Practice Exam
Certified Protection Professional (CPP)

Certified Protection Professional (CPP)

0.0 (140 ratings)
1,200 Learners
Take Free Test

Certified Protection Professional (CPP) 

 

The Certified Protection Professional (CPP) is a globally recognized credential awarded by ASIS International. It validates an individual's knowledge and experience in all aspects of security management. This prestigious certification demonstrates your competency in a wide range of areas, making you a highly sought-after professional in the security field.

 

Who should consider this certification?

  • Security managers: Elevate your career prospects and validate your existing knowledge and skills.
  • Security professionals seeking career advancement: Demonstrate your commitment to professional development and stand out in the job market.
  • Individuals looking to transition into security management: Gain the necessary knowledge and credibility to enter a successful career path.

 

Key Roles and Responsibilities:

  • Develop and implement comprehensive security programs: Design, implement, and manage security programs aligning with organizational needs, risk assessments, and compliance requirements.
  • Lead and manage security teams: Provide effective leadership, training, and guidance to security personnel.
  • Assess and mitigate security risks: Identify, analyze, and implement strategies to mitigate security risks across various domains like physical security, information security, and business continuity.
  • Develop and manage security budgets: Plan, allocate, and manage security resources efficiently within budgetary restraints.
  • Conduct security audits and investigations: Perform security audits, incident investigations, and implement corrective actions.
  • Communicate effectively with stakeholders: Clearly communicate security risks, policies, and procedures to various stakeholders across different levels.

 

Eligibility Requirements:

To be eligible for the CPP certification, you must meet the following criteria:

  • Possess a minimum of five to seven years of experience in security management, with at least three years in a responsible charge position.
  • Complete a mandatory Continuing Professional Education (CPE) program.
  • Adhere to the ASIS International Code of Professional Conduct.

 

Exam Details:

  • Format: Computer-based exam with multiple-choice questions
  • Time Limit: 3 hours
  • Languages: English, Spanish, Portuguese
  • Passing Score: 70%

 

Course Outline

 

DOMAIN ONE: Security Principles and Practices (22%)

 

TASK 1: Plan, develop, implement, and manage the organization’s security program to protect the organization’s assets.

Knowledge of

  1. Principles of planning, organization, and control
  2. Security theory, techniques, and processes (e.g., artificial intelligence, IoT)
  3. Security industry standards (e.g., ASIS/ISO)
  4. Continuous assessment and improvement processes
  5. Cross-functional organizational collaboration
  6. Enterprise Security Risk Management (ESRM)

 

TASK 2: Develop, manage, or conduct the security risk assessment process.

Knowledge of

  1. Quantitative and qualitative risk assessments
  2. Vulnerability, threat, and impact assessments
  3. Potential security threats (e.g., "all hazards," criminal activity, terrorism, consequential)


TASK 3: Evaluate methods to improve the security program on a continuous basis through the use of auditing, review, and assessment.

Knowledge of

  1. Cost-benefit analysis methods
  2. Risk management strategies (e.g., avoid, assume/accept, transfer, spread)
  3. Risk mitigation techniques (e.g., technology, personnel, process, facility design)
  4. Data collection and trend analysis techniques

 

TASK 4: Develop and manage professional relationships with external organizations to achieve security objectives.

Knowledge of

  1. Roles and responsibilities of external organization and agencies
  2. Methods for creating effective working relationships
  3. Techniques and protocols of liaison
  4. Local and national public/private partnerships

 

TASK 5: Develop, implement, and manage workforce security awareness programs to achieve organizational  goals and objectives.

Knowledge of

  1. Training methodologies
  2. Communication strategies, techniques, and methods
  3. Awareness program objectives and program metrics
  4. Elements of a security awareness program (e.g., roles and responsibilities, physical risk, communication risk, privacy)

 

DOMAIN TWO Business Principles and Practices (15%)

 

TASK 1: Develop and manage budgets and financial controls to achieve fiscal responsibility.

Knowledge of

  1. Principles of management accounting, control, audits, and fiduciary responsibility
  2. Business finance principles and financial reporting
  3. Return on Investment (ROI) analysis
  4. The lifecycle for budget planning purposes

 

TASK 2: Develop, implement, and manage policies, procedures, plans, and directives to achieve organizational objectives.

Knowledge of

  1. Principles and techniques of policy/procedures development
  2. Communication strategies, methods, and techniques
  3. Training strategies, methods, and techniques
  4. Cross-functional collaboration
  5. Relevant laws and regulations

 

TASK 3: Develop procedures/techniques to measure and improve organizational productivity.

Knowledge of

  1. Techniques for quantifying productivity/metrics/key performance indicators (KPI)
  2. Data analysis techniques and cost-benefit analysis
  3. Improvement techniques (e.g., pilot/beta testing programs, education, training)

 

TASK 4: Develop, implement, and manage security staffing processes and personnel development programs in order to achieve organizational objectives.

Knowledge of

  1. Interview techniques for staffing
  2. Candidate selection and evaluation techniques
  3. Job analysis processes
  4. Pre-employment background screening
  5. Principles of performance evaluations, 360 reviews, and coaching/mentoring
  6. Interpersonal and feedback techniques
  7. Training strategies, methodologies, and resources
  8. Retention strategies and methodologies
  9. Talent management and succession planning

 

TASK 5: Monitor and ensure an acceptable ethical climate in accordance with regulatory requirements and organizational culture.

Knowledge of

  1. Governance standards
  2. Guidelines for individual and corporate behavior
  3. Generally accepted ethical principles
  4. Confidential information protection techniques and methods
  5. Legal and regulatory compliance

 

TASK 6: Develop performance requirements and contractual terms for security vendors/suppliers.

Knowledge of

  1. Key concepts in the preparation of requests for proposals and bid reviews/evaluations
  2. Service Level Agreement (SLA) terms, metrics, and reporting
  3. Contract law, indemnification, and liability insurance principles
  4. Monitoring processes to ensure that organizational needs and contractual requirements are being met

 

DOMAIN THREE: Investigations (9%)

 

TASK 1: Identify, develop, implement, and manage investigative operations.

Knowledge of

  1. Principles and techniques of policy and procedure development
  2. Organizational objectives and cross-functional collaboration
  3. Types of investigations (e.g., incident, misconduct, compliance, due diligence)
  4. Internal and external resources to support investigative functions
  5. Report preparation for internal/external purposes and legal proceedings
  6. Laws pertaining to developing and managing investigative programs

 

TASK 2: Manage or conduct the collection, preservation, and disposition of evidence to support investigative actions.

Knowledge of

  1. Protection/preservation of crime scene
  2. Evidence collection techniques
  3. Requirements of chain of custody
  4. Methods for preservation/disposition of evidence
  5. Laws pertaining to the collection, preservation, and disposition of evidence

 

TASK 3: Manage or conduct surveillance processes.

Knowledge of

  1. Surveillance and counter-surveillance techniques
  2. Technology/equipment and personnel to conduct surveillance (e.g., Unmanned Aircraft Systems (UAS), robotics)
  3. Laws pertaining to managing surveillance processes

 

TASK 4: Manage and conduct investigations requiring specialized tools, techniques, and resources.

Knowledge of

  1. Financial and fraud related crimes
  2. Intellectual property and espionage crimes
  3. Crimes against property (e.g., arson, vandalism, theft, sabotage)
  4. Cybercrimes (e.g., distributed denial of service (DDoS), phishing, ransomware)
  5. Crimes against persons (e.g., workplace violence, human trafficking, harassment)

 

TASK 5: Manage or conduct investigative interviews.

Knowledge of

  1. Interview and interrogation techniques
  2. Techniques for detecting deception
  3. Non-verbal communication and cultural considerations
  4. Rights of interviewees
  5. Required components of written statements
  6. Legal considerations pertaining to managing investigative interviews

 

TASK 6: Provide support to legal counsel in actual or potential criminal or civil proceedings.

Knowledge of

  1. Statutes, regulations, and case law governing or affecting the security industry and the protection of people, property, and information
  2. Criminal law and procedures
  3. Civil law and procedures
  4. Employment law (e.g., confidential information, wrongful termination, discrimination, harassment)

 

DOMAIN FOUR: Personnel Security (11%)

 

TASK 1: Develop, implement, and manage background investigation processes for hiring, promotion, and retention of individuals.

Knowledge of

  1. Background investigations and personnel screening techniques
  2. Quality and types of information sources (e.g., open source, social media, government databases, credit reports)
  3. Screening policies and guidelines
  4. Laws and regulations pertaining to personnel screening

 

TASK 2: Develop, implement, manage, and evaluate policies and procedures to protect individuals in the workplace against human threats (e.g., harassment, violence, active assailant).

Knowledge of

  1. Protection techniques and methods
  2. Threat assessment
  3. Prevention, intervention, and response tactics
  4. Educational and awareness program design and implementation
  5. Travel security (e.g., flight planning, global threats, consulate services, route selection, contingency planning)
  6. Industry/labor regulations and applicable laws
  7. Organizational efforts to reduce employee substance abuse

 

TASK 3: Develop, implement, and manage executive protection programs.

Knowledge of

  1. Executive protection techniques and methods
  2. Threat analysis
  3. Liaison and resource management techniques
  4. Selection, costs, and effectiveness of proprietary and contract executive protection personnel

 

DOMAIN FIVE Physical Security (16%)

TASK 1: Conduct facility surveys to determine the current status of physical security.

Knowledge of

  1. Security protection equipment and personnel (e.g., Unmanned Aircraft Systems (UAS), robotics)
  2. Survey techniques(e.g., document review, checklist, onsite visit, stakeholder interviews)
  3. Building plans, drawings, and schematics
  4. Risk assessment techniques
  5. Gap analysis

 

TASK 2: Select, implement, and manage physical security strategies to mitigate security risks.

Knowledge of

  1. Fundamentals of security system design
  2. Countermeasures(e.g., policies, technology, procedures)
  3. Budgetary projection development process (e.g., technology, hardware, labor)
  4. Bid package development and evaluation process
  5. Vendor qualification and selection process
  6. Testing procedures and final acceptance (e.g., commissioning, factory acceptance test)
  7. Project management techniques
  8. Cost-benefit analysis techniques
  9. Labor-technology relationship

 

TASK 3: Assess the effectiveness of physical security measures by testing and monitoring.

Knowledge of

  1. Protection personnel, hardware, technology, and processes
  2. Audit and testing techniques (e.g., operation testing)
  3. Predictive, preventive, and corrective maintenance

 

DOMAIN SIX: Information Security (14%)

TASK 1: Conduct surveys to evaluate current status of information security programs.

Knowledge of

  1. Elements of an information security program, including physical security; procedural security; information systems security; employee awareness; and information destruction and recovery capabilities.
  2. Survey techniques
  3. Quantitative and qualitative risk assessments
  4. Risk mitigation strategies (e.g., technology, personnel, process, facility design)
  5. Cost-benefit analysis methods
  6. Protection technology, security threats equipment, and procedures (e.g., interoperability)
  7. Information security threats
  8. Integration of facility and system plans, drawings, and schematics

 

TASK 2: Develop policies and procedures to ensure information is evaluated and protected against vulnerabilities and threats.

Knowledge of

  1. Principles of information security management
  2. Information security theory and terminology
  3. Information security industry standards (e.g., ISO, PII, PCI)
  4. Laws and regulations regarding records management including collection, retention, legal holds, and disposition practices (e.g., General Data Protection Regulation (GDPR), biometric information)
  5. Practices to protect proprietary information and intellectual property
  6. Information protection measures including security processes, physical access systems, and data management

 

TASK 3: Implement and manage an integrated information security program

Knowledge of

  1. Information security including confidentiality, integrity, and availability
  2. Information security systems methodology
  3. Authentication techniques (e.g., multi-factor, biometrics)
  4. Continuous evaluation and improvement programs
  5. Ethical hacking and penetration testing techniques and practices
  6. Encryption and data masking techniques (e.g., cryptography)
  7. Systems integration techniques (e.g., interoperability, licensing, networking)
  8. Cost-benefit analysis methodology
  9. Project management techniques
  10. Budget review process (e.g., system development lifecycle)
  11. Vendor evaluation and selection process
  12. Final acceptance and testing procedures
  13. Protection technology and forensic investigations
  14. Training and awareness programs to mitigate threats and vulnerabilities (e.g., phishing, social engineering, ransomware, insider threats)

 

DOMAIN SEVEN: Crisis Management (13%)

TASK 1: Assess and prioritize threats to mitigate potential consequences of incidents.

Knowledge of

  1. Threats by type, likelihood of occurrence, and consequences
  2. “All hazards” approach to assessing threats (e.g., natural disaster, chemical, biological, radiological, nuclear, explosives (CBRNE))
  3. Cost-benefit analysis
  4. Mitigation strategies
  5. Risk management and business impact analysis methodology
  6. Business continuity standards (e.g., ASIS ORM.1, ISO 22301)

 

TASK 2: Prepare and plan how the organization respond to incidents.

Knowledge of

  1. Resource management techniques (e.g., mutual aid agreements, MOUs)
  2. Emergency planning techniques
  3. Triage and damage assessment techniques
  4. Communication techniques and notification protocols (e.g. interoperability, common operating terms, emergency notification system)
  5. Training and exercise techniques (e.g., tabletop and full-scale exercises)
  6. Emergency operations center (EOC) concepts and design
  7. Primary roles and duties in an Incident Command Structure (ICS) (e.g., information dissemination, liaison, Public Information Officer (PIO))

 

TASK 3: Respond to and manage an incident.

Knowledge of

  1. Resource allocation
  2. Emergency Operations Centre (EOC) management principles and practices
  3. Incident management systems and protocols

 

TASK 4: Manage incident recovery and resumption of operations.

Knowledge of

  1. Resource management
  2. Short- and long-term recovery strategies
  3. Recovery assistance resources (e.g., mutual aid, employee assistance program (EAP), counseling)
  4. Mitigation opportunities in the recovery process

Key Features

Accredited Certificate

Industry-endorsed certificates to strengthen your career profile.

Instant Access

Start learning immediately with digital materials, no delays.

Unlimited Retakes

Practice until you’re fully confident, at no additional charge.

Self-Paced Learning

Study anytime, anywhere, on laptop, tablet, or smartphone.

Expert-Curated Content

Courses and practice exams developed by qualified professionals.

24/7 Support

Support available round the clock whenever you need help.

Interactive & Engaging

Easy-to-follow content with practice exams and assessments.

Over 1.5M+ Learners Worldwide

Join a global community of professionals advancing their skills.

Certified Protection Professional (CPP) FAQs

1. Log in to your ASIS account. 2. In the upper right side of the screen, click on My Information. 3. From profile, click on My Certifications. 4. To apply for a certification click Apply Now. 5. Confirm your choice.

Domain 1: SECURITY PRINCIPLES AND PRACTICES (21%) Domain 2: BUSINESS PRINCIPLES AND PRACTICES (13%) Domain 3: INVESTIGATIONS (10%) Domain 4: PERSONNEL SECURITY (12%) Domain 5: PHYSICAL SECURITY (25%) Domain 6: INFORMATION SECURITY (9%) Domain 7: CRISIS MANAGEMENT (10%)

The certification is valid for a period of 3 years.

You have up to two years from the date you receive your Authorization to Test letter to take the exam. Once your two years have expired, you must reapply and pay all applicable fees.

Yes we offer nearly 50% discount for the order more than 10 products at a time. You can reach the testprep training Helpdesk for more details. The member of support staff will respond as soon as possible.

Candidates for the CPP examination must first satisfy the following requirements: • Nine (9) years of security experience, at least three (3) years of which shall have been in responsible charge of a security function; OR • Earned Bachelor's Degree or higher from an accredited institution of higher education and have seven (7) years of security experience, at least three (3) years of which shall have been in responsible charge of a security function.

1. Log into your ASIS profile 2. Go to your open certification application and click view details. 3. You may then click the RETAKE button and complete the payment process to pay the Re-take fee.

Yes, we offer a 100% unconditional money back guarantee. In case you are not able to clear the exam for then you can request for the full refund. Please note that we only refund the cost of product purchased from Testprep Training and not the Certified Protection Professional (CPP) Exam cost.

After the completion of your exam, the points you earned on each question are totaled and then compared with the cut score to determine whether the result is pass or fail.

Those taking the exam at a computer-based testing center will get preliminary results at the test center. You will receive your official results from ASIS approximately three weeks after you take the exam.

Yes, but you must submit a separate application for each exam and pay the applicable application/exam fees

Yes testprep training offers free practice tests for Certified Protection Professional (CPP) Exam which can be used before the final purchase for complete test.

TestprepTraining provides unique sets of questions that will help you check your skills and knowledge in performing data analysis on Excel. These practice questions will help you increase your knowledge for better preparation of exam.

Yes our experts frequently blog about the tips and tricks for exam preparation.

Candidates may take the exam up to three times in their two-year eligibility period. In addition, there must be 90 days between each testing date. Those who fail the exam three times may reapply to take exam after their eligibility period ends.

The Certified Protection Professional (CPP) is considered the “gold standard” certification for security management professionals and demonstrates your knowledge and competency in seven key domains of security. The certification is globally recognized as the standard of excellence for security management professionals.

Yes, Testprep Training offers email support for any certification related query while you are preparing for the exam using our practice exams. Your query will be handled by experts in due course.

Once purchased, the practice exams can be access for the lifetime.

The exam consists of multiple choice questions.

There will be 225 questions which have to be completed in 4 hours in this exam.

The exam is available in English language.

No. Although we highly recommend that all security professionals join ASIS, membership is not required for certification. There are discounted fees for applying for the exam and to purchase ASIS study materials.

You will get 4 hours to do 225 questions in this exam.