Managing Suspicious Activity and Safety Threats

$75

Per course if individual. For larger volumes, we can quote at very reasonable rates. Contact Us.

This practical course empowers individuals to detect, assess, and respond appropriately to suspicious behaviour and safety threats in the workplace or community

Australian dollar ($) - AUD
  • Australian dollar ($) - AUD
  • United States dollar ($) - USD
or

Through real-world examples, emergency response protocols, and interactive scenarios, participants will learn how to handle suspicious activity effectively, including people, vehicles, objects, and bomb threats. Emphasis is placed on quick thinking, informed decision-making, and following proper safety procedures to reduce harm and maintain a secure environment.

Keywords: Suspicious Activity Training, Safety Threat Response, Emergency Preparedness Course, Bomb Threat Procedures, Workplace Security Awareness, Identifying Suspicious Behaviour, Threat Assessment, Emergency Response Training, Public Safety Education, Safety Risk Management

Course Modules

Identifying and Responding to Suspicious Activity
  • Overview of the importance of early detection.
  • Four categories of suspicious activity: people, vehicles, objects/mail, and threats.
  • Importance of keeping emergency contact details accessible.
Suspicious Person
  • Key behaviours to look for: nervousness, evasiveness, unusual focus on security.
  • Information to record and report: appearance, clothing, location, behaviour.
  • Scenario: How to act if someone seems out of place in a secured area.
Suspicious Vehicle
  • Red flags such as parking in unusual areas, strange smells, or visible modifications.
  • What to report: make, model, registration, location, and observed occupants.
  • Scenario: What to do if a vehicle poses an immediate threat.
Suspicious Objects or Mail
  • Identifying hidden or unusual packages, both physically and digitally (e.g., suspicious emails).
  • Email red flags: strange addresses, vague greetings, misspellings, attachments.
  • Steps to take: do not interact with the object/email, notify the correct department.
Bomb Threats
  • Handling threatening calls: staying calm, asking strategic questions, noting critical information.
  • What to report: voice details, background noises, and device details if known.
  • Examples of useful questions to ask during the call.
Emergency Procedures and Preparedness
  • Overview of lockdown and shut-out protocols.
  • How to respond to medical emergencies.
  • Importance of knowing procedures specific to your organisation.
Module Wrap-Up
  • Summary of types of suspicious activities and responses.
  • Emphasis on staying informed and referring to organisational protocols.
  • Encouragement to keep emergency contact numbers accessible at all times.

 

By the end of this course, participants will be able to:

  • Recognise and report suspicious behaviour, vehicles, objects, and emails.
  • Respond calmly and effectively to direct threats, including bomb threats.
  • Understand what details to observe and communicate to emergency services.
  • Apply organisational emergency procedures, including lockdown and shut-out responses.
  • Support the safety of the workplace by acting with awareness, caution, and preparedness.

Legislation Covered

  • While this module is primarily procedural and situational, it aligns with Australian workplace health and safety obligations and emergency preparedness protocols. Key references include:
    • Work Health and Safety Act 2011 (Cth): Ensures the provision of a safe work environment.
    • Australian Security Intelligence Organisation Act 1979 (Cth): Guides national security awareness and threat prevention.
    • Relevant state-based emergency management protocols and legislation (e.g., in NSW, Victoria, etc.) depending on workplace jurisdiction.
0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Get a quote for Custom Compliance