry any kind of a weapon unless authorized
  • Plan the action that you would take in an emergency

COMPLETE COURSE 30 LESSONS

How to conduct a protective search in Security?

Basic security guard training Unit 4 Lesson (B)


Security guards carry out a protective search on their site if the site policy is required. The protective search conducts in two situations;

  1. Search for the weapon and evidence after detaining the person.
  2. search the employees, visitors, vendors, and the public as well as their belongings when entering and exiting the premises.
There are four reasons for the search;
  • To keep essential things in
  • To keep potential problems out
  • To control access to an area
  • To know what is in a specific area

Your client hires you for keeping himself and his property safe from any problems. So, the security guards apply the access control policy for all people who want to enter the site.

A search is also part of the access control which allows only authorized people, vehicles, and material in and out of the site.

The protective search procedure may include in your post order if not, you should suggest the client and your supervisor.

Sometimes your client can be suspicious that the employees may steal the goods from the company.

For that reason, you may be asked to search for the employees’ bags and other belongings while leaving the company.

What things need to search on the site?
  1. Dangerous items
  2. stolen items
  3. prohibited items

The search can contemplate finding the above items either people in or out of the company.

If the people come in with dangerous items such as a weapon or other tools that can use a weapon. They may have the intention to hurt or injure someone already inside the premises.

Search for prohibited items for instance drugs, marijuana, and other items which are not allowed to carry with them.

Any goods stolen from the company also need to conduct a protective search.

Providing security permission you may require to search the people, packages, and vehicles in different kinds of investigation which are;

  1. Visual search ( search through your eyes)
  2. A request search ( you made a request for a search)
  3. Agreed search (someone came to you and asked for a search)
When do you search for a vehicle?
  1. Required by your post order
  2. When vehicles enter the site (to search for weapons/equipment)
  3. While vehicles are out from your site (to avoid theft)
Vehicle search tools;

You have to use the different types of equipment to search for a vehicle that is available on your worksite. But, here are the general tools that, you may utilize on searching for a vehicle in many places.

  1. Your eyes
  2. Flashlights
  3. X-ray
  4. mirror
  5. dog
When to search for people or packages?
  1. Required by your site order
  2. When a person enters an area and is carrying something that could conceal (hide)
  3. If a person leaves a high-security area
  4. When a person enters an area could be carrying something dangerous.

Remember, the most important tool for any kind of search is your EYES.

Tools to use search for persons or packages;
  1. Eyes
  2. Metal detector
  3. X-ray
  4. Hand search

When you conduct the protective search you shouldn’t do your own because it can be a violation of the person’s rights and you have to do hard to prove it in court.

When some people do not agree with you about searching for them or their personal belonging.

In that situation, you shouldn’t force them to do so, because you don’t have a right to compel someone for help. Explain to them why it is needed. and what you are going to search for.

In the first place, try to gain co-operation. Still, they don’t allow you then inform the supervisor or the client representative.

GAINING COOPERATION

  • Be polite and speak with authority: Talk to people first, don’t just take their bag from them and begin searching. Remember that your job does not be afraid to speak to someone.
  • Ask for Cooperation: Ask “do you mind if I search your bag?” rather than telling them they have to be.
  • Tell people why: People always want to know why?. You should tell them valid reason before they ask (company policy/special instruction by your client)
  • Find something prohibited: Don’t accuse people, be polite in telling someone that an item cannot be brought in.
  • Thank people for their cooperation
What personal property do you store for security purposes:
  1. Storing shopping bags: (in a retail shop): in order to prevent theft
  2. mobile phone: In the high-security area (provide a safe facility to keep)
  3. storing vehicles: park the vehicle in a secured area
  4. Storing identification: keep personal and return them when they are out.
IN SUMMARY
  • Searching is part of the role of providing protection
  • There are 4 main reasons to conduct a protective search
  • Searches are conducted for items that are dangerous, stolen, or prohibited
  • The vehicle is generally searched as required by site orders, when they enter a site, and when they leave a site
  • People and packages are generally searched as required by site orders.
  • People can carry something with them a stolen item when they leave a high-security area, and when they enter your duty place can bring something dangerous.
  • Know how to use search equipment available at your worksite
  • A person should only be searched as required by your site orders
  • If a person must be searched, it should only be done by someone of the same gender male-male or female-female
  • Always try and gain cooperation when conducting a protective search
  • You may be required to check identification at the same time as conducting a protective search
  • If you store personal property as a result of a protective investigation, always provide someone with a receipt for their property.
Complete course 30 lessons 

How do search bages?

Access control in a site basic security guard training

Basic security guard training Unit 4 Lesson (A)


What is access control in security guard? it is a method used to control and monitor the entry of people, vehicles, and goods to a specific site. It ensures that only authorized individuals are in the right place and at the right time.

The access control mechanism is used everywhere, including your house, car, and office. For example, you close doors, windows, and gates when leaving the house, lock your car after parking, and secure doors and windows after office hours. All these activities are performed to prevent unauthorized entry and ensure safety.

What is the Purpose of access control: 

There can be many reasons why the access control mechanism

  1. Controlling the flow of people – control and monitor the movement of people.
  2. Prevent unauthorized access – Ensures only authorized personnel can access specific locations.
  3. Manage vehicle flow – Controls the entry and exit of vehicles.
  4. Prevent unauthorized vehicles – Stop unauthorized vehicles from leaving or entering the premises.
  5. Monitor goods movement – Prevents unauthorized goods from entering or exiting the site.
  6. Create a secure environment – Enhances safety and security in the workplace.

Aim of the access control in Security:

Access control is a key duty of security guards. It aims to prevent unauthorized individuals, vehicles, and materials from accessing the property. By controlling the movement of people, vehicles, and goods in and out of the site, security guards ensure the safety and protection of the premises.

What is the level of access control for security guards?

The level of access control may vary depending on the site and what it needs to protect. But, in common, there are three categories of access control as following;

1. Minimum access control:

Minimum access control applies to areas where general permission is granted to everyone, such as shopping malls, public parks, bus stations, and railway stations. In these places, it is assumed that all individuals entering have a lawful purpose.

However, as a security guard, you must restrict access to anyone who violates the law or regulations to maintain order and safety.

2. Mediam access control :

Medium access control usually applies to residential buildings and offices. Security guards manage access by using intercom systems to verify visitors. They record visitor information, issue visitor passes, and record the person being visited along with the purpose of the visit in their log book.

Guards allow individuals to enter the premises only after having permission from the concerned person.

3. Maximum access control:

The maximum level of access control is found in sensitive sites, such as military bases, government offices, labs software manufacturers, etc. The access controls here combine both the security guard and alarm system.

Security guards are responsible for searching vehicles, baggage, and even individuals as required by the site’s security protocols.

Rules of Access Control:

Access control rules depend on the site’s specific requirements.

  1. Allow public access during specific times: Some areas allow the general public to enter at specific times and days. For example, people can access the lobby or waiting area during office hours, but security guards restrict entry after hours.
  2. Control parking area access: Security personnel manage access to parking areas, applying rules based on time and purpose.
  3. Update rules based on security needs: Top management reviews security matters and updates access control rules as needed.
  4. Restrict employee movement: In large organizations, employees cannot enter other departments unless they have a valid reason.
  5. Apply rules to everyone: Security guards enforce these rules for both employees and the public to maintain safety and order.

What does access control determine?

  1. Need of the clients:

The clients who do business with a company always are concerned about the safety of the products that they have bought, or that they have stored.

Sometimes the clients need different types of entry and egress mechanisms. The result for that the policy can be changed as per the client’s requirement.

2. The owner of the property:

The property owner may set all rules of the access control. He instructs the security guard who can access the building or area. And, what needs to search before entering and exiting the property.

ACCESS CONTROL IN ELEVATOR AND ESCALATOR

If you are working in a shopping mall or a residential building where the elevator or escalator facilities are available. You are responsible for supervising the elevator operation. Make sure the following things go well in the operation of the elevator.

  1. Notify the maximum load to the passengers.
  2. Encourage the passenger to move to the rear of the elevator and face to the front.
  3. Make sure the people’s clothing and personal belongings are away from the door on closer.
  4. Know the emergency system such as a stop button, bell, and telephone numbers.
METHOD OF ACCESS CONTROL IN A SITE.  

access control

Access Control Method:

The access control method may vary depending on the site, but it generally follows three main layers: the outer perimeter, inner perimeter, and central core area.

  1. Outer Perimeter: This is the outer boundary of the property, such as fences, gates, or surrounding areas.
  2. Inner Perimeter: This includes the building’s walls, doors, and windows, which act as barriers to control entry.
  3. Central Core: This is the most secure interior part of the building or site, where sensitive operations or assets are located.

Controlling the movements of people 

Security guards control the movement of people across various parts of the site through three phases of defense:

  1. Perimeter
  2. Inner Circle:
  3. Center Core:

Security personnel must manage and monitor the movement of people at all three layers to ensure effective protection and prevent unauthorized access.

How to control access at the perimeter?

  1. Fences and walls
  2. Gates and other openings
  3. Infrared beam perimeter security systems
  4. Cameras
  5. Lighting

How to control access to the inner perimeter?

  1. Entry through the security guard
  2. Enter through the mechanical and electrical devices.

Entry through the security guard;

You may ask to do duty at the entrance of the building and be responsible for checking the personal identity and determining whether a person to allowed in or not. The following way you should allow the person to access the building.

  1. personal recognition:
    • (you know the person personally) is only useful for small businesses. Also, it applies in an area where the less movement of the people. Such as regular vendors, visitors, and employees who only come for work.
  2. ID system:
    • (check the person has a valid ID card) these are things you should make sure of while checking the ID.
      • a colored photo and physical description of the holder
      • the full name and signature of the holder
      • the company’s name and an issuing authority’s signature
      • an expiry date
      • A serial number and employee number
  3. Special passes:
    • In a high-security area, the person requires a special pass to access there. If the person is a temporary worker he needs a special pass from the security guard. He provides you driving license, national ID card, or any other government-issued identity, and you provide a special pass.
    • At the exiting time, you should return your ID and get back the special passes. You should record all the details in the logbook including entry/exit time and description of the work he has done.

Entry through the mechanical/electrical device;

It is used in the medium level of access where a security guard does not need to check everything about the employees. They can go in by using pre-approval electrical and mechanical cards, keys, and storage data.

    1. Keys
    2. Tough keypads
    3. ID card tags
    4. Proximity cards
    5. Biometric identification

Controlling the movements of vehicles

Controlling vehicle movement is as important as managing people on the site. As a security guard, you must take specific measures to enforce access control rules effectively. Your main responsibilities include:

  1. Allowing only authorized vehicles: Ensure that only vehicles with proper authorization can enter the site.
  2. Preventing unauthorized equipment and material removal: Check vehicles to stop unauthorized equipment or materials from being taken out of the premises.
  3. Maintaining a vehicle log: Record details of all vehicles entering and leaving the site to keep an accurate log for security purposes.

 Tools to use for vehicle control:

    • Gate
    • Barrier
    • Traffic cone
    • Sign and symbol

When controlling vehicle movement, ensure that only pre-approved vehicles enter the site. Employees must obtain approval from company management to bring their cars, and you must verify that the vehicle has the approved company label or sticker.

You should log vehicles in and out of the premises and register the driver’s details in the access control book. Additionally, check the vehicle’s size and height. If a vehicle exceeds the site’s size or height limits, immediately inform your supervisor.

Your task on controlling the delivery vehicle

  1. check vehicle license numbers and driver’s name
  2. Only the proper authorized delivery is given and received
  3. receive the delivery by post orders
  4. Check the vehicle is sealed and that the “seal” is not broken or tempered.
  5. Verify the vehicle when leaving the premises to make sure it has loaded only authorized items and has waybills and any other supporting documents.
  6. Check the vehicle cabs to discover the prohibited items that may be concealed.

3. Controlling the movement of the material 

Controlling the material access is the most sensitive task a security guard performs on duty. In the course of your duty, you may deal with the illegal removal of the material from your site either through the employees or the service vendor.

Routinely employees leave the site with things like a laptop, computer, computer parts, full briefcase with goods, or the vehicle.

As your part of the duty, you should allow only the legitimate material in and out of the premises. If you find anything without approval taken out, then ask for the gate pass from the responsible person.

There is no doubt in today’s world, industrial espionage is increasing day by day. Hence, the security guard has to prevent accessing sensitive material and removing it from the company.

Shipping and receiving controls

In some instances, the client may ask the security guard to sign some documents for shipping and receiving the goods. The clear client’s instruction requires or your post order includes these tasks to do on your duty.

You should comply with the client’s wishes when you control the movement of the material. You may be required to do, as follows, with the shipping and receiving items.

  • Fill out the special form for the receiving packages if available.
  • complete the logbook of the shipping and receiving of goods
  • Delivery sign-out and sign-in
  • Make arrangements for the delivery and recipient of goods.

Summary:

  1. What is access control in security guard? Access control is a security measure for managing the movement of people, vehicles, and materials when in and out of the site.
  2.  There are many reasons why access is controlled and it can be controlled by
      • Physical systems (such as barriers, gates and doors, etc.)
      • The man guarding (security guard controls the movement) or
      • Combination of both
  3. Guard should be familiar with their site policies regarding access and be aware of their response to common access control situations
  4. The 2 basic requirements of personnel access are
      • Determining to identify and
      • Determining the level of access.
  5. Identification shown to you by a visitor/co-rep may not necessarily be in the form of an ID card.
  6. Guards may be required to make sure there is a sign-in/sign-out log at their site
  7. In handling unauthorized access, guards should make sure that they know their site policies and remain policy at all times.
  8. There are 3 main responsibilities in controlling vehicle access:
      • Only authorized vehicles are permitted
      • Unauthorized equipment and material removal
      • and maintain a log of a vehicle entering and leaving
  9. The guard should be aware of the approved vehicle at their site
  10. The guard should be aware of the height and size limitations of a vehicle access point
  11. Ensure that vehicle access points are clear for approaching emergency vehicles.
Take the full course

Integrity is an important quality of security guard

Basic security guard training Unit 1 Lesson (G)


Integrity is the most important quality a professional security guard can possess. It is an internal guideline that guides how you react positively to the outside world. A person who possesses integrity is respectful, reliable, honest, and principled.

Key Elements of Integrity

The most important elements of integrity as follows influence your daily duties and how you interact with others.

  1. Respectful
  2. Reliable
  3. Honest
  4. Principled

When are you respectful:

When you exercise the following four points on your duty. It brings positive responses and respect from co-workers, employers, and the general public.

  1. Like yourself and treat yourself well: being respectful of yourself and your job influences how you carry yourself and how others perceive you.
  2. Treat others as you would treat yourself: Show courtesy, kindness, and helpfulness to build positive relationships.
  3. Understand the importance of following laws and orders: Adhere to official rules and regulations it demonstrates professional conduct.
  4. Respect the property of others: Protecting and caring for the belongings of others is a key part of security work.

When are you Reliable:

A security guard holds one of the most trusted positions in any organization. You are responsible for protecting valuable property, VIPs, and sensitive information. To be seen as reliable, you should:

  1. Perform your duties to the best of your ability: Always do your job to the highest standard.
  2. Take control of situations and stay calm in emergencies: Responding appropriately under pressure builds trust and confidence.
  3. Be punctual when arriving and leaving: Reliability includes respecting time commitments.
  4. Share information with guards on other shifts: Good communication ensures continuous and consistent security coverage.

When you are honest:

Honesty is another crucial quality for a security guard. If you are honest, everyone believes in you and expects positive outcomes from your actions. You show honesty by:

  1. Telling the truth: Always tell the truth because untrustiness undermines professional relationships.
  2. Taking responsibility for your actions instead of blaming others: Be accountable for what you have done it is essential for personal and organizational integrity.
  3. Keeping information to yourself when necessary: maintain confidential information rather than leakage.
  4. Being sincere with others: When you interact genuinely fosters respect.

When you are principled?

If You are a principled person you have a moral of speaking about the right and wrong with either junior or senior position in an organization. These things show you are principled;

  1. You believe in treating everyone fairly
  1. You speak out if you see someone being treated unfairly.

Additionally, a professional security guard also has self-control and discipline. Some people may criticize you because of your uniform which represents authority.

If you are angry at that point the situation would go worse beyond the horizon. So, you should stay calm in an emergency that’s the reason the other people who are frightened turn to your guidance.

If you are disciplined.

1.  Show strong self-control, even when challenged

  1. Remain calm under stress

  2. Follow procedures with little or no supervision

  3. You are well-organized a carry out your duties with care

  4. Do not become involved in any gossip in your workplace

6. Enforce the rules and procedures at your site no matter who is involved

 

ACCEPTING FAVORS

“Accepting favor or a security courtesy” means a security guard obtains something from a third party free of charge.

Someone or businesses out of your company can offer you gifts, money, food, goods, or other property for partisan services.

Consequences of Accepting Favour

  • Harms your decision-making ability:
    • Accepting anything from a third party will damage the security guard’s decision-making ability when it comes to the individual or business from whom they had received the gift or any other things.
  • May compromise your impartiality and create bias:
    • This can make it very difficult for the security guard to act with impartiality without the favor of someone or bias.
  • Damages public trust in the security industry:
    • Cause of that public trust and support toward the entire security industry can be affected in general.
  • Reflects poorly on you, and your colleagues:
    • A wrong decision not only blames the particular security officer but also your fellow officer, your company, and the whole security industry in the eyes of the public.

Hence, stay away from these types of activities in your workplace which can cause the damaging reputation of the security industry as a whole.

Summary

A security guard demonstrates integrity by doing the following:

  1. Obeying all work-site rules and regulations.
  2. Respecting all laws (federal and provincial/state).
  3. Being reliable, punctual, and professional at all times.
  4. Carrying out all duties in a professional manner.
  5. Completing assigned tasks on time.

Upholding these standards will help ensure you represent yourself, your employer, and the security profession with dignity and professionalism

The full course of security guard training