Diploma in Surveillance and Access Control
Why this certificate program?
The Diploma in Surveillance and Access Control
This program will provide you with the necessary tools and knowledge to manage security in diverse environments. You will learn about physical security protocols, the operation of electronic access control systems, and risk identification and management techniques. This program will prepare you to lead security teams and ensure the protection of people and facilities.
Differential Advantages
- Practical Approach: Real-world case studies and simulations to apply acquired knowledge.
- Cutting-Edge Technologies: Familiarization with the latest access control and video surveillance systems.
- Leadership Skills: Development of competencies for managing security teams.
- Legal Framework: Knowledge of current legislation on private security.
- Professional Certification: Recognition of your skills and knowledge in the sector.
- Modality: Online
- Level: Diplomado
- Hours: 800 H
- Start date: 13-06-2026
Availability: 1 in stock
Who is it aimed at?
- Private and public security personnel seeking to professionalize their skills in access control, risk management, and emergency response.
- Security supervisors and managers who need to optimize the efficiency of their teams, implement advanced security protocols, and manage surveillance technology.
- Residential and commercial property managers interested in strengthening the security of their facilities and protecting their residents/users.
- Security managers at events and shows who need to guarantee the protection of attendees and staff, managing crowds and preventing incidents.
- Students and professionals in the security field seeking solid professional development with theoretical and practical knowledge in surveillance and access control.
Access.
Flexibility and Practical Application
Designed for active professionals: flexible online format, real-world case studies, and tools applicable in the workplace.
Objectives and competencies

Manage and prevent risk situations at access points:
Implement security and emergency response protocols, including threat identification and neutralization, crowd control, and efficient evacuation, coordinating with authorities and security personnel.

Apply security and emergency protocols at access points:
“Identify and control authorized access, manage incidents, and communicate effectively with security personnel and authorities.”

Monitor and record the flow of people and vehicles:
“Establish strategic checkpoints, use efficient identification and communication systems, and accurately document movements to ensure safety and regulatory compliance.”

Operate and maintain access control systems:
“Diligently, recording incidents, managing users, and ensuring compliance with internal regulations.”

Address and resolve security incidents at access points:
Manage identity verification, authentication and authorization, applying response protocols to unauthorized access attempts and detected vulnerabilities.

Collaborate effectively with security forces and other emergency services:
“Report incidents/emergencies following established protocols and providing accurate and concise information to the competent authorities (Maritime Rescue, Coast Guard, etc.).”
Curriculum - Modules
- Comprehensive Maritime Incident Management: protocols, roles, and chain of command for coordinated response
- Operational Planning and Execution: briefing, routes, weather windows, and go/no-go criteria
- Rapid Risk Assessment: criticality matrix, scene control, and decision-making under pressure
- Operational Communication: VHF/GMDSS, standardized reports, and inter-agency liaison
- Tactical Mobility and Safe Boarding: RHIB maneuvers, approach, mooring, and recovery
- Equipment and Technologies: PPE, signaling, satellite tracking, and field data logging
- Immediate Care of the Affected: primary assessment, hypothermia, trauma, and stabilization for evacuation
- Adverse Environmental Conditions: swell, Visibility, flows, and operational mitigation
Simulation and training: critical scenarios, use of VR/AR, and exercises with performance metrics
Documentation and continuous improvement: lessons learned, indicators (MTTA/MTTR), and SOP updates
- Introduction to Proactive Security: Key Concepts and Principles
- Legal and Regulatory Framework: Laws, regulations, and standards applicable to surveillance and access control.
- Risk Analysis: Identification, assessment, and prioritization of threats and vulnerabilities.
- Security Planning: Design and implementation of proactive security strategies.
- Surveillance Technology: CCTV systems, alarms, sensors, and other tools.
- Physical Access Control: Barriers, doors, turnstiles, and identification systems.
- Logical Access Control: Authentication, authorization, and identity management.
- Emergency Procedures: Security incident response plans.
- Communication and coordination: Collaboration with other security teams and authorities.
- Continuous improvement: Performance evaluation and adaptation to new threats.
‘
- Fundamentals of Comprehensive Security: Concept, Scope, and Principles
- Risk Analysis: Identification, Assessment, and Prioritization
- Legal and Regulatory Framework: Current Legislation on Public and Private Security
- Surveillance and Protection: Observation, Detection, and Deterrence Techniques
- Access Control: Systems, Protocols, and Visitor Management
- Physical Security: Perimeter Barriers, Lighting, and Alarm Systems
- Electronic Security: CCTV, Sensors, Biometric Control, and Video Analytics
- Emergency Response: Contingency Plans, Evacuation, and First Aid
- Communication and Coordination: Internal and External Communication Protocols
- Crisis Management: Handling High-Risk Situations
and post-event recovery
‘
- Introduction to Proactive Security: Key Concepts and Benefits
- Legal and Regulatory Framework: Laws and regulations applicable to surveillance and access control
- Risk and Vulnerability Analysis: Identification and assessment of potential threats
- Security Planning: Design and implementation of proactive security strategies
- Technology Applied to Security: Video surveillance systems, access control, biometrics, etc.
- Access Control Procedures: Identification, registration, and authorization of people and vehicles
- Security Incident Management: Protocols for action in emergency situations
- Communication and Coordination: Collaboration with law enforcement and other entities organizations.
- First aid and emergency response: Basic knowledge for acting in critical situations.
- Professional ethics and data protection: Responsibility and confidentiality in handling information.
‘
- Introduction to Access Security: Threats and Vulnerabilities
- Legal and Regulatory Frameworks: Security Laws, Regulations, and Compliance Standards
- Risk Analysis: Identification, Assessment, and Prioritization of Access Risks
- Physical Access Protocols: Access Control, Identification, and Authentication
- Access Control Technologies: Proximity Cards, Biometrics, Facial Recognition
- Video Surveillance Systems: Cameras, Recording, Video Analytics
- Perimeter Security: Fences, Lighting, Motion Sensors
- Visitor Management: Registration, Identification, and Escort of Visitors
- Incident Response Security: Emergency, evacuation, and containment procedures.
- Audit and continuous improvement of access security.
‘
- System Architecture and Components: Structural design, materials, and subsystems (mechanical, electrical, electronic, and fluid) with selection and assembly criteria for marine environments
- Fundamentals and Principles of Operation: Physical and engineering foundations (thermodynamics, fluid mechanics, electricity, control, and materials) that explain performance and operating limits
- Safety and Environmental (SHE): Risk analysis, PPE, LOTO, hazardous atmospheres, spill and waste management, and emergency response plans
- Applicable Regulations and Standards: IMO/ISO/IEC requirements and local regulations;
- Conformance criteria, certification, and best practices for operation and maintenance
- Inspection, testing, and diagnostics: Visual/dimensional inspection, functional testing, data analysis, and predictive techniques (vibration, thermography, fluid analysis) to identify root causes
- Preventive and predictive maintenance: Hourly/cycle/seasonal plans, lubrication, adjustments, calibrations, consumable replacement, post-service verification, and operational reliability
- Instrumentation, tools, and metrology: Measuring and testing equipment, diagnostic software, calibration and traceability; selection criteria, safe use, and storage
- Onboard integration and interfaces: Mechanical, electrical, fluid, and data compatibility; Sealing and watertightness, EMC/EMI, corrosion protection, and interoperability testing.
Quality, acceptance testing, and commissioning: process and materials control, FAT/SAT, bench and sea trials, go/no-go criteria, and evidence documentation.
Technical documentation and integrated practice: logs, checklists, reports, and a complete case study (safety → diagnosis → intervention → verification → report) applicable to any system.
- Introduction to Access Security: Key Concepts and Legal Framework
- Physical Access Control: Barriers, Turnstiles, Doors, and Airlocks
- Identification and Authentication: Cards, Biometrics, PINs, and Mobile Credentials
- Video Surveillance Systems: Cameras, Recording, Analysis, and Event Management
- Alarm Systems: Intruder Detection, Sensors, and Response
- Visitor Management: Procedures, Registration, and Authorization
- Systems Integration: Access Control, CCTV, Alarms, and Management Systems
- Access Cybersecurity: Data, Network, and System Protection
- Incident Response: Emergency Procedures, Evacuation, and Management Crisis.
- Audit and compliance: Regulations, standards, and best practices.
‘
Career opportunities
- Security Guard in Private Security Companies: Access control, security patrols, intrusion detection, and emergency response.
- Access Controller at Events and Shows: Managing crowd flow, identifying entrances, and preventing incidents.
- Security Personnel in Shopping Centers and Large Retail Stores: Surveillance of facilities, customer service, and theft prevention.
- Concierge or Doorman in Residential Buildings and Offices: Access control, assisting residents and visitors, and incident management.
- Security Assistant in Hospitals and Healthcare Centers: Access control, providing information to patients and their families, and supporting healthcare staff in emergency situations.
- Security Personnel at Public Transportation Stations (Train, Bus, Metro): Surveillance of facilities, access control, and Prevention of vandalism.
- Security Officer in industrial parks and business parks: Surveillance rounds, access control, and response to risk situations.
- Security Escort (with the corresponding authorization): Protection of people and property, and prevention of threats.
“`
Admission requirements

Academic/professional profile:
Degree/Bachelor's degree in Nautical Science/Maritime Transport, Naval/Marine Engineering, or a related field; or proven professional experience in bridge/operations.

Language proficiency:
Recommended functional maritime English (SMCP) for simulations and technical materials.

Documentation:
Updated resume, copy of degree or seaman's book, ID card/passport, letter of motivation.

Technical requirements (for online):
Equipment with camera/microphone, stable connection, ≥ 24” monitor recommended for ECDIS/Radar-ARPA.
Admission process and dates

1. Online
application
(form + documents).

2. Academic review and interview
(profile/objectives/schedule compatibility).

3. Admission decision
(+ scholarship proposal if applicable).

4. Reservation of place
(deposit) and registration.

5. Induction
(access to campus, calendars, simulator guides).
Scholarships and grants
- Surveillance Strategies: Master advanced techniques for facility protection and incident prevention.
- Access Control: Implement and manage efficient and secure access control systems, adapted to different environments.
- Legislation and Regulations: Understand the current legal framework for private security and its implications for access control.
- Risk Management: Identify, assess, and mitigate potential risks at access points, ensuring comprehensive security.
- Applied Technology: Use cutting-edge technological tools to optimize surveillance and access control.
Testimonials
This diploma program exceeded my expectations. I gained practical and theoretical knowledge, from the operation of security equipment to emergency management, which allowed me to be promoted to Security Supervisor at my company. The access control training, in particular, proved fundamental in improving the security of our facilities and optimizing our protocols.
The Diploma in Port Security exceeded my expectations. I gained in-depth and practical knowledge of international regulations, risk management, and best practices in security, which enabled me to lead the implementation of a new access control system at my terminal, improving the efficiency and security of our operations.
“The Diploma in Surveillance and Access Control provided me with the tools and knowledge necessary to advance to Security Supervisor. I mastered new control technologies, incident management, and effective communication, which increased my efficiency and the security of the facilities under my responsibility.”
This diploma program exceeded my expectations. I gained practical and theoretical knowledge, from managing risk situations and providing first aid to access control using advanced technology. The training allowed me to obtain a certification that helped me secure a position as a security supervisor at a major residential complex, where I apply the skills I learned every day.
Frequently asked questions
Protecting people, property and information by controlling access to facilities and restricted areas.
Yes. The itinerary includes ECDIS/Radar-ARPA/BRM with harbor, ocean, fog, storm, and SAR scenarios.
Online with live sessions; hybrid option for simulator/practical placements through agreements.
Security guard, access controller, security officer.
Recommended functional SMCP. We offer support materials for standard phraseology.
Yes, with a relevant degree or experience in maritime/port operations. The admissions interview will confirm suitability.
Optional (3–6 months) through Companies & Collaborations and the Alumni Network.
Simulator practice (rubrics), defeat plans, SOPs, checklists, micro-tests and applied TFM.
A degree from Navalis Magna University + operational portfolio (tracks, SOPs, reports and KPIs) useful for audits and employment.
- Introduction to Proactive Security: Concepts, Benefits, and Evolution
- Risk Analysis: Identifying, Assessing, and Prioritizing Threats
- Access Control Models: DAC, MAC, RBAC, and ABAC
- Authentication and Authorization: Methods, Protocols, and Identity Management
- Identity and Access Management (IAM): Lifecycle, Tools, and Best Practices
- Access Monitoring and Auditing: Logging, Analysis, and Incident Response
- Threat Intelligence: Gathering, Analyzing, and Using it in Proactive Security
- Cloud Security: Security Models, Access Management, and Compliance
- DevSecOps: Integrating Security into the Lifecycle
- Life of Development
- Incident Response: Planning, Detection, Containment, Eradication, and Recovery
‘
Request information
Complete the Application Form.
Attach your CV/degree certificate (if you have it to hand).
Indicate your preferred cohort (January/May/September) and whether you would like the hybrid option with simulator sessions.
An academic advisor will contact you within 24–48 hours to guide you through the admission process, scholarships, and compatibility with your professional schedule.
Faculty
Eng. Tomás Riera
Full Professor
Eng. Tomás Riera
Full Professor
Eng. Sofía Marquina
Full Professor
Eng. Sofía Marquina
Full Professor
Eng. Javier Bañuls
Full Professor
Eng. Javier Bañuls
Full Professor
Dr. Nuria Llobregat
Full Professor
Dr. Nuria Llobregat
Full Professor
Dr. Pau Ferrer
Full Professor
Dr. Pau Ferrer
Full Professor
Cap. Javier Abaroa (MCA)
Full Professor
Cap. Javier Abaroa (MCA)
Full Professor