|
Part B |
|
Course Outline |
|
SUBJECT AREA |
Time Allotment (in hours) |
|
Theoretical |
Demonstration/ Practical Work |
|
1. Course Introduction |
0.5 |
- |
|
2. Contribute to the enhancement of maritime security through heightened awareness |
|
|
|
2.1 Maritime security terms and definitions |
0.5 |
- |
|
2.2 International maritime security policy and responsibilities of Governments, companies and persons |
|
|
|
2.3 Maritime security levels and their impact on security measures and procedures aboard ship and in port facilities |
|
|
|
2.4 Security reporting procedures |
|
|
|
2.5 Security-related contingency plans |
|
|
|
3. Recognition of security threats |
|
|
|
3.1 Techniques used to circumvent security measures |
0.5 |
0.5 |
|
3.2 Recognition of potential security threats |
|
|
|
3.3 Recognition of weapons, dangerous substances and devices and awareness of the damage they can cause |
|
|
|
3.4 Security-related information and security-related communications |
|
|
|
4. Understanding of the need for and methods of maintaining security awareness and vigilance |
|
|
|
4.1 Training, drill and exercise requirements under relevant conventions, codes and IMO circulars |
0.5 |
0.5 |
|
5. Maintain the conditions set out in a ship security plan |
|
|
|
5.1 Maritime security terms and conditions |
2.0 |
- |
|
5.2 International maritime security policy and responsibilities of Governments, companies and persons |
|
|
|
5.3 Maritime security levels and their impact on security measures and procedures aboard ship and in the port facilities |
|
|
|
5.4 Security reporting procedures |
|
|
|
5.5 Procedures and requirements for drills and exercises under relevant conventions, codes and IMO circulars |
|
|
|
5.6 Procedures for conducting inspections and surveys for the control and monitoring of security activities specified in a ship security plan |
|
|
|
5.7 Security-related contingency plans and procedures for responding to security threats or breaches of security |
|
|
|
6. Recognition of security risks and threats |
|
|
|
6.1 Security documentation |
1.0 |
0.5 |
|
6.2 Techniques used to circumvent security measures |
|
|
|
6.3 Recognition of potential security threats |
|
|
|
6.4 Recognition of weapons, dangerous substances and devices and awareness of the damage they can cause |
|
|
|
6.5 Crowd management and control techniques |
|
|
|
6.6 Security-related information and security-related communication |
|
|
|
6.7 Methods for physical searches and non-intrusive inspections |
|
|
|
7. Undertake regular security inspections of the ship |
|
|
|
7.1 Techniques for monitoring restricted areas |
1.0 |
|
|
7.2 Controlling access to the ship and to restricted areas on board ship |
|
|
|
7.3 Methods for effective monitoring of deck areas and areas surrrounding the ship |
|
|
|
7.4 Inspection methods relating to the cargo and ship's stores |
|
|
|
7.5 Methods for controlling the embarkation, disembarkation and access while on board of persons and their effects |
|
|
|
8. Proper usage of security equipment and systems, if any |
|
|
|
8.1 Types of security equipment and systems |
0.5 |
|
|
8.2 Testing, calibrating and maintaining security systems and equipment |
|
|
|
Sub-total |
6.5 |
1.5 |
|
Total |
8.0 hours |
|
|
|
|
|
Assessment |
0.5 |
0.5 |
|
|
|
|
|
Note: The number of hours for assessment shall be determined by the Maritime Training |
|
|
|
Institutions (MTIs) |
|
|