SecurityCEU.com Launches Frontline Project Management Online Training Course

SecurityCEU.com has launched the Frontline Project Management Course, a new online training in partnership with industry-renowned educator Nadim Sawaya, MSCE, CPP.

Frontline Project Management training program is tailored to the low voltage electrical/construction industry. It was conceived to teach the Security and Systems Project Managers how to play the construction game and manage their projects as electrical and general contractors.

This unique program consists of two parts: (1) The online program which is about eight hours of interactive self-paced and (2) two-hours Instructor-led workshop to review lessons learned, implement best practices, and allow students to discuss specific real-life projects challenges. In essence, SecurityCEU.com took a well-established traditional course and transformed it into a two-hour instructor-led workshop and eight hours of a self-paced online program.

Nadim Sawaya, President of Enterprise Performance Consulting (EPC), has been consulting and training on project management in the security and systems industries for more than 22 years. Nadim has more than 35 years of executive and operations management experience and managed projects from $5k to $50M in general construction, fire alarm, communication, building automation to security systems. In addition, Nadim has held leadership roles with companies such as Pauling/Rapco, Stanley Security, Siemens Building Technologies, Honeywell, Pinkerton and Convergint Technologies.

The Frontline Project Management Module 1: Managing the Project Team, covers topics such as the overall project lifecycle; roles and responsibilities of the project team; key duties, responsibilities and competencies of the project manager; and defining the project team tasks using the RACI Matrix.

The Frontline Project Management Module 2: Defining Phase, discusses: steps required in the defining phase of a project; reviewing and interpreting contract documents; validating the project scope; block diagrams; reviewing and confirming the project’s estimated budget; and validating the projects scope, cost and schedule.

The Frontline Project Management Module 3: Planning Phase, focuses on: work breakdown structure (WBS); task duration estimating; milestones; manpower schedules; critical path method (CPM) techniques to determine project duration, floats, and critical path; cost re-estimates; scheduling; and resource commitment.

The Frontline Project Management Module 4: Implementation phases, covers: resource procurement; Golden Rules of using subcontractors; controlling and proper documentation of the project; coordinating with other trades; managing quality; and safety, OSHA overview requirements and employer responsibilities.

The Frontline Project Management Module 5: Closing phase, discusses: closing steps; customer training; as-built documentation; final testing and acceptance; project audits; and closeout checklists.

“We are so proud to be offering this course in partnership with Nadim Sawaya, who is known throughout the industry as the expert on Project Management,” said Connie Moorhead, CEO at The CMOOR Group who owns and operates SecurityCEU.com. “This much sought-after live training is now available online! Now security and system integrators can get the best industry project management training in a safe, convenient and cost-effective format.”

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.