Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Next Step: Certified Protection Officer Instructor

By Christopher A. Hertig
September 1, 2007
Certified Protection Officer Instructors help facilitate the delivery of the CPO program in the classroom. This enables large employers to run academy type classes.


As chief security officers and security directors know, solid training starts with solid instructors.

In response to requests by employers to deliver the Certified Protection Officer (CPO) program in a traditional classroom environment, the International Foundation for Protection Officers (IFPO) developed the Certified Protection Officer Instructor (CPOI) process. Originating in 2001, there are now hundreds of CPOIs throughout North America, Europe, Saudi Arabia and the Caribbean.

The program’s growth is impressive when considering the history of other professional certifications for instructors. The latter have either not grown appreciably or have become defunct. Not so with the CPOI. It continues to expand due to the rapidly expanding demand for CPOs by employers of security personnel.

EMPHASIS ON COMMITMENT

CPOIs are veteran instructors who have demonstrated a commitment to excellence. These are individuals who have completed the CPO requirements and have additional experience teaching and in the security industry. They also have undergone some formalized instruction in adult learning/human resource management. They must also have received some type of certification in how to instruct such as first aid, Oleoresin Capsicum Aerosol Training or similar programs.

First and foremost, CPOIs help facilitate the delivery of the CPO program in the classroom. This enables large employers to run academy type classes. Some organizations even provide training academy instruction to external customers as well as their own personnel. Generating revenue while increasing organizational development is an attractive option. This becomes even more so when the academy host can use it as a recruitment tool.

Faculty at secondary schools offering protective services programs can also benefit from earning the designation. So too can those teaching at colleges and universities. The CPOI can be an important step towards tenure and promotion. It can also aid in credentialing faculty where there is a paucity of terminal degrees in security management. This is important for institutions that teach homeland security, security management or administration of justice programs.

Mentoring is another key role of CPOIs. The importance of this cannot be overemphasized. Protection officers, investigators and supervisors all need mentoring throughout their careers. They will engage in formal developmental efforts such as the IFPO’s crime and loss investigation program, state peace officer certification or advanced emergency training of some type. They may also seek professional certification: Many managers completed the CPO process early in their career, then progressed into the certified security supervision and management program, earning a supervision designation. Later on as their career progressed, they attained the CPP through ASIS International. CPOIs can tutor these folks as well as those completing formal in-house instructional programs.

ONE-ON-ONE TRAINING

Of perhaps greater relevance within the realm of security officer training is that a large percentage of that training must be one-on-one. As a single officer or loss prevention agent is hired, he or she receives instruction by a supervisor or manager within the organization. The CPOI can more readily fulfill this function, especially since they are already coordinating the training program.

Such an approach provides a learning specialist, the CPOI, to address a developmental task. It also frees up supervisory personnel so that they can focus on operational issues. Managerial time spent in instruction can be a major drain on an organization’s budget; planning for this expenditure with a specialist may save significant funds.

Additionally, having a “learning consultant” on staff can help to harness the incredible array of distance learning options available. Both commercially provided and proprietary online programs aid in organizational development in a cost-effective manner. They also reduce the time spent on learning by roughly 30 percent. Distance education also helps facilitate scheduling of learning; it makes training possible where it otherwise would not be. A CPOI can aid this process by helping to coordinate it. They can also reinforce it by mentoring, tutoring, giving review classes, for example. A “learning consultant” can make training and development a living, breathing endeavor, which provides significant return-n-investment over time.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec1111 edu inbody 150px

Chris Hertig is a retired college professor who has written and taught about professional development of security personnel, violence management and the history of policing and security for 4 decades. Hertig is a Certified Protection Professional as well as a Certified Protection Officer Instructor. He is an active member of several professional organization including ASIS, IFPO and ILEETA.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Investigation Next Training Goal

    See More
  • Security Officer Training

    Contract Security Training and Development: Examining methods of contract training

    See More
  • security guard training

    Security force development: strategies and tactics

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing