Physical and Informational Threat Assessment Procedures and Rules Certificate of Completion

The Physical and Informational Threat Assessment Procedures and Rules Certificate consists of two courses (8 credit hours) designed to meet the needs of online students in the fields of threat analysis and threat assessment. Courses included in the certificate introduce students to building the protocols for threat analysis, examining physical and informational procedures for assessing potential threats, and information management and communication best practices.

For professionals who want to further their education beyond a certificate and grow their careers in this direction, Bellevue University is offering the Master’s in Threat Assessment (available July 2025), which is built from courses such as those in this certificate of completion.

What You'll Learn

Students will learn to develop and demonstrate the following:

  • Develop protocols for handling security events.
  • Examine areas of sensitivity for information regarding a threat event.
  • Evaluate the role of an individual who is granted access to sensitive information.
  • Identify the terms, concepts, and policies associated with physical security
  • Construct processes to manage potential threats and mitigate events.
  • Examine facility and informational security planning, procedures, and processes.
  • Create proper communication to employees about physical and informational security practices.
  • Plan for preventative measures for events leading to problems with securing information.

Certificate of Completion Courses designed to meeet the needs of online students in:

(Click a course name below to view course details).

This course will discuss the need for personnel to develop credentials for compliance towards various types of security, from physical security to security administration that focuses on the protection of assets and gain abilities in applying those processes. This course compares industry standards and practices for personnel security currently used in the workplace.

This course looks at risks to preempt waiting for a security breach leading to evaluating security procedures affecting both physical and informational security. Practicing proper assessment will be discussed as the foundation of physical security and why public and private organizations are falling victim to high-profile cyberattacks and ransomware. The course will show where physical security assessments will identify potential threats and major effects in your facility security systems and show the complexity of measures needed to protect networks, infrastructures, applications, products, and proprietary data.