PSP Exam Information and Guideline
Physical Security Professional (ASIS PSP) - 2025
Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.
ASIS - PHYSICAL SECURITY PROFESSIONAL (PSP)® EXAM PREPARATION PROGRAMMES
The Physical Security Professional (PSP)® credential is globally recognised as providing demonstrable proof of knowledge and experience in threat assessment and risk analysis; integrated physical security systems; and the appropriate identification, implementation, and ongoing evaluation of security measures. Those who earn the PSP are ASIS board-certified in physical security.
Killexams QAs cover the following PSP contents;
-----------------------------------------
- Develop a physical security assessment plan.
- Key area or critical asset identification
- Risk assessment models and considerations
- inside-outward
- outside-inward
- site-specific risk assessment
- functional approach
- Qualitative and quantitative assessment methods
- Types of resources & guidelines needed for the assessment
- stakeholders
- budget
- equipment
- policies
- standards
- Identify assets to determine their value, critically, and loss impact.
- Definitions and terminology related to:
- assets
- value
- loss impact
- criticality
- The nature and types of assets
- tangible
- intangible
- How to determine value for various types of assets and business operations
- Assess the nature of the threats and hazards so that the risk can be determined.
- The nature, types, severity, and likelihood of threats and hazards
- natural disasters
- cyber
- criminal events
- terrorism
- socio-political
- cultural
- Operating environment
- geography
- socioeconomic environment
- criminal activity
- existing security countermeasures
- security risk level
- Potential impact of external organizations on facility's security program
- competitors
- organizations in immediate proximity
- Other internal and external factors and their impact on the facility's
- legal
- loss of reputation
- economic
- supply chain
- Conduct an assessment to identify and quantify vulnerabilities of the organization.
- Relevant data and methods for collection
- security survey
- interviews
- incident reports
- crime statistics
- personnel issues
- issues experienced by other similar organizations
- Effectiveness of current security technologies/equipment, personnel, and procedures
- Interpretation of building plans, drawings, and schematics
- Applicable standards/regulations/codes and where to find them
- Environmental factors and conditions that impact physical security
- facility location
- architectural barriers
- lighting, entrances
- Perform a risk analysis to develop countermeasures.
- Risk analysis strategies and methods
- Risk management principles
- Analysis and interpretation of collected data
- Threat/hazard and vulnerability identification
- Loss event profile analyses (e.g., consequences)
- Appropriate countermeasures related to specific risks
- Cost benefit analysis
- return on investment (ROI)
- total cost of ownership
- Legal and regulatory considerations related to various countermeasures/security applications
- video surveillance
- privacy issues
- personally identifiable information
- life safety
- Establish security program performance requirements.
- Design constraints
- regulations
- budget
- materials
- system compatibility
- Incorporation of risk analysis results in design
- Relevant security terminology
- punch list
- field test
- Relevant security concepts
- CPTED
- defense-in-depth
- the 4 Ds- deter
- detect
- delay
- deny
- Applicable codes, standards, and guidelines
- Operational requirements
- policies
- procedures
- staffing
- Functional requirements
- system capabilities
- features
- fault tolerance
- Performance requirements
- technical capability
- systems design capacities
- Success metrics
- Determine appropriate physical security countermeasures.
- Structural security measures
- barriers
- lighting
- locks
- blast mitigation
- ballistic protection
- Crime prevention through environmental design (CPTED)
- Electronic security systems
- access control
- video surveillance
- intrusion detection
- Security staffing
- officers
- technicians
- management
- administration
- Personnel, package, and vehicle screening
- Emergency notification systems
- mass notifications
- public address
- two-way intercom
- Principles of data storage and management
- cloud
- on-premise
- redundancy
- retention
- user permissions
- personally identifiable information
- regulatory requirements
- Principles of network infrastructure and physical network security
- token ring
- LAN/WAN
- VPN
- DHCP vs. static
- TCP/IP
- Security audio communications
- radio
- telephone
- intercom
- IP audio
- Systems monitoring and display
- control centers/consoles
- central monitoring station
- Primary and backup power sources
- grid
- battery
- UPS
- generators
- alternative/renewable
- Signal and data transmission methods
- copper
- fiber
- wireless
- Visitor and vendor management policies
- Design physical security systems and project documentation.
- Design phases
- pre-design
- schematic development
- construction
- documentation
- Design elements
- calculations
- drawings
- specifications
- review
- technical data
- Construction specification standards
- Constructions Specifications Institute
- Owner’s equipment standards
- AmericanInstitute of Architects (AIA) MasterSpec
- Systems integration
- Project management concepts
- Scheduling
- Gantt charts
- PERT charts
- milestones
- objectives
- Cost estimation and cost-benefit analysis of design options
- value engineering
- Outline criteria for pre-bid meeting.
- Bid process
- site visits
- RFI
- substitution requests
- pre-bid meeting
- Bid package types
- RFP
- RFQ
- IFB
- sole source
- Bid package components
project timelines
costs
personnel
documentation
scope of work
- Criteria for evaluation of bids
- cost
- experience
- scheduling
- certification
- resources
- Technical compliance criteria
- Ethics in contracting
- Develop procurement plan for goods and services.
- Vendor evaluation and selection
- interviews
- due diligence
- reference checks
- Project management functions and processes
- Procurement process
- Manage implementation of goods and services.
- Installation and inspection techniques
- Systems integration
- Commissioning
- Installation problem resolution
- punch lists
- Systems configuration management
- as-built drawings
- Final acceptance testing criteria
- system acceptance testing
- factory acceptance testing
- End-user training requirements
- Develop requirements for personnel involved in support of the security program.
- Roles, responsibilities, and limitations of security personnel
- proprietary [in-house]
- contract security staff
- Human resource management
- establishing KPIs
- performance review
- improvement processes
- recruiting
- onboarding
- progressive discipline
- Security personnel professional development
- training
- certification
- General, post, and special orders
- Security personnel uniforms and equipment
- Security awareness training and education for non-security personnel
- Monitor and evaluate program throughout the system life cycle.
- Maintenance of systems and hardware
- preventative
- corrective
- upgrades
- calibration
- service agreements
- Warranty types
- manufacturer
- installation
- replacement parts
- extended
- Ongoing system training
- system upgrades
- manufacturer’s certification
- System evaluation and replacement process