Documentos de Académico
Documentos de Profesional
Documentos de Cultura
HTW 8-3-2-Add.1 - Proyecto de Curso Modelo 3.25 Revisado Formación en Sensibilizaciónsobre Protección para T... (Secretaría)
HTW 8-3-2-Add.1 - Proyecto de Curso Modelo 3.25 Revisado Formación en Sensibilizaciónsobre Protección para T... (Secretaría)
Nota de la Secretaría
RESUMEN
Principio estratégico, 1
si es aplicable:
Resultados: 1.3
Generalidades
***
https://imocloud.sharepoint.com/MS/SWPU/HTW/8/HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 1
ANNEX
2023 Edition
London, 2023
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 2
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 3
Contents
Foreword ................................................................................................................ 5
Introduction ............................................................................................................ 6
■ Purpose of the model courses ............................................................................ 6
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 4
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 5
Foreword
KITACK LIM
Secretary-General
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 6
Introduction
The purpose of an IMO model course is to assist organizations that focus on maritime training
with the development and introduction of new training courses. This also includes the updating
and improvement of existing courses so that the quality and effectiveness of seafarers' training
may be consistent internationally.
It is not the intention of the model course programme to present instructors with a rigid
"teaching package" which they are expected to "follow blindly". Nor is it the intention to
substitute audio-visual or "programmed" material for the instructor's presence. As in all training
endeavours, the knowledge, skills and dedication of the instructors are the key components in
the transfer of knowledge and skills to those being trained through IMO model course material.
Because the educational systems and the cultural backgrounds of trainees in maritime
subjects vary considerably from country to country, the model course material has been
designed to:
- identify the basic competence requirements of the trainee target group for each
course in universally applicable terms; and
- specify clearly the technical content and level of knowledge and proficiency
necessary to meet the intent of the relevant IMO Conventions, Codes and related
guidance material.
In order to keep the training programme up to date, it is essential that the model course users
provide feedback. Any relevant information, comments and suggestions should be sent in
accordance with Appendix II.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 7
■ Scope
This model course is designed to provide the trainees with required knowledge and skill to
enable port facility personnel without designated security duties in connection with a Port
Facility Security Plan (PFSP) to enhance security in accordance with the requirements of the
International Convention for the Safety of Life at Sea (SOLAS), chapter XI-2, the International
Ship and Port Facility Security (ISPS) Code, the International Maritime Dangerous Goods
(IMDG) Code, the IMO/ILO Code of Practice on Security in Ports, and guidance contained in
MSC.1/Circ.1341 on Guidelines on security-related training and familiarization for port facility
personnel. This covers the competences and the required knowledge, understanding and
proficiencies (KUPs) specified in table 1 of the Guidelines on security-related training and
familiarization for port facility personnel (MSC.1/Circ.1341).
■ Objective
The objective is to provide trainees with guidance and information to gain knowledge,
understanding and proficiencies (KUPs) required to achieve the objectives of the learning
outcomes to demonstrate the competences relevant to security awareness of port facility
personnel without designated security duties, as set out in table 1 of the Guidelines on
security-related training and familiarization for port facility personnel (MSC.1/Circ.1341).
Trainees who complete this course should be able to successfully demonstrate their
competences to:
.3 understand the need for and methods of maintaining security awareness and
vigilance.
■ Entry standards
Entry standards should be in accordance with applicable IMO instruments, where such
requirements are specified. If such requirements are not specified, it is left to the Administration
to decide entry standards in accordance with national regulations and system of education.
It is assumed that those attending this course will be personnel employed or engaged in any
capacity in a port facility that is required to comply with the provisions of the ISPS Code and
who will not be assigned specific duties in connection with a Port Facility Security Plan.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 8
■ Course delivery
The course may be delivered through various methods, including, but not limited to, classroom
training, in-service training, distance learning, computer-based training or a combination of
these methods.
The course intake would be limited by the number of instructors that may be available to
conduct the course effectively. The maximum trainee/instructor ratio may be up to 24 to 1 for
classroom lectures, and 8 to 1 for practical sessions and simulations. Teaching staff should
note that the ratios are suggestions only and should be adapted to suit individual groups of
trainees depending on their experience, ability and equipment available.
■ Staff requirements
To use the model course effectively, instructors should review the general outline in part B and
detailed outline in part C, taking into account the information provided under the entry
standards specified in the course framework. The actual level of knowledge and skills and the
prior technical education of the trainees should be kept in mind during this review, and any
areas within the detailed outline which may cause difficulties because of differences between
the actual trainee entry level and that assumed by the course designer should be identified.
To compensate for such differences, instructors may delete from the course, or reduce the
emphasis on, items dealing with knowledge or skills already attained by the trainees.
Instructors should also identify any academic knowledge, skills or technical training which the
trainees may not have acquired prior to undertaking the course.
By analysing the detailed outline and the academic knowledge required to allow training in the
technical area to proceed, instructors can design an appropriate pre-entry course or,
alternatively, insert the elements of academic knowledge required to support the technical
training elements concerned at appropriate points within the technical course.
Adjustment of the course objective, scope and content may be necessary if trainees completing
the course are to undertake duties that differ from the course objectives specified in the model
course.
The course outline indicates the course designers' assessment of the time that should be
allotted to each subject area. However, these allocations assume that the trainees have met
the entry requirements of the course. The instructor should therefore review assessments and
adjust the time allocations as necessary within the limits permitted by the Administration.
■ Lesson plans
Having adjusted the course content to suit the trainee intake and any revision of the course
objectives, instructors should draw up lesson plans based on the detailed outline and
associated reference material. Where no adjustment has been found necessary in the learning
objectives of the detailed outline, the lesson plans may simply consist of the syllabus with
keywords or other reminders added to assist the instructor in presenting the material.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 9
■ Presentation
The presentation of concepts and methodologies may need to be repeated in various ways
until the instructor is satisfied that trainees have attained each specific learning objective.
The detailed outline is laid out in learning objective format with each objective specifying what
the trainee should be able to do as the learning outcome.
■ Implementation
For the course to run smoothly and to be effective, considerable attention should be paid to
the availability and use of:
An ordinary classroom or similar meeting room with a whiteboard. Audiovisual aids teaching
equipment or equivalent are sufficient for the lectures. In addition, when making use of
audiovisual materials, it should be ensured that appropriate equipment, such as
Computer-Based Training (CBT) modules, running on an ordinary PC is available. Finally, the
use of shipboard environments (ships or mock-ups) for certain segments of the course may
enhance the overall effectiveness of this training.
Note: Administrations may require additional training material to meet national regulations.
■ Design
The content of the model course is designed to suit the trainers teaching this course for optimal
delivery, ensuring a high degree of consistency and adherence to the PFSP, as mentioned in
sections A/14 to A/18 of the ISPS Code. The flow of topics contained in Part C reflects how
the trainer may design and deliver the course.
- Audiovisual aids: DVD player, MP3/MP4, digital TV, LCD & overhead projector,
etc.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 10
■ References (R)
R4b Guidance to shipowners, ship operators, shipmasters and crews on preventing and
suppressing acts of piracy and armed robbery against ships (MSC.1/Circ.1334)
R6 Convention for the Suppression of Unlawful Acts against the Safety of Maritime
Navigation (SUA Convention) and its 2005 Protocol; the Protocol for the Suppression
of Unlawful Acts against the Safety of Fixed Platforms located on the Continental Shelf
(SUA PROT 1988) and its 2005 Protocol
R9 FAL 37/17, paragraph 6.20 (Report of the Facilitation Committee on its thirty-seventh
session)
R11 Measures to prevent unlawful acts against passengers and crews on board ships
(MSC.1/Circ.443)
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 11
■ Lectures
As far as possible, lectures should be presented within a familiar context along with using
practical examples. They should be well illustrated with diagrams and photographs.
■ Timetable
This model course has been developed providing a recommended range in duration of 4.5 to 8
hours for lectures, demonstrations, laboratories or simulator exercises and assessment.
No formal timetable is included in this model course.
■ Course outline
The following table lists the competencies and the knowledge, understanding and proficiencies
(KUPs) for this course in the sequence that they are listed in table 1 of the Guidelines on
security-related training and familiarization for port facility personnel (MSC.1/Circ.1341).
The table identifies 3 competencies and 11 Knowledge, Understanding and Proficiency (KUP)
requirements and is systematically organized in the following way.
- Large bold type text printed in the table second column describes the competence
with which the training is concerned. Each competence is uniquely and
consistently numbered starting from 1.
- Each KUP can be further subdivided into topics and are equally continuously
numbered as third level number starting from 1 and prefixed by the KUP number.
A full stop is placed between numbers that designate subdivisions of different
levels. Example 1.1.3 denotes the third topic of the first KUP under competence
number 1.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 12
The course outline should be read in conjunction with part D (Instructor manual) for further
detailed guidance on each module's content.
1.3 Maritime security levels and their impact on security measures and
procedures in the port facility and aboard ships
1.3.1 Port facility security actions
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 13
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 14
Part C correlates the knowledge, understanding and proficiencies defined in the Guidelines on
security-related training and familiarization for port facility personnel (MSC.1/Circ.1341), with
the specific learning outcomes that the trainees should achieve. Each specific learning
outcome is presented as a topic or sub-topic as a learning objective reflecting the knowledge,
understanding and proficiency (KUP) in table 1 of the Guidelines. It should be read in
conjunction with part D (Instructor manual) for further detailed guidance for each module's
content.
■ Learning objectives
The detailed outline has been written in a learning objective format in which the objective
describes what the trainee should perform to demonstrate that the specified knowledge or skill
has been transferred, and the desired competence has been achieved. All objectives are
understood to be prefixed by the words, "The expected learning outcome is that the trainee is
able to..."
In order to assist instructors, references are shown against the learning objectives to indicate
IMO/ILO references and publications, additional technical material and teaching aids which the
instructor may wish to use when preparing and presenting the course material. The material
listed in the course framework has been used to structure the detailed teaching syllabus; in
particular, teaching aids, bibliography and IMO/ILO references, will provide valuable
information to instructors. The abbreviations used are:
R IMO/ILO references
anx. Annex
app. Appendix
pa. Paragraph
sect. Section
Note: Throughout the course, instructor should clearly define and emphasize the application
of safe working practices, considering references to applicable international and national
requirements and regulations, as appropriate. It is expected that the national institutions
implementing the training course will insert references, where appropriate, to national and/or
regional requirements and regulations, as necessary.
■ Competences
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 15
Introduction
Course overview
.1 describe the topics and emphasis of the course
.2 course administrations
Competences to be achieved
.1 describe the competences that will be achieved through
completion of the course
Current security threats and patterns R1 (sect
2.18.28)
.1 summarize threats to the maritime transport industry, such R1 (sect
as: 3.8.10)
- piracy and armed attacks R4
- terrorism and Weapons of Mass Destruction (WMD)
- cargo theft R1 (sect
3.8.23)
- collateral damage
Ship and port operations and conditions R1 (sect 1.6)
.1 characterizes the intermodal nature of transportation and
the interfaces between ships and other modes
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 16
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 17
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 18
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 19
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 20
*
Where the reference is left blank there are no references in the Guide to Maritime Security and ISPS Code
on this particular issue. Hence guidance might be sought from appropriate textbooks or websites.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 21
The Instructor manual provides guidance on the material that is to be presented during the
course. The course material reflects the provisions for the training in security awareness of
port facility personnel without designated security duties specified in section 4 and table 1 of
the Guidelines on security-related training and familiarization for port facility personnel
(MSC.1/Circ.1341).
Although the guidance given should be of value initially, each instructor should develop his or
her own methods and ideas, recognize and refine what is successful, and discard that which
does not work satisfactorily.
The course outline and recommended range of duration for lectures and demonstration provide
guidance on the time allocation for the course material, but the instructor may modify this to
better meet specific course requirements, if it is deemed necessary. The detailed outline should
be studied carefully and, where appropriate, lesson plans or lecture notes compiled.
Preparation and planning are the most important criteria in effectively presenting this course.
Availability and proper use of course materials are also essential for maximum efficacy in
conveying the subject to trainees. The capabilities and limitations of the facilities in use may
require the detailed teaching syllabus to be adjusted, but it is suggested that this be kept to a
minimum so as to ensure that all specified knowledge areas are addressed.
Where possible, lectures should be supported by written course and audiovisual materials, and
other media that allow the trainee to embrace the material more fully. It will be necessary to
prepare material for use with overhead projectors or for distribution to trainees as handouts.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 22
Guidance notes
Introduction
Course overview
As with other IMO model courses, the starting point should be a brief statement of the purpose
of the course, a short review of the timeline, an introduction of participants, determination of
knowledge and experience levels, and a brief description of the teaching facility.
.2 Course administrations
Course objective
.1 Competences to be achieved
The aim of the course is stated, competences from Part C of the course are reviewed, and the
outcome of the learning objectives is made clear; namely, that "the expected learning outcome
is that the trainee is able to...". It should be noted that these same competences are found in
table 1 of MSC.1/Circ.1341 along with methods for demonstrating competence and criteria for
evaluating competence.
Instructors should emphasize that no one is being trained to fight or similarly respond to
security threats but rather that trainees may be able to identify, deter, or mitigate such threats
through proper planning, preparation and coordination with various entities.
Current threats to maritime security should be summarized in order to provide a basis for
understanding of the recent conventions and legislation in this area and to fully grasp the
importance of the training provided by this course. Prospective security personnel receiving
this training should clearly sense the reality of today's security issues, which include piracy,
terrorism, bioterrorism, Weapon of Mass Destruction (WMD) and cyber security, contraband
smuggling, cargo theft and collateral damage. Some may have adopted a mindset that places
the problem of security in the past or in such a remote corner that it appears distant or
irrelevant. Before continuing on with the course this mindset should be identified and
addressed.
Piracy and armed attacks continue to occur on an increasingly frequent basis. Armed robbery
occurs mostly within territorial waters, whereas piracy, by definition, usually involves ships at
high sea. In fact, the United Nations Convention on the Law of the Sea (UNCLOS), article 101,
defines piracy as any of the following acts:
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 23
The summarizing of statistics concerning piracy and armed robbery may provide motivation to
trainees to acquire knowledge and skills that would enable them to counter these threats where
possible.
Terrorism usually involves violence, or the threat of violence, by extremist groups seeking to
gain political objectives by malicious means. A terrorist group may hope to make a statement
by using various types of bomb, making bomb threats or hijacking a ship. Increasingly,
terrorists are acting in connection with extremist religious sects that promote suicidal
behaviour.
A WMD is a nuclear, radiological, chemical, biological or other weapon that can kill and bring
significant harm to a large number of humans or cause great damage to human-made
structures (e.g. buildings), natural structures (e.g. mountains), or the biosphere. The scope
and usage of the term has evolved and been disputed, often signifying more politically than
technically and excludes the means of transporting or propelling the weapon where such
means is a separable and divisible part from the weapon. Contraband smuggling, a criminal
activity, may result in large financial loss to the shipowner whose ship is being used by the
smugglers. Often, drugs are the commodity being smuggled and they may be brought on board
in a number of creative ways such as in luggage, stores, on or in a person's body, or in
electronic equipment. Weapons are also a frequent item associated with smuggling.
Like drugs, weapons, too, find their way on board in various ways, such as in cargo containers.
It is noteworthy that, though the nature and the general objectives of terrorism are still the
same as before, the variety of terrorist actions takes more sophisticated forms. Cyberterrorism
and bioterrorism are the two new types of action which are increasingly used by terrorists
worldwide. Maritime transport is critical to the global economy. In a competitive environment,
the industry is constantly seeking economies of scale and efficiencies. This has led to the
introduction of larger vessels and an increasing use of information technology to achieve
greater automation, both in ports and at sea. The technologies employed are vulnerable to the
same cyber-security threats as those in other sectors affecting commercial, production and
government systems. This module briefly reviews the threats in the maritime environment and
examines the need for increased awareness and protection of what are in effect maritime
industrial control systems. Generally, cyber risk management means the process of identifying,
analysing and communicating cyber-related risk and accepting, avoiding, transferring or
mitigating it to an acceptable level, considering costs and benefits of actions taken to
stakeholders. It refers to a measure of the extent to which a technology asset could be
threatened by a potential circumstance or event, which may result in shipping-related
operational, safety or security failures as a consequence of information or systems being
corrupted, lost or compromised.
Cargo theft, an age-old problem, continues to plague the maritime industry and causes
financial losses in staggering amounts. Prevention is normally the most effective method of
dealing with this security threat. Although there may not be violence or political issues involved
in most cargo theft cases, this matter remains high on the list of security threats and requires
solutions discussed in this course. Instructors should convey that cargo theft is only one of the
various threats to the security of cargo.
Other security threats such as illegal migration and stowaways should be discussed during this
section of the course. Stowaway problems along with refugees and illegal migrants are among
tangible problems which the maritime industry has suffered within the years past. Port security
trainees should get acquainted with these problems and the method of how to deal with them
appropriately.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 24
Collateral damage occurs when a nearby fire, explosion or attack results in damage to a ship
or facility. While the damage is sometimes unintended, the costs are nevertheless real.
There are measures that may minimize the consequences of this type of damage.
This section of the course should provide trainees with an understanding of the larger context
in which maritime operations occur. Familiarity with the complex transportation and logistics
framework of the marine transportation system will enable students to effectively undertake
their security responsibilities. It is essential for trainees to have a basic understanding of the
general patterns and mechanisms of cargo and passenger movement through international
and intermodal transportation chains. The operational interface between maritime and other
modes of transportation is a central component of this segment of the course. Trainees should
also be exposed to the fundamentals of cargo tracking and related information systems in the
context of security.
Trainees should appreciate the attempts by international bodies to minimize, stop, or otherwise
control threats to security in maritime transportation. The International Maritime Organization
(IMO) has adopted a number of resolutions and conventions to this end. For example,
resolution A.545(13) on Measures to prevent acts of piracy and armed robbery against ships
was signed in 1983. In 1985 came IMO resolution A.584 (14) on Measures to prevent unlawful
acts which threaten safety of ships and security of passengers (this was later reviewed in
November 2001 with IMO resolution A.924(22)). Then in 1986 IMO approved MSC/Circ.443
on Measures to prevent unlawful acts against passengers and crew on board ships. In 1988,
the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
(SUA) treaties aimed at ensuring that appropriate judicial action is taken against persons
committing unlawful acts against ships. Unlawful acts would include the seizure of ships by
force, acts of violence against persons on board ships, and placing devices on board a ship
which are likely to destroy or damage it. The convention obliges contracting governments either
to extradite or prosecute alleged offenders. The SUA Convention came into effect on 1 March
1992.
Following the tragic event of 11 September 2001, the twenty-second session of the IMO
Assembly, in November 2001, unanimously agreed to the creation of new security regulations.
IMO approved the development of new measures relating to the security of ships and of port
facilities for adoption by a Conference of Contracting Governments to the International
Convention for the Safety of Life at Sea, 1974, in December 2002 (the Diplomatic Conference).
This timetable of little more than a year represents a landmark achievement for IMO. It provides
a clear indication of the gravity of the situation, as well as the intention to protect world shipping
against security incidents and threats.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 25
Trainees should be familiarized with the security-related provisions contained in the 2010
amendments to the STCW Code. They should also be made aware of IMO guidance
concerning the prevention and suppression of piracy and armed robbery against ships. Of
particular interest in the latter case will be MSC.1/Circ.1334 on Guidance to shipowners and
ship operators, shipmasters and crews on preventing and suppressing acts of piracy and
armed robbery against ships.
It will be helpful for trainees to understand that some governments have acted on a national
level to produce legislation and/or regulations concerned with measures to enhance maritime
security. Instructors may wish to use examples developed by their own nations and/or those
of other countries to illustrate the focus of this section of the course.
1.1.3 Definitions
Trainees will need a working knowledge of several terms found in SOLAS chapter XI-2
regulation 1, in the ISPS Code part A section 2, and in the Best Management Practices to
Deter Piracy and Enhance Maritime Security in the Red Sea, Gulf of Aden, Indian Ocean and
Arabian Sea (BMP5). These terms may well need clarification by an experienced instructor in
order for trainees to reach the necessary level of understanding. For instance, it might require
emphasis or other clarification by the instructor to establish that the Ship Security Officer is a
person on board the ship and in that sense it may be impossible for a Company Security Officer
to also act as the Ship Security Officer. Another example may clarify the meaning of
"international voyage".
This section is intended to give trainees a clear picture of the elements of the maritime security
system conceived by IMO and to show how the various entities should work together to form
an efficient and effective whole.
Contracting Governments have, under the provisions of SOLAS chapter XI-2 and part A of the
ISPS Code, various responsibilities, which amongst others, include:
- verifying the compliance of ships with the provisions of SOLAS chapter XI-2
and part A of the ISPS Code and issuing to ships the International Ship
Security Certificate;
- determining which of the port facilities located within their territory are
required to designate a PFSO who will be responsible for the preparation of
the PFSP;
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 26
Recognized Security Organizations (RSOs) are defined in SOLAS regulation XI-2/1.1.16 and
discussed throughout parts A and B of the ISPS Code. The trainee should understand how
and when an RSO may take on the security-related activities of a Contracting Government.
The Company is defined in SOLAS chapter XI-1 and is given numerous obligations under
chapter XI-2 and the ISPS Code from Continuous Synopsis Records to the maintenance of the
International Ship Security Certificate. Trainees will benefit greatly from a clear understanding
of the role of the company and the support that they should expect from it.
The term ship as used here means a ship to which SOLAS chapter XI-2 applies. Various
segments of SOLAS chapter XI-2 and the ISPS Code discuss the persons, activities, plans,
documentation and so forth that a ship will be exposed to in a security context. All trainees will
need to understand these requirements as they relate to this important cornerstone of a
maritime transportation system.
The port facility is defined in SOLAS regulation XI-2/1.1.9 and is the location where a ship/port
interface takes place. As such, numerous duties and activities are assigned to the port facility.
All trainees should understand the role of the port facility in maintaining the security of the
maritime transportation system. Distinction between port and port facility along with their
geographical and operational importance should be well defined for the trainees.
1.2.6 - 1.2.11 Ship Security Officer, Company Security Officer, Port Facility Security
Officer, Seafarers with designated security duties, Port facility personnel with
designated security duties, and Other personnel
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 27
Trainees should understand the role of each of these various persons and know what to expect
from each in terms of authority and responsibility. The ISPS Code parts A and B clearly
delineate the functions, duties and training requirements for each of these categories of
personnel. In the end these are the very people who will make the security plans work, and will
recognize areas for improvement. They will each need to appreciate their own role as well as
that played by the others. Trainees should also understand the role of personnel in
organizations that are involved in responding to attacks and attempted attacks by pirates and
armed robbers.
1.3 Maritime security levels and their impact on security measures and
procedures aboard ship and in the port facilities
Parts A and B of the ISPS Code, IMO guidance documents and other resources listed in Part
A will be helpful in organizing material to be conveyed in this section of the course. Instructors
should indicate that this section of the course is where ideas, plans and preparation turn into
actions and procedures.
The instructor should provide information concerning maritime security levels and the different
types of security measures that should be considered for port facilities and ships in port as
they respond to security incidents. The instructor also should emphasize that at different
security level, additional or further specific protective measures, specified in the port facility
security plan, should be implemented for each activity detailed in part A section 14.2 of the
ISPS Code.
Trainees should be aware of procedures for facilitating visitors access into the port facility and
measures to deny access to visitors who are unable to provide verifiable justification for
seeking access. The instructor should provide information concerning security-related
provision for handling of announced and unannounced visitors.
Trainees may benefit from the in-class creation of checklists detailing the appropriate generic
actions given various conditions. The importance of familiarization training involving the port
facility security plan particular to each facility should be emphasized.
Trainees will appreciate that all security incidents should be reported in accordance with
specific reporting requirements. It may be helpful too for instructors to provide several sample
security incidents and have the class or individuals explain how they would go about reporting
these incidents including:
- bomb threat;
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 28
This portion of the course is concerned with the implementation of plans for a variety of
contingencies associated with terrorism and other criminal activities that may arise in the
maritime setting. Possible responses in the case of bomb threats, explosions, armed robbery,
hijackings, along with drills and exercises and similar events should be discussed.
Security aspects relating to the handling of cargo and ship's stores and coordinating these
aspects with relevant SSOs and CSOs, cargo handling, especially IMDG cargo handling,
require security precautions which need to be addressed in the PFSP. Dangerous cargo
handling safe procedures for container ships are as the following:
.1 Every dangerous cargo shipment should be made in line with IMO policy and
be accompanied by required documentation. Dangerous cargo with
restricted/prohibited UN numbers should not be accepted for shipment
unless under special circumstance and express permission is obtained from
the company.
.4 Ensure that all such containers are loaded in the planned stow position.
Any discrepancies should be brought to the notice of the Terminal
planner/Central planner and/or local agent as required. The final condition
may be accepted only if meeting all stowage and segregation requirements;
otherwise it should be corrected by discharging/shifting container(s)
concerned.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 29
Instructors should explain suspicious patterns of behaviour, while emphasizing the importance
of avoiding racial profiling and ethnic stereotyping. Examples of suspicious behaviour include:
- unknown persons loitering in the vicinity of ships or port facilities for extended
periods of time;
- small boats with personnel on board loitering and perhaps taking photographs or
creating diagrams of ships or facilities;
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 30
- small craft containing ladders, grappling hooks and other potential boarding
devices; and
2.1.2 Stowaways and their associated threat to the security and safety of international
shipping
Stowaway in its most basic sense refers to any person found on board a ship without
authorization and with intent to travel with the vessel. Whatever their motivation, stowaways
pose significant security, safety and commercial liability for the shipping industry. It is believed
that the increasing problem of stowaways is in large part due to a lack of proper implementation
of physical security measures and access controls in ports and on board ships within port
facilities.
.1 that ships implement fully the security procedures appropriate to the security
level as detailed in the SSP; and
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 31
IMO technical committees have initiated work on the issue of cyber security, which has the
potential to do considerable harm to the overall security of the maritime industry and the wider
supply chain. The result of their endeavour has resulted in the development of voluntary
guidelines based upon a maritime cyber risk management approach targeting adequate cyber
security practices, which may be used to protect and enhance the resilience of cyber systems
supporting the operations of ports, ships, marine facilities and other elements of the maritime
transportation system. Needless to say, the overall goal is to support safe and secure shipping,
which is operationally resilient to cyber risks.
Trainees are expected to recognize that a ship's onboard information technology and
operational technology systems can be compromised/hacked just as easily as systems ashore,
and that such security breaches have the potential to cause considerable harm to the safety
and security of ships, ports, marine facilities and other elements of the maritime transportation
system. They are also to get adequate familiarity with the role and importance of automation
through Information Communication and Technology (ICT), use of the internet and integrated
IT systems which have helped to achieve reduced cargo delays, faster processing times,
enhanced asset control, payroll efficiencies, fewer losses due to theft, and decreased
insurance costs, while large ports have benefited from increased productivity due to IT
improvements in their supply chain. Thus, trainees are expected to acquire general awareness
of the significant impact that technological innovation and advancements have had on the
global maritime transportation system, including but not limited to increased dependence on
process automation, electronic information exchange, networked computers and control
systems and the emergence of high-bandwidth Wi-Fi access via satellite. Meanwhile, the
danger of loss and availability, integrity or confidentiality related to critical systems or data
should also be considered by trainees at the end of the course acknowledging that the flip side
of these operational benefits is that ports and maritime operations are now vulnerable to cyber
threats as the shipping industry becomes increasingly dependent on digitization and
automation.
Trainees should be cautioned that no security equipment or measure is infallible. They should
be apprised of the known techniques that can be employed to evade security systems and
controls, such as the disabling of alarm systems, picking of locks, jamming of radio signals,
GPS spoofing, unauthorized access to and control of ship or Company information and
operational systems, etc. The critical importance of clear communication with shipboard
personnel, facility personnel, passengers and others involved should be underscored as well.
The known methods employed by pirates and armed robbers to board ships and undertake attacks
should be elaborated upon. The Best Management Practices to Deter Piracy and Enhance
Maritime Security in the Red Sea, Gulf of Aden, Indian Ocean and Arabian Sea (BMP5) provides
a helpful description of typical pirate attacks that may serve as a foundation for this discussion.
The focus of this segment of the course is on the characteristics and potential effects of
prohibited weapons, such as WMDs; improvised explosive devices; chemical, biological and
radiological devices; substances and compounds that pose a hazard to personnel, ships and
facilities; and other related topics.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 32
Improvised explosive devices (IED) are explosive devices fabricated in an improvised manner
incorporating destructive, lethal, noxious, pyrotechnic or incendiary chemicals. IEDs have been
used by terrorists throughout the years and they have been proven to be a weapon that the
weak use to defeat the stronger.
WMDs are nuclear, radiological, chemical, biological or other weapons that can kill and bring
significant harm to a large number of humans or cause great damage to man-made structures
(e.g. buildings), natural structures (e.g. mountains), or the biosphere. They have been
designed to kill large numbers of people, typically targeting civilians and military personnel
alike. They are generally considered to have a psychological impact in addition to any strictly
military usefulness.
Terrorists or other malicious actors could acquire smuggled nuclear or other radioactive
materials and use them to build a weapon. Indeed since the end of the Cold War, the main
concern regarding all WMDs has been proliferation, that is, the potential for lesser powers,
"rogue states" or international terrorist groups to acquire the means to produce and deliver
WMDs.
Though reports about smuggling WMDs, for the time being, is rare, it should be taken into
consideration that the ability to find raw materials and create a WMD bomb is not out of reach
in international markets and therefore the sighting of these basic materials, which can be used
for building such bombs and/or IEDs, should also be focused on throughout the searches on
board ships and in the ports.
Trainees should understand that certain information and communications will be considered
security sensitive and that the level of sensitivity may change, similar to port facility security
levels 1, 2, and 3. Seemingly benign conversations, therefore, may result in disastrous
consequences. All personnel should appreciate the risk of security leaks through
communication by improper methods or to the wrong persons. The disclosure of security
sensitive information would compromise the security of the port facility (including, but not
limited to, information contained in any personnel-related file or privileged or confidential
information that would compromise any person or organization).
3.1 Training, drill and exercise requirements under relevant conventions and
codes
Trainees should be briefed that drills and exercises take up organizational time and resources,
and should therefore be conducted in as efficient and effective a manner as possible. It should
be conveyed to the trainees that the main objectives of drills and exercises are to ensure that
port facility personnel are proficient in all assigned security duties at all security levels and in
the identification of any security-related deficiencies that need to be addressed.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 33
Trainees should learn that effective implementation of the provisions of the port facility security
plan requires that drills be conducted at least once every three months unless the specific
circumstances dictate otherwise. These drills should test individual elements of the plan, such as:
- damage to, or destruction of, the port facility or of the ship, e.g. by explosive
devices;
- use of the ship to carry those intending to cause a security incident and their
equipment;
Various types of exercises which may include participation of port facility security officers, in
conjunction with relevant authorities of Contracting Governments, company security officers,
or ship security officers, if available, should be carried out at least once each calendar year
with no more than 18 months between the exercises. Requests for the participation of company
security officers or ship security officers in joint exercises should be made bearing in mind the
security and work implications for the ship. These exercises should test communication,
coordination, resource availability and response. These exercises may be:
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 34
■ Introduction
The effectiveness of any evaluation depends to a great extent on the accuracy of the
description of what is to be evaluated. Thus, to assist the instructors, the detailed outline is
designed with descriptive verbs for the specific learning outcomes, mostly taken from the
widely used revised Bloom's taxonomy.
The learning outcomes will provide a sound basis for the construction of suitable tests for
evaluating trainee progress.
Evaluation/assessment is a way of finding out if learning has taken place. It enables the
assessor to ascertain if the trainees have gained the required knowledge and skills needed at
given point to demonstrate effectively their competence to perform the tasks set out.
■ Assessment
In assessing the achievement of competence, assessors should be guided by the criteria for
evaluating competence in column 4 of table 1 of the Guidelines on security-related training and
familiarization for port facility personnel (MSC.1/Circ.1341) and the learning outcomes in
part C (Detailed outline).
■ Method of evaluation
The methods chosen to carry out an evaluation will depend upon what the trainee is expected
to achieve in terms of knowing, comprehending and proficiency in applying the course content.
The methods used can range from a simple question-and-answer discussion with the trainees
(either individually or as a group) to prepared tests requiring the selection of correct or best
responses from given alternatives, the correct matching of given items, the supply of short
answers or the supply of more extensive written responses to prepared questions.
Where the course content is aimed at the acquisition of practical skills, the test would involve
a practical demonstration by the trainee making use of appropriate equipment, tools, etc.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 35
■ Validity
The evaluation methods should be based on clearly defined objectives, and should truly
represent what is to be assessed. There should be a reasonable balance between the subject
topics involved and also in the testing of trainees' knowledge and understanding of the concept
and proficiency in their application.
The time allocated for the trainee to provide a response is very important. Each question or
task should be properly tested and validated before it is used to ensure that the test will provide
a fair and valid evaluation.
■ Reliability
Assessment should be reliable. In other words, if the assessment was done again with a similar
group/trainee, the assessor would receive similar results. The same subject may have to be
delivered to different groups of trainees at different times. If other assessors are assessing the
same course, it is to be ensured that all assessors make similar decision.
■ Subjective testing
Higher levels of cognitive reasoning, analysing a problem, critical thinking and demonstrating
the ability to put application into practice can only be assessed by subjective testing and cannot
be thoroughly assessed with objective multiple-choice questioning.
Subjective method of evaluation requires the trainee to demonstrate what has been learned
by stating or writing formal answers to questions. The phrasing and structure of the answer
may differ from person to person.
Such evaluation is subjective in that it invariably depends upon the assessor's judgement and
interpretation of trainee responses. Different assessors can produce quite different scores
when marking the same paper or evaluating oral answers.
■ Essay questions
Subjective questions are essay questions that require answers in the form of explanations.
Types of essay questions include:
- short-answer essay;
- extended-response essay;
- problem solving; and
- performance test items
Use essay questions judiciously. Limit it to those learning objectives that cannot be tested with
complex multiple choice items and require the essay format.
There are two methods of scoring essay questions, the analytic approach and the holistic
approach.
.1 To use the analytic method, a list of the major key elements that an ideal
answer should address or a model answer is created for comparison with
trainee's response.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 36
.2 The holistic approach to scoring essay items involves the assessor reading
an entire response and assigning it to a category identified by a score or
grade.
Regardless of using an analytic or holistic method of scoring, there are several guidelines an
assessor needs to consider with respect to the scoring of essay tests:
- If there are several essay questions, score all of the students' responses to one
question at a time. This improves consistency and reduces any "carryover"
effects.
- Periodically check to see whether criteria has been applied in the same way
to later-scored answers as to earlier-scored ones.
■ Objective testing
A variety of objective tests have been developed over the years. Their common feature is that
the evaluation does not require a judgement by the assessor. The response is either right or
wrong.
One type of objective test involves supplying an answer, generally a single word, to complete
the missing portion of a sentence. Another involves supplying a short answer of two or three
words to a question. Such tests are known as "completion tests" and "short answer tests".
Another form of objective testing consists of "selective response tests" in which the correct, or
best, response should be selected from given alternatives. Such tests may consist of "matching
tests", in which items contained in two separate lists should be matched, or they may be of the
true/false type or of the multiple-choice type.
The most flexible form of objective test is the multiple-choice test, which presents the trainee
with a problem and a list of alternative solutions, from which he/she should select the most
appropriate.
■ Distracters
The incorrect alternatives in multiple-choice questions are called "distracters", because their
purpose is to distract the uninformed trainee from the correct response. The distracter should
be realistic and should be based on misconceptions commonly held, or on mistakes or errors
commonly made.
The options "none of the above" or "all of the above" are used in some tests. These can be
helpful, but should be used sparingly.
Distracters should distract the uninformed, but they should not take the form of "trick" questions
that could mislead the knowledgeable trainee (for example, do not insert "not" into a correct
response to make it a distracter).
■ Guess factor
The "guess factor" with four alternative responses in a multiple-choice test would be 25%.
The pass mark chosen for all selective-response questions should take this into account.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 37
■ Scoring
In simple scoring of objective tests one mark may be allotted to each correct response and
zero for a wrong or nil response.
A more sophisticated scoring technique entails awarding one mark for a correct response, zero
for a nil response and minus one for an incorrect response. Where a multiple-choice test
involves four alternatives, this means that a totally uninformed guess involves a 25% chance
of gaining one mark and a 75% chance of losing one mark.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 38
Contents
Part 1: Preparation.................................................................................................. 39
Part 2: Notes on teaching technique ......................................................................... 44
Part 3: Curriculum development ............................................................................... 46
Annex A1 - Preparation checklist .............................................................................. 48
Annex A2 - Example of a model course syllabus in a subject area ............................... 50
Annex A3 - Example of a lesson plan for annex A2..................................................... 55
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 39
Part 1: Preparation
1 Introduction
1.1 The success of any enterprise depends heavily on sound and effective preparations.
1.2 Although the IMO model course "package" has been made as comprehensive as
possible, it is nonetheless vital that sufficient time and resources are devoted to preparation.
Preparation not only involves matters concerning administration or organization, but also
includes the preparation of any course notes, drawings, sketches, overhead transparencies,
etc. which may be necessary.
2 General considerations
2.1 The course "package" should be studied carefully; in particular, the course syllabus
and associated material should be attentively and thoroughly studied. This is vital if a clear
understanding is to be obtained of what is required, in terms of resources necessary to
successfully implement the course.
2.2 A "checklist", such as that set out in annex A1, should be used throughout all stages
of preparation to ensure that all necessary actions and activities are being carried out in good
time and in an effective manner. The checklist allows the status of the preparation procedures
to be monitored, and helps in identifying the remedial actions necessary to meet deadlines.
It will be necessary to hold meetings of all those concerned in presenting the course from time
to time in order to assess the status of the preparation and "troubleshoot" any difficulties.
2.3 The course syllabus should be discussed with the teaching staff who are to present
the course, and their views received on the particular parts they are to present. A study of the
syllabus will determine whether the incoming trainees need preparatory work to meet the entry
standard. The detailed teaching syllabus is constructed in "training outcome" format.
Each specific outcome states precisely what the trainee should do to show that the outcome
has been achieved. An example of a model course syllabus is given in annex A2. Part 3 deals
with curriculum development and explains how a syllabus is constructed and used.
2.4 The teaching staff who are to present the course should construct notes or lesson
plans to achieve these outcomes. A sample lesson plan for one of the areas of the sample
syllabus is provided in annex A3.
2.5 It is important that the staff who present the course convey, to the person in charge
of the course, their assessment of the course as it progresses.
3 Specific considerations
In reviewing the scope of the course, the instructor should determine whether it needs any
adjustment in order to meet additional local or national requirements (see Part 3).
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 40
.1 If the entry standard will not be met by your intended trainee intake, those
entering the course should first be required to complete an upgrading course
to raise them to the stated entry level. Alternatively, those parts of the course
affected could be augmented by inserting course material which will cover
the knowledge required.
.2 If the entry standard will be exceeded by your planned trainee intake, you
may wish to abridge or omit those parts of the course the teaching of which
would be unnecessary, or which could be dealt with as revision.
.3 Study the course material with the above questions in mind and with a view
to assessing whether or not it will be necessary for the trainees to carry out
preparatory work prior to joining the course. Preparatory material for the
trainees can range from refresher notes, selected topics from textbooks and
reading of selected technical papers, through to formal courses of instruction.
It may be necessary to use a combination of preparatory work and the model
course material in modified form. It should be emphasized that where the
model course material involves an international requirement, such as a
regulation of the International Convention on Standards of Training,
Certification and Watchkeeping (STCW) 1978, as amended, the standard
should not be relaxed; in many instances, the intention of the Convention is
to require review, revision or increased depth of knowledge by candidates
undergoing training for higher certificates.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 41
.2 Equipment
Any training aids specified as being essential to the course should be constructed, or checked
for availability and working order.
Audiovisual aids (AVA) may be recommended in order to reinforce the learning process in
some parts of the course. Such recommendations will be identified in Part A of the model
course. The following points should be borne in mind:
.1 Overhead projectors
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 42
.2 Slide projectors
If you order slides indicated in the course framework, check through them
and arrange them in order of presentation. Slides are usually produced from
photographic negatives. If further slides are considered necessary and
cannot be produced locally, OHP transparencies should be resorted to.
.3 Cine projector
If films are to be used, check their compatibility with the projector (i.e. 16 mm,
35 mm, sound, etc.). The films should be test-run to ensure there are no
breakages.
.4 Video equipment
It is essential to check the type of video tape to be used. The two types
commonly used are VHS and Betamax. Although special machines exist
which can play either format, the majority of machines play only one or the
other type. Note that VHS and Betamax are not compatible; the correct
machine type is required to match the tape. Check also that the TV raster
format used in the tapes (i.e. number of lines, frames/second, scanning
order, etc.) is appropriate to the TV equipment available. (Specialist advice
may have to be sought on this aspect.) All video tapes should be test-run
prior to their use on the course.
.5 Computer equipment
If computer-based aids are used, check their compatibility with the projector
and the available software.
.6 General note
The electricity supply should be checked for correct voltage, and every
precaution should be taken to ensure that the equipment operates properly
and safely. It is important to use a proper screen which is correctly positioned;
it may be necessary to exclude daylight in some cases. A check should be
made to ensure that appropriate screens or blinds are available. All material
to be presented should be test-run to eliminate any possible troubles,
arranged in the correct sequence in which it is to be shown, and properly
identified and cross-referenced in the lesson plans.
The content of the course, and therefore its standard, reflects the requirements of all the
relevant IMO international conventions and the provisions of other instruments as indicated in
the model course. The relevant publications can be obtained from the Publication Service of
IMO, and should be available, at least to those involved in presenting the course, if the
indicated extracts are not included in a compendium supplied with the course.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 43
3.11 Textbooks
The detailed syllabus may refer to a particular textbook or textbooks. It is essential that these
books are available to each student taking the course. If supplies of textbooks are limited, a
copy should be loaned to each student, who will return it at the end of the course. Again, some
courses are provided with a compendium which includes all or part of the training material
required to support the course.
3.12 Bibliography
Any useful supplementary source material is identified by the course designers and listed in
the model course. This list should be supplied to the participants so that they are aware where
additional information can be obtained, and at least two copies of each book or publication
should be available for reference in the training institute library.
3.13 Timetable
Model courses are developed providing a recommended range in duration of time for lectures,
demonstrations, laboratories or simulator exercises and assessment. No formal timetable is
included in model courses.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 44
1 Preparation
1.3 Obtain the necessary textbooks or reference papers which cover the training area to
be presented.
1.4 Identify the equipment which will be needed, together with support staff necessary for
its operation.
1.5 It is essential to use a "lesson plan", which can provide a simplified format for
coordinating lecture notes and supporting activities. The lesson plan breaks the material down
into identifiable steps, making use of brief statements, possibly with keywords added, and
indicating suitable allocations of time for each step. The use of audiovisual material should be
indexed at the correct point in the lecture with an appropriate allowance of time.
The audiovisual material should be test-run prior to its being used in the lecture. An example
of a lesson plan is shown in annex A3.
1.6 The syllabus is structured in training outcome format and it is thereby relatively
straight forward to assess each trainee's grasp of the subject matter presented during the
lecture. Such assessment may take the form of further discussion, oral questions, written tests
or selection-type tests, such as multiple-choice questions, based on the objectives used in the
syllabus. Selection-type tests and short-answer tests can provide an objective assessment
independent of any bias on the part of the assessor. For certification purposes, assessors
should be appropriately qualified for the particular type of training or assessment.
1.7 Check the rooms to be used before the lecture is delivered. Make sure that all the
equipment and apparatus are ready for use and that any support staff are also prepared and
ready. In particular, check that all blackboards are clean and that a supply of writing and
cleaning materials is readily available.
2 Delivery
2.1 Always face the people you are talking to; never talk with your back to the group.
2.3 Maintain eye contact with the whole group as a way of securing their interest and
maintaining it (i.e. do not look continuously at one particular person, nor at a point in space).
2.4 People are all different, and they behave and react in different ways. An important
function of an instructor is to maintain interest and interaction between members of a group.
2.5 Some points or statements are more important than others and should therefore be
emphasized. To ensure that such points or statements are remembered, they should be
restated a number of times, preferably in different words.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 45
2.6 If a blackboard is to be used, any writing on it should be clear and large enough for
everyone to see. Use colour to emphasize important points, particularly in sketches.
2.7 It is only possible to maintain a high level of interest for a relatively short period of
time; therefore, break the lecture up into different periods of activity to keep interest at its
highest level. Speaking, writing, sketching, use of audiovisual material, questions, and
discussions can all be used to accomplish this. When a group is writing or sketching, walk
amongst the group, looking at their work, and provide comment or advice to individual
members of the group when necessary.
2.8 When holding a discussion, do not allow individual members of the group to
monopolize the activity, but ensure that all members have a chance to express opinions or
ideas.
2.9 If addressing questions to a group, do not ask them collectively; otherwise, the same
person may reply each time. Instead, address the questions to individuals in turn, so that
everyone is invited to participate.
2.10 It is important to be guided by the syllabus content and not to be tempted to introduce
material which may be too advanced, or may contribute little to the course objective. There is
often competition between instructors to achieve a level which is too advanced.
Also, instructors often strongly resist attempts to reduce the level to that required by a syllabus.
2.11 Finally, effective preparation makes a major contribution to the success of a lecture.
Things often go wrong; preparedness and good planning will contribute to putting things right.
Poor teaching cannot be improved by good accommodation or advanced equipment, but good
teaching can overcome any disadvantages that poor accommodation and lack of equipment
can present.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 46
1 Curriculum
The dictionary defines curriculum as a "regular course of study", while syllabus is defined as
"a concise statement of the subjects forming a course of study". Thus, in general terms, a
curriculum is simply a course, while a syllabus can be thought of as a list (traditionally, a "list
of things to be taught").
2 Course content
The subjects which are needed to form a training course, and the precise skills and depth of
knowledge required in the various subjects, can only be determined through an in-depth
assessment of the job functions which the course participants are to be trained to perform
(job analysis). This analysis determines the training needs, hence the purpose of the course
(course objective). After ascertaining this, it is possible to define the scope of the course.
(Note: Determination of whether or not the course objective has been achieved may quite
possibly entail assessment, over a period of time, of the "on-the-job performance" of those
completing the course. However, the detailed learning objectives are quite specific and
immediately assessable).
3 Job analysis
A job analysis can only be properly carried out by a group whose members are representative
of the organizations and bodies involved in the area of work to be covered by the course.
The validation of results, via review with persons currently employed in the job concerned, is
essential if undertraining and overtraining are to be avoided.
4 Course plan
Following definition of the course objective and scope, a course plan or outline can be drawn
up. The potential students for the course (the trainee target group) should then be identified,
the entry standard to the course decided and the prerequisites defined.
5 Syllabus
The final step in the process is the preparation of the detailed syllabus with associated
timescales; the identification of those parts of textbooks and technical papers which cover the
training areas to a sufficient degree to meet, but not exceed, each learning objective; and the
drawing up of a bibliography of additional material for supplementary reading.
6 Syllabus content
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 47
7 Training outcomes
7.1 The prime communication difficulty presented by any syllabus is how to convey the
"depth" of knowledge required. A syllabus is usually constructed as a series of
"training outcomes" to help resolve this difficulty.
7.2 Thus, curriculum development makes use of training outcomes to ensure that a
common minimum level and breadth of attainment is achieved by all the trainees following the
same course, irrespective of the training institution (i.e. teaching/lecturing staff).
7.3 Training outcomes are trainee-oriented, in that they describe an end result which is to
be achieved by the trainee as a result of a learning process.
7.4 In many cases, the learning process is linked to a skill or work activity and, to
demonstrate properly the attainment of the objective, the trainee response may have to be
based on practical application or use, or on work experience.
7.5 The training outcome, although aimed principally at the trainee to ensure achievement
of a specific learning step, also provides a framework for the teacher or instructor upon which
lessons or lectures can be constructed.
7.6 A training outcome is specific and describes precisely what a trainee should do to
demonstrate his knowledge, understanding or skill as an end product of a learning process.
7.7 The learning process is the "knowledge acquisition" or "skill development" that takes
place during a course. The outcome of the process is an acquired "knowledge",
"understanding", "skill"; but these terms alone are not sufficiently precise for describing a
training outcome.
7.8 Verbs, such as "calculates", "defines", "explains", "lists", "solves" and "states", should
be used when constructing a specific training outcome, so as to define precisely what the
trainee will be enabled to do.
7.9 In the IMO model course project, the aim is to provide a series of model courses to
assist instructors in developing countries to enhance or update the maritime training they
provide, and to allow a common minimum standard to be achieved throughout the world. The
use of training outcomes is a tangible way of achieving this desired aim.
8 Assessment
I:\HTW\8\HTW 8-3-2-Add.1.docx
Annex A1 - Preparation checklist
Ref Component Identified Reserved Electricity Purchases Tested Accepted Started Finished Status OK
supply
Annex, page 48
1 Course plan
HTW 8/3/2/Add.1
2 Timetable
3 Syllabus
I:\HTW\8\HTW 8-3-2-Add.1.docx
4 Scope
5 Objective
6 Entry standard
7 Preparatory course
8 Course certificate
9 Participant numbers
10 Staffing:
Coordinator
Lecturers
Instructors
Technicians
Other
Annex A1 - Preparation checklist (continued)
Ref Component Identified Reserved Electricity Purchases Tested Accepted Started Finished Status OK
supply
11 Facilities
a) Rooms
Lab
I:\HTW\8\HTW 8-3-2-Add.1.docx
Workshop
Other
Class
b) Equipment
Lab
Workshop
Other
OHP
Slide
Cine
Video
13 IMO Reference
14 Textbooks
Annex, page 49
HTW 8/3/2/Add.1
15 Bibliography
HTW 8/3/2/Add.1
Annex, page 50
Textbooks: No specific textbook has been used to construct the syllabus, but the
instructor would be assisted in preparation of lecture notes by referring to suitable books on
ship construction, such as Ship Construction by Eyres (T12) and Merchant Ship Construction
by Taylor (T58)
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 51
Course Outline
Competence :
.1 Shipbuilding materials 3
.2 Welding 3
.3 Bulkheads 4
.7 Stability 83 102
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 52
Introduction
The detailed teaching syllabus is presented as a series of learning objectives. The objective,
therefore, describes what the trainee should do to demonstrate that the specified knowledge
or skill has been transferred.
In order to assist the instructor, references are shown to indicate IMO references and
publications, textbooks and teaching aids that instructors may wish to use in preparing and
presenting their lessons.
The material listed in the course framework has been used to structure the detailed training
syllabus; in particular:
The information on each table is systematically organized in the following way. The line at the
head of the table describes the FUNCTION with which the training is concerned. A function
means a group of tasks, duties and responsibilities as specified in the STCW Code. It describes
related activities which make up a professional discipline or traditional departmental
responsibility on board.
The header of the first column denotes the COMPETENCE concerned. Each function
comprises a number of COMPETENCES. Each competence is uniquely and consistently
numbered on this model course.
In this function the competence is Control Trim, Stability and Stress. It is numbered 3.1, that
is the first competence in Function 3. The term "competence" should be understood as the
application of knowledge, understanding, proficiency, skills, experience for an individual to
perform a task, duty or responsibility on board in a safe, efficient and timely manner.
Shown next is the required TRAINING OUTCOME. The training outcomes are the areas of
knowledge, understanding and proficiency in which the trainee should be able to demonstrate
knowledge and understanding. Each COMPETENCE comprises a number of training
outcomes. For example, the above competence comprises three training outcomes. The first
is concerned with FUNDAMENTAL PRINCIPLES OF SHIP CONSTRUCTION, TRIM AND
STABILITY. Each training outcome is uniquely and consistently numbered in this model
course. That concerned with fundamental principles of ship construction, trim and stability is
uniquely numbered 3.1.1. For clarity, training outcomes are printed in black type on grey, for
example TRAINING OUTCOME.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 53
meeting the specified Required performance. For the training outcome concerned with the
fundamental principles of ship construction, trim and stability there are three areas of
performance. These are:
3.1.1.2 Welding
3.1.1.3 Bulkheads
Following each numbered area of Required performance there is a list of activities that the
trainee should complete and which collectively specify the standard of competence that the
trainee should meet. These are for the guidance of teachers and instructors in designing
lessons, lectures, tests and exercises for use in the teaching process. For example, under the
topic 3.1.1.1, to meet the Required performance, the trainee should be able to:
- state that steels are alloys of iron, with properties dependent upon the type and
amount of alloying materials used
- state that the specification of shipbuilding steels are laid down by classification
societies
IMO references (Rx) are listed in the column to the right-hand side. Teaching aids (Ax), videos
(Vx) and textbooks (Tx) relevant to the training outcome and Required performances are
placed immediately following the TRAINING OUTCOME title.
It is not intended that lessons are organized to follow the sequence of Required performances
listed in the Tables. The Syllabus Tables are organized to match with the competence in the
STCW Code, table A-II/2. Lessons and teaching should follow college practices. It is not
necessary, for example, for shipbuilding materials to be studied before stability. What is
necessary is that all of the material is covered and that teaching is effective to allow trainees
to meet the standard of the Required performance.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 54
– states that steels are alloys of iron, with properties dependent upon the type and
R1
amounts of alloying materials used
– states that the specifications of shipbuilding steels are laid down by classification
societies
– states that shipbuilding steel is tested and graded by classification surveyors,
who stamp it with approved marks
– explains that mild steel, graded A – E, is used for most parts of the ship
– states why higher tensile steel may be used in areas of high stress, such as the
sheer strake
– explains that the use of higher tensile steel in place of mild steel results in
saving of weight for the same strength
– explains what is meant by:
– tensile strength
– ductility
– hardness
– toughness
– defines strain as extension divided by original length
– sketches a stress-strain curve for mild steel
– explains
– yield point
– ultimate tensile stress
– modulus of elasticity
– explains that toughness is related to the tendency to brittle fracture
– explains that stress fracture may be initiated by a small crack or notch in a plate
– states that cold conditions increase the chances of brittle fracture
– states why mild steel is unsuitable for the very low temperatures involved in the
containment of liquefied gases
– lists examples where castings or forgings are used in ship construction
– explains the advantages of the use of aluminium alloys in the construction of
superstructures
I:\HTW\8\HTW 8-3-2-Add.1.docx
Annex A3 - Example of a lesson plan for annex A2
Subject area: 3.1 Control trim, stability and stress Lesson Number: 1 Duration: 3 hours
Training Area: 3.1.1 Fundamental principles of ship construction, trim and stability
Main element Teaching Textbook IMO A/V aid Instructor Lecture notes Time
I:\HTW\8\HTW 8-3-2-Add.1.docx
Specific training outcome in teaching method Reference guidelines (minutes)
sequence, with memory keys
Sties that steels are alloys of iron, with Lecture T12, T58 STCW 1V2, V5 to V7 A1 Compiled by 10
properties dependent upon the type and A-11/2 the lecturer
amounts of alloying materials used
States that the specifications of shipbuilding Lecture T12, T58 STCW 1V2, V5 to V7 A1 Compiled by 20
steels are laid down by classification societies A-11/2 the lecturer
Explains that mild steel, graded A to E, is used Lecture T12, T58 STCW 1V2, VS to V7 A1 Compiled by 15
for most parts of the ship A-11/2 the lecturer
States why higher tensile steel may be used in Lecture T12, T58 STCW 1V2, V5 to V7 A1 Compiled by 10
areas of high stress, such as the sheer strake A-11/2 the lecturer
Explains that use of higher tensile steel in place Lecture T12, T58 STCW 1V2, V5 to V7 A1 Compiled by 15
of mild steel results in a saving of weight for the A-11/2 the lecturer
same strength
Annex, page 55
HTW 8/3/2/Add.1
HTW 8/3/2/Add.1
Annex, page 56
Introduction
1 IMO model courses are periodically revised to take into account the changes which
have taken place in relevant Conventions, codes, resolutions and other matters affecting each
course. To help IMO to improve the content of courses when they are revised, the assistance
of all instructors who implement or participate in implementing courses is requested, whether
the implementation is part of an IMO technical cooperation project or part of a Maritime Training
Academy's regular programme.
2 To simplify their consolidation by IMO, the technical comments and suggestions for
the improvement of model courses should follow the format that is outlined below. If no
comments or suggestions are to be provided under a topic, please insert "no comment" against
the item.
3 Please identify:
.1 number of participants who met the entry standards and the number who did
not;
5 In commenting on Part B – Course outline, please bear in mind that minor variations
in time allocations are inevitable. Major difficulties with allocations of time and any omissions
or redundancies of subject areas should be briefly explained.
I:\HTW\8\HTW 8-3-2-Add.1.docx
HTW 8/3/2/Add.1
Annex, page 57
8 Any further comments or suggestions you may have which fall outside the scope of
the items listed above may be added at the end. In particular, your views on the usefulness of
the course material to you in implementing the course would be appreciated, as would the
contribution to IMO of any additional teaching material you found useful in implementing it.
___________
I:\HTW\8\HTW 8-3-2-Add.1.docx