Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Spycam Detection in Workplace Expectation of Privacy Areas

Conduct professional forensic investigations to detect covert spy cameras - Captions in Spanish | Korean | English
4.6
4.6/5
(97 reviews)
259 students
Created by Kevin D. Murray

9.7

CourseMarks Score®

9.3

Freshness

10.0

Feedback

9.0

Content

Platform: Udemy
Price: $11.99
Video: 57m
Language: English
Next start: On Demand

Top Investigation courses:

Detailed Analysis

CourseMarks Score®

9.7 / 10

CourseMarks Score® helps students to find the best classes. We aggregate 18 factors, including freshness, student feedback and content diversity.

Freshness Score

9.3 / 10
This course was last updated on 7/2020.

Course content can become outdated quite quickly. After analysing 71,530 courses, we found that the highest rated courses are updated every year. If a course has not been updated for more than 2 years, you should carefully evaluate the course before enrolling.

Student Feedback

10.0 / 10
We analyzed factors such as the rating (4.6/5) and the ratio between the number of reviews and the number of students, which is a great signal of student commitment.

New courses are hard to evaluate because there are no or just a few student ratings, but Student Feedback Score helps you find great courses even with fewer reviews.

Content Score

9.0 / 10
Video Score: 7.7 / 10
The course includes 57m video content. Courses with more videos usually have a higher average rating. We have found that the sweet spot is 16 hours of video, which is long enough to teach a topic comprehensively, but not overwhelming. Courses over 16 hours of video gets the maximum score.
Detail Score: 9.8 / 10

The top online course contains a detailed description of the course, what you will learn and also a detailed description about the instructor.

Extra Content Score: 9.5 / 10

Tests, exercises, articles and other resources help students to better understand and deepen their understanding of the topic.

This course contains:

0 article.
4 resources.
0 exercise.
0 test.

Table of contents

Description

SPYCAM DETECTION teaches the basic investigative skills necessary to identify and detect covert spy cameras. It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. By taking a pro-active approach to “the video voyeur in the workplace problem” the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.
In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.
Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.
SPYCAM DETECTION is primarily useful for:
•security managers,•facilities managers,•store managers,•security officers,•private investigators,•landlords,•real estate management companies,•targets of activist groups,•and businesses which invite the public into their locations.~
Recognizing and detecting spy cameras is also a valuable skill for:
•law enforcement personnel,•security management students,•and the general public wishing to protect themselves against video voyeurism.~
The course is structured to give the student:
•a full understanding of the video voyeur problem,•a written policy which provides deterrence, leverage, and shows due diligence in court,•an understanding of the different types of spy cameras and how to identify them,•instruction on how to plan and execute a proper inspection,•and instruction on what to do if a camera is found and how to handle the evidence.The course takes about an hour to complete.
Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.
Although SPYCAM DETECTION focuses heavily on protecting workplace environments there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases.

Requirements

Requirements No previous knowledge is required to complete this course. Spy camera inspections do not require special tools. The basic items the student will eventually need include: an inspection log book or inspection log worksheet (provided in the course text); a flashlight and camera (most smartphones will do); simple hand tools if an item needs to be opened (screwdrivers, etc.). In anticipation of finding a spycam in the workplace, the student will want to have an evidence collection kit (latex gloves and evidence collection bags) available before the inspection begins.If inspecting a large number of areas, some technical instrumentation can speed the search process. Sources for all these items are listed in the course text.

You will learn

✓ Conduct professional level inspections: for spy cameras secreted in the workplace; hotel rooms; and other areas where there is an expectation of privacy.
✓ Corporations who train their security and facility personnel to conduct in-house security inspections benefit by reducing their risk of an incident, and the inevitable damaging publicity. Implementing a written recording policy (template provided) and documented (log provided) inspection schedule shows due diligence; very helpful for defending against lawsuits. Knowing the company actively takes steps to assure privacy is also morale boosting for employees.
✓ Security service providers who train their security officers and investigators gain a competitive advantage by providing this value-added service.
✓ Benefits to private investigators include: certification of professional training and adding another revenue stream to their menu of services.
✓ Students can also use this knowledge personally to protect themselves and their families during their travels.

This course is for

• SPYCAM DETECTION is primarily useful for: security managers, facilities managers, store managers, security officers, private investigators, landlords, real estate management companies, targets of activist groups, and businesses which invite the public into their locations.
• Recognizing and detecting spy cameras is also a valuable skill for: law enforcement personnel, security management students, and the general public wishing to protect themselves against video voyeurism.
• This course was not designed to be useful for people interested in learning how to plant spy cameras, or build spy camera enclosures.

How much does the Spycam Detection in Workplace Expectation of Privacy Areas course cost? Is it worth it?

The course costs $11.99. And currently there is a 60% discount on the original price of the course, which was $29.99. So you save $18 if you enroll the course now.

Does the Spycam Detection in Workplace Expectation of Privacy Areas course have a money back guarantee or refund policy?

YES, Spycam Detection in Workplace Expectation of Privacy Areas has a 30-day money back guarantee. The 30-day refund policy is designed to allow students to study without risk.

Are there any SCHOLARSHIPS for this course?

Currently we could not find a scholarship for the Spycam Detection in Workplace Expectation of Privacy Areas course, but there is a $18 discount from the original price ($29.99). So the current price is just $11.99.

Who is the instructor? Is Kevin D. Murray a SCAM or a TRUSTED instructor?

Kevin D. Murray has created 1 courses that got 97 reviews which are generally positive. Kevin D. Murray has taught 259 students and received a 4.6 average review out of 97 reviews. Depending on the information available, Kevin D. Murray is a TRUSTED instructor.

More info about the instructor, Kevin D. Murray

Technical Surveillance Countermeasures Specialist
Kevin D. Murray, is the Director of Murray Associates, an independent counterespionage consulting firm founded in 1978. He and his team conduct Technical Surveillance Countermeasures inspections (aka TSCM, or bug sweeps) for business, government and the at-risk individual. His work is exclusively TSCM oriented, and has taken him to many countries around the world.Murray Associates inspections solve workplace security problems, such as: • business espionage; • illegal eavesdropping, voyeurism and tracking; • information security / intellectual property loss loopholes; • spying at off-site meetings, and compliance with privacy laws.~PREVIOUS EXPERIENCEPinkerton’s Inc.• International – Director of Electronic Countermeasures • New Jersey – Director of Investigations • Investigator – Grades I, II & III~CREATIONSBook – “Is My Cell Phone Bugged? Everything you need to know              to keep your mobile communications secure.” ISBN-13: 9781934572887iPhone App – Kevin’s Security Scrapbook – Spy News from New YorkAndroid App – SpyWarn™ 2.0 – Evaluate your smartphone for spyware infections.SpyWarn™ Anti-Spyware Kit for Smartphones (patent pending) (for clients only)~PROFESSIONAL CERTIFICATIONS & LICENSESMr. Murray holds the following professional certifications:       CISM – Certified Information Security Manager             — Information Systems Audit & Control Association (ISACA)CPP – Certified Protection Professional                   — American Society for Industrial Security (ASIS)                           The American National Standards Institute (ANSI) has accredited the               CISM and            CPP certification programs under ISO/IEC 17024:2003      CFE – Certified Fraud Examiner      — Association of Certified Fraud Examiners (ACFE) MPSC – Mobile Phone Seizure Certification      — BK ForensicsLicensed Private Investigator – NJAmateur Radio Operator – Extra Class~INDUSTRY ORGANIZATIONSMr. Murray is involved with these security industry organizations:IAPSC – International Association of Professional Security Consultants   Periodic Board &               Ethics Committee member. Meritorious Life MembershipHTCIA – High Technology Crime Investigation AssociationISACA – Information Systems Audit & Control Association (CISM)ASIS – American Society for Industrial Security (CPP)ACFE – Association of Certified Fraud Examiners (CFE)InfraGard (An FBI partnership with private sector security professionals.)ERII – Espionage Research Institute International~PRIOR TEACHING EXPERIENCE • John Jay College of Criminal Justice, New York, NY, Course author & instructor:      Electronic Eavesdropping & Business Espionage Countermeasures • ASIS – Chapter Meetings – multiple presentations • National Association of Legal Investigators – TSCM seminar • New Jersey Licensed Private Investigator’s Association – multiple presentations • Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum      Analysis     for TSCM and multiple other presentations • FBI / InfraGard – Three TSCM Seminars • United Nations – New York Landmark’s Security Task Force – TSCM seminar • World Investigator Conference – TSCM seminar • Joint Certified Fraud Examiners / ASIS – TSCM & Cell Phone Espionage seminar~PUBLISHEDKevin D. Murray is the author of textbook chapters, magazine articles, and his own book.Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don’t Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)Guindon, Kathleen M. A.M. Best’s Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage.” (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security.” (ISBN 087912198X)Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection.” (ISBN 1592370675)Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation – First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)Reid, Robert N. Facility Manager’s Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone’s Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology.” (ISBN 067173492X)Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)Security Management magazine articles. The journal of the American Society for Industrial Security.Sennewald, Charles A. CPP. Security Consulting – Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod.” (ISBN 0750677945)Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection.” (ISBN 0930868048)Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News… and many more.Technical Advisor to:HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder… and others.

9.7

CourseMarks Score®

9.3

Freshness

10.0

Feedback

9.0

Content

Platform: Udemy
Price: $11.99
Video: 57m
Language: English
Next start: On Demand

Students are also interested in

Other courses by ​Kevin D. Murray

Get this widget on your website (for course creators):

Spycam Detection in Workplace Expectation of Privacy Areas rating
Copy this code and paste it to your website:
<a href="https://coursemarks.com/course/spycam-detection-in-workplace-expectation-of-privacy-areas/" target="_blank" title="Spycam Detection in Workplace Expectation of Privacy Areas on Coursemarks.com"><img border="0" src="https://coursemarks.com/widget/97.svg" width="200px" alt="Spycam Detection in Workplace Expectation of Privacy Areas rating"/></a>