SMI - Training

The CARVER Methodology

SMI - CARVER - Target Analysis and Vulnerability Assessment Methodology
Leo Labaj, Director of Critical Infrastructure Protection talks about CARVER

With over 40 years of government and commercial experience, Mr. Labaj is a veteran of the U.S. Navy, the Air National Guard and the Central Intelligence Agency. He has managed research and development programs and applied science projects for the Department of Defense, the Department of Energy, the Intelligence Community, and federal, state and local law enforcement agencies.

While at the CIA, Mr. Labaj developed and implemented the Defense Against Terrorism Survey, a vulnerability assessment methodology used to assess security at borders, high threat residences and facilities and over 100 international airports. Mr. Labaj also served on the Federal Aviation Administration's Blue Ribbon Panel on Airport Security and Vulnerability Assessment, and implemented and managed the FAA's National Safe Skies Team Security Screening Test Bed.

He has also served as a member of the Nuclear Emergency Search Team (NEST) Access Working Group and participated in a number of professional and technical organizations, including the Defense Department’s Technical Support Working Group, the American Defense Preparedness Association, the International Association of Bomb Technicians and Investigators, and the Joint Service Small Arms Program.

CARVER 2017 Training Courses in Tysons Corner, Virginia

April 11-13, 2017
June 13-15, 2017
August 15-17, 2017
October 10-12, 2017

Each course is limited to 8 attendees | Register Today

The CARVER Target Analysis and Vulnerability Assessment™ training course, offered by Security Management International, is an interactive three-day course on conducting facility threat and vulnerability assessments. CARVER is a nationally recognized target analysis and vulnerability assessment methodology used extensively by the military, intelligence and law enforcement community and the Department of Homeland Security in its Automated Critical Asset Management System.

CARVER identifies assets most attractive to attack by an adversary based upon key factors:
  • Criticality – Single points of failure and degree of importance to system operations.
  • Accessibility – Ease of access to critical assets.
  • Recoverability – The time and effort to recover system operations after an adverse event.
  • Vulnerability – Level of exposure to attack based on adversary capability.
  • Effect – Magnitude of adverse consequences resulting from malicious actions and subsequent responses.
  • Recognizability– Likelihood that potential adversaries would recognize that an asset is critical.

Past Performance: What Previous Attendees Said About This Workshop

"Just wanted to let you know that Mr. Labaj conducted an excellent class that was very well received by all. Several members of the class had recently attended another Vulnerability Assessment class, and everyone agreed that this was a 100 times better. In fact, one of my officers stated 'I learned more in 15 minutes in this class than I did in two days from the other course' Thanks again for your prompt and professional service, I am looking forward to working with you in the future
- Bruce Barnes, CPP, MA Ed Director, Physical Security and Emergency Management NV Energy

"This course brings all walks of security together; it provides a wealth of experience to bear on how this methodology can be applied. The field work was eye opening."
- Robert Hargesheimer, US Navy, Site Installation Manager

"Loved the interaction of students and instructors. Varied attendees gave many points of view and shared experiences."
- Henry Britt, The Response Group

"Valuable class. Provided a good mix of backgrounds and experience and presented material in a manner that was great for novices and pros alike."
- J. Phil Harmon, Washington Group International, Manager, Red Team Operations

"Excellent course for developing a fundamental understanding of the Carver Target Analysis and Vulnerability Assessment Process."
- Kevin Nowak, U.S. Department of Energy, Security Specialist

"Great course! Exceeds expectations and professional requirement. The training will have a positive and dynamic impact."
- Mark. K Gerwig, NSWC Crane, EOD Project Specialist

"Worth every penny! There are no other courses available that teach the fundamentals of doing a TA and VA."
- Tracy DeWitt, Southwest Tennessee Community College, Adjunct Faculty

2017 CARVER Target Analysis & Vulnerability Assessment™ Training
On-Site Training at Your Location

"The CARVER Target Analysis and Vulnerability Assessment training course" can be specially designed for your organization, and presented at your facility worldwide. Please call us today at 865-567-2938 for a price quote.
Note: SMI recommends the On-Site option if you are training four or more employees. If you are planning to train less than four employees, SMI recommends attending one of our quarterly courses held in Vienna, Virginia.

Carver Training SMI


We frequently offer special promotions -- for more follow us on FacebookFacebook and TwitterTwitter or ask us prior to registration!
For help registering, call 865-567-2938 or email This email address is being protected from spambots. You need JavaScript enabled to view it..

CARVER Target Analysis/Vulnerability Assessment Outline

Course Introduction
  • Welcome & Administrative
  • Instructor Staff
Introduction to Target Analysis/Vulnerability Assessments
  • TA/VA Course Objectives
  • Definitions
  • Understanding the TA/VA Philosophy, Benefit/Value & Complexity
CARVER “The Tool to Use”
CARVER Introduction
  • History
  • Concept
  • Process
  • Ranking
  • Matrix
  • CARVER Exercise
Target Analysis
Target Analysis Overview
  • Objectives
What is a TA and Why is it used and Who uses it
Methodology & Process
  • System
  • Sub System
  • Complex
  • Asset
  • Phases
  • Statement of Requirement
  • Target Assessment
  • Operational Plan
  • Reporting
  • Target Folder
  • Target Analysis Example
  • Mall Example
  • Conclusions 
Threat Assessment
  • Objectives
  • Definition
  • General Threat
  • Adversary Capabilities, Intent, History, Target Selection Criteria (open source info)
  • Defining & Analyzing the Threat
  • Developing the Threat Spectrum
  • Developing a Pair Wise Threat Assessment
  • Definition
  • Pair Wise Exercises
  • Threat Spectrum Pair Wise Exercise
  • Threat Rankings
  • Design Basis Threats
  • Site Specific Threats
  • Developing Design Basis Threats
  • Design Basis Threat Exercise
  • Adversary Scenarios
  • Adversary Objective
  • Adversary Scenario
  • Adversary Scenario Exercise
  • IED Familiarization
  • Vehicle Bombs
  • Suicide Bomber Operations
  • The Suicide Bomber
  • Suicide Vehicle Bombs
Vulnerability Assessments
Vulnerability Assessment Overview
  • Introduction to a VA
  • VA Process
  • Planning
  • Threat Assessment
  • Infrastructure Characterization
  • Data Analysis
  • Risk Reduction Recommendations
  • Reporting Phase
VA Planning
  • Form Project Team
  • Develop VA Objectives (i.e. who to interview)
  • Develop VA Scope (i.e. who to interview)
  • Review Policies & Procedures (Intro to ASAP principle)
Infrastructure Characterization
  • Critical Asset Identification using the Pair Wise
  • Hazards Identification
Data Assessment/Analysis
  • Target Attractiveness
  • Consequence Analysis
  • Risk Reduction Recommendation
  • Security Implementation Planning
Reporting Phase (expand off of flow chart)
Security System Effectiveness
  • Definition
  • Elements
  • Deter, Detect, Delay, Respond, Mitigate
  • Perimeter Security
  • Introduction
  • Perimeter Systems
  • Fences
  • Gates
  • Access Control
  • Perimeter Sensors
  • Building Security
  • Introduction
  • Building Types and Threats
  • Access Control
  • Doors
  • Windows
  • Nontraditional Access Points
  • Access Control Hardware and Systems
  • VA Exercise
  • Classroom Exercise
  • Objectives
  • Power Point Presentation
  • Introduction & Planning
  • Threat Assessment
  • Infrastructure Characterization
  • Security System Effectiveness
  • VA Methodology
  • Consequence Assessment
  • Risk Reduction Recommendations
  • Risk Reduction Summary
  • Cost Estimate

VA/TA Practical Exercise Field Exercise
  • Objectives
  • Power Point Presentation
  • Executive Summary
  • Introduction & Planning
  • Threat Assessment
  • Infrastructure Characterization
  • Security System Effectiveness
  • VA Methodology
  • Consequence Assessment
  • Risk Reduction Recommendations
  • Risk Reduction Summary
  • Cost Estimate
  • Exercise Tab
  • Threat Assessment
  • Design Basis Threats
  • Exercise Objectives
  • Water Utility Exercise
  • Overview Map Exercise
  • Glossary of Water Terminology
Pin it
SMI - Security Management International Training Courses
security consulting education
SMI -  CARVER Training
SMI -  Counter Espionage Training
SMI -  Hostile Environment Training
SMI - Among Enemies Counter-Espionage for the Business Traveler
SMI -  Global Security Consulting University
SMI -  Clandestine Consultant
SMI - Logo

SMI Social Media

White Papers