Date:
… where you would run to; • Be aware of the possibility of suspicious activity or items, and report them if you are … • Modules include how to identify security vulnerabilities, suspicious activity and how to respond to a weapons attack; …