Department of Homeland Security. Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff
|
|
|
- Ashlyn Carr
- 10 years ago
- Views:
Transcription
1 Department of Homeland Security Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff Course Syllabus May 2006 INTERNATIONAL TRAINING, INC. Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff
2 TABLE OF CONTENTS Background 3 Scope 3 Level of Training 3 Course Description 3 Instructor/Student Ratio 4 Program Evaluation Strategy 4 Participant Resource Requirements 4 Module 1 4 Course Overview/Objectives/Handouts/Logistics Pre-course Assessment Module 2 4 Lesson1 (part 1) Attack Methodology/Attack Cycle/Pre-incident Indicators Lesson 1 (part 2) Vulnerability Analysis Lesson 2 Vulnerability Analysis Practical Exercise Module 3 5 Lesson 1 Hostile Surveillance Positions (Red Zone) Lesson 2 Red Zone Design Practical Exercise Red Zone Exercise Debrief Lesson 3 Surveillance Detection (SD) Lesson 4 Surveillance Detection Position Practical Exercise SD Exercise Debrief Module 4 6 Lesson 1 Developing the Surveillance Detection Plan Lesson 2 Observation and Reporting Module 5 6 Critical Infrastructure Buffer Zone Capstone Exercise Exercise Debrief with Role Players Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff 2
3 Post-course Assessment Background This course in Surveillance Detection (SD) Plans and Operations is designed to provide a guideline for mitigating risks to critical infrastructure. Instructors explain how this protective measure can be applied to detect and deter potential threats to critical infrastructure and key resources (CI/KR) as well as the fundamentals for detecting surveillance activity. Students apply skills such as Vulnerability and Red Zone Analysis, Surveillance Detection and Observation and Reporting during practical exercises throughout the course. Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff Scope of Training and Course Goal: Provide students with the knowledge to develop a Surveillance Detection Plan. Course Learning Objectives: 1. Employ fundamentals of Surveillance Detection related to a facility. 2. Develop actionable Surveillance Detection plan. 3. Report observations with necessary details to aid security officials in their efforts. Level of Training: Planning/Management Course This Surveillance Detection course designed for commercial infrastructure operators and security staff provides a foundation for developing and applying plans which include the fundamentals of Surveillance Detection, recognizing the indicators of an imminent attack, implementing appropriate responses and reporting observations with the necessary details to aid security officials. The course is broken down into learning modules that cover the following topic areas: Vulnerability Assessments Identifying Hostile Surveillance positions (understanding Red Zone) Employing the fundamentals of Surveillance Detection Developing plans and procedures, which include resourcing, reporting and response policies to observe and report suspicious individuals and activity around CI/KR. Students attend classroom seminars for each module of instruction, which cover the topics listed in the table of contents. Each module of instruction incorporates practical hands on learning exercises to reinforce concepts and skills taught. The course culminates with a capstone exercise. Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff 3
4 Each day of instruction is a full day. Students are given a lunch break, which varies in time depending on daily activities. Instructor to Student Ratio for all Modules: 2:25 Program Evaluation Strategy: A training evaluation model is used to monitor program effectiveness. A Level 1 exit questionnaire is used to capture participants reaction to training. A Level 2 pre and post assessment is used to compare/contrast entry to exit level knowledge. Participant Resource Requirements: Student Handouts Pen/Pencil Paper Day 1 Module 1: Course Overview Duration: This module of instruction introduces students to the teaching methodology and background for the course. The daily routine and logistics requirements are established as well as individual responsibilities throughout the course. The course pre-assessment is administered during this module. Student handouts are distributed. Purpose: 1. Outline course of instruction, teaching methodologies, daily routine and course logistics 2. Determine baseline knowledge level of each student Module 2: Attack Methodology/Attack Cycle/Pre-incident Indicators/Vulnerability Analysis Duration: This module of instruction is comprised of two lessons. The first lesson is broken into 2 parts and takes two to three hours to complete. Lesson 1, part 1 includes facility attacks and pre-incident indicators. Lesson 1, part 2 focuses on Vulnerability Analysis. Lesson two is the practical exercise. Students are briefed on the exercise and then spend the next several hours conducting a Vulnerability Analysis. The last segment of class is the exercise debrief. Module 2 Terminal Objective: Following Lesson 1, parts 1 and 2 and given the exercise worksheet on page eight of the student guide, students conduct a Facility Vulnerability Analysis (FVA) and brief the instructors on their findings (practical exercise). Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff 4
5 Enabling Objectives: Lesson 1/Part 1: 1. Recall terrorist attack trends, techniques/methods 2. Recall the five defensive measures 3. Recall the three rings of security and explain the importance of each. 4. Recall the 7-step attack cycle 5. Describe the detectable points (weak links) within the attack cycle Lesson 1/Part 2: 1. Recall the 8 components of a vulnerability analysis 2. Recall predictable activities associated with a facility Lesson 2: Conduct a Facility Vulnerability Analysis (FVA) and brief the instructors on the findings. Day 2 Module 3: Hostile Surveillance Positions (Red Zone) and Practical Exercise/Surveillance Detection and Practical Exercise Duration: This module of instruction focuses on the fundamentals of surveillance detection, hostile surveillance positioning (red zone) and SD positioning. The module is comprised of four lessons. Lesson one classroom presentation is one-hour and covers Hostile Surveillance Positions (Red Zone). Lesson two; practical exercise in support of this presentation is scheduled for two hours and the debrief is scheduled for one hour. Lesson three classroom presentation, Surveillance Detection, is one hour. Lesson three; practical exercise in support of this lesson is scheduled for two hours and the debrief is scheduled for one hour. Terminal Objective: Following the classroom presentations and given the exercise worksheet in the student guide, identify Surveillance Detection Positions. Enabling Objectives: Lesson 1: Recall the basic requirements of Red Zone design Lesson 2: Design a Red Zone related to a specific location (practical exercise) Lesson 3: Recall the basic requirements of surveillance positions Lesson 4: Select SD positions in support of a specific location (practical exercise) Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff 5
6 Day 3 Module 4: The SD Plan and Observation and Reporting Duration: This module of instruction takes place in the classroom and is divided into two separate presentations. Lesson one is a 1-hour classroom presentation focusing on the importance of developing a Surveillance Detection Plan. Lesson two is a classroom presentation and practical exercise designed to help students hone their observation and reporting skills. Lesson two presentation is brief. Students spend the better part of the class period participating in the observation exercise. Terminal Objective: Using the information gathered, develop a Surveillance Detection Plan. Enabling Objectives: Lesson 1: 1. Recall the key elements of facility SD planning 2. Recall the key questions for facility SD planning Lesson 2: Demonstrate the ability to observe and recall details of appearance Module 5: Capstone Exercise Duration: This module of instruction is based upon work accomplished during the previous modules of instruction. Students apply what they have learned in a validation exercise scenario working against role players. Exercise debrief and post course assessment take place immediately following the exercise. Purpose: Ensure each student has the knowledge, skills and abilities to detect surveillance Terminal Objective: Detect surveillance using the methods and techniques learned throughout the course Enabling Objective: Working against role players and given the information collected throughout the duration of the course, detect and accurately report surveillance activities related to a designated facility. Conclusion: Review & Administer Post-course Assessment Students complete course critique Graduation/Certificate Presentation Surveillance Detection Training for Commercial Infrastructure Operators and Security Staff 6
Program of Instruction Course Syllabus
Program of Instruction Course Syllabus Course Title: All Hazards Logistics Section Chief Course : 32 Hours Program: Homeland Security, NIMS Course Prerequisites: ICS 100, 200, 300, 700, 800, ICS 400 (Recommended)
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District Securing the Nation s s critical infrastructures one community at a time Critical Infrastructure & Key Resources
Background. Scope. Organizational Training Needs
1 Training Plan Template As described in Section 4.2.1 of the Training Effectiveness Toolkit, a Training Plan will help define the specific activities that will be conducted to carry out the training strategy.
Incident Response to Terrorist Bombings (IRTB) Information Package
Weapons of Mass Destruction Training Incident Response to Terrorist Bombings (IRTB) Information Package (09/01/06) New Mexico Tech Energetic Material Research and Testing Center EMRTC 801 Leroy Place Socorro,
Hazardous Materials Training for First Responder Operations (FRO)
Hazardous Materials Training for First Responder Operations (FRO) Course Duration: The course includes 24 hours of instruction. It can be taught in three 8-hour days or it may be divided into other blocks
Flooding Emergency Response Exercise
Flooding Emergency Response Exercise James Woodward, Senior Exercise Planner California Emergency Management Agency 3650 Schriever Ave. Mather, CA 95655 Cell: (916) 439-3546 Email: [email protected]
Virginia Defense Force
Virginia Defense Force Instructor Development Course By Lt. Col. (VA) Stewart W. Bentley, PhD 1 Course Objectives At the end of this course, you will be able to identify: Principles of Adult Learners.
Contract Instructor Statement of Work
Contract Instructor Statement of Work BACKGROUND The Stafford Act of 1974, Public Law (PL) 100-707 and PL 93-288, gives FEMA the responsibility for coordinating government-wide relief efforts and responsibility
Course Description for Bank Operations Simulation (S&R Technology Lab)
Federal Reserve Board of Governors Course Description for Bank Operations Simulation (S&R Technology Lab) Last Revised: June 2009 [Page Break] STREAM Supervision Technology Risks Educate, Analyze and Manage
Instructional Design Skills for Reproductive Health Professionals. Course Handbook for Participants
Instructional Design Skills for Reproductive Health Professionals Course Handbook for Participants Presentation graphics summarizing the key points related to this topic are now available on ReproLine
Training Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Cyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) [email protected] www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
Massachusetts Department of Elementary and Secondary Education. Professional Development Self- Assessment Guidebook
Massachusetts Department of Elementary and Secondary Education Professional Development Self- Assessment Guidebook For Teacher Professional Development Offerings Modified for use by the District and School
SAMPLE COURSE SYLLABUS*
DSS CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE (CDSE) EDUCATION DIVISION Managing a DoD Installation Security Program ED 507 SAMPLE COURSE SYLLABUS* A. DESCRIPTION The 2007 Defense Installations Plan
How To Teach Math To A Grade 8
Program Overview Introduction Program Structure This guide explains the program components and philosophy of the research-based program, Math Navigator, Common Core Edition. Math Navigator blends conceptual
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
Instructional Design Skills for Reproductive Health Professionals. Course Notebook for Trainers
Instructional Design Skills for Reproductive Health Professionals Course Notebook for Trainers Presentation graphics summarizing the key points related to this topic are now available on ReproLine at www.reproline.jhu.edu.
Air Cargo Security Awareness Training. Guidance for Regulated Air Cargo Agents
Air Cargo Security Awareness Training Guidance for Regulated Air Cargo Agents November 2014 Contents INTRODUCTION... 3 ABOUT SECURITY AWARENESS TRAINING... 3 PREPARING AIR CARGO SECURITY AWARENESS INFORMATION...
ELENTLESS RELENTLESS IN THE FIGHT AGAINST TERRORISM EXPERIENCED SUBJECT MATTER EXPERTS FULL SPECTRUM OF CAPABILITIES CURRENT AND RELEVANT SOLUTIONS
1 ELENTLESS RELENTLESS IN THE FIGHT AGAINST TERRORISM EXPERIENCED SUBJECT MATTER EXPERTS FULL SPECTRUM OF CAPABILITIES CURRENT AND RELEVANT SOLUTIONS Train for certainty; educate for uncertainty. Global
Wando High School Career and Technology Education Advanced Cyber Security. Planning Period: 4th block
Wando High School Career and Technology Education Advanced Cyber Security Teacher: Mr. Hundley School Phone #: 856 5800 ext 27385 Room/Office: L 310 Planning Period: 4th block Office Hours: T, TH, F 7:30
VIP Protection Tactical Course
VIP Protection Tactical Course Course Topics Include: Crisis Recognition and Reaction Roles and Responsibilities of the VIP Protection Agent, Krav Maga for VIP Protection Firearms The Operational Advance
Law Enforcement and Homeland Security Anti-Terrorism Training
Law Enforcement and Homeland Security Anti-Terrorism Training Our Experience Influences Your Success Florida Department of Law Enforcement A close partnership was developed between FDLE and ASERO while
TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY
Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,
NIMS ICS 100.HCb. Instructions
NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers
Historical Grant Funding Awarded to U.S. Colleges and Universities
Historical Overview of DHS-FEMA Grant Programs Awarded to U.S. Colleges and Universities The preparedness programs administered by the Grant Programs Directorate within the Federal Emergency Management
February 2014. FEMA Course Number MN-005-RESP MN POST Board Course Number: 9803-0005 Course Information and Design
February 2014 FEMA Course Number MN-005-RESP MN POST Board Course Number: 9803-0005 Course Information and Design MESB 2012, 2013, 2014 Course Description Overview The purpose of this course is to teach
8 Steps for Turning 360 Feedback into Results. Leadership Intelligence White Paper // Paul Warner, Ph.D.
8 Steps for Turning 360 Feedback into Results Leadership Intelligence White Paper // Paul Warner, Ph.D. 8 Steps for Turning 360 Feedback into Results By Paul Warner, Ph.D. Global Employee Engagement Architect
This module introduces the use of informal career assessments and provides the student with an opportunity to use an interest and skills checklist.
Building Career Facilitation Skills Module 3: Informal Career Assessments Facilitator s Curriculum Time Required: 1 hour Summary and Rationale This module introduces the use of informal career assessments
NAVSEA Leadership Development Continuum
NAVSEA Leadership Development Continuum The Continuum allows employees to focus on leadership development through various stages of their careers, in preparation for future opportunities with the organization.
SOTERIA. Understanding, Training, Contingency. Understanding, Training, Contingency
SOTERIA Understanding, Training, Contingency Understanding, Training, Contingency Keel Strategic s formation in 2010 was the collaborative work of a number of people from across the emerging investment
NMLS Course Application Online Self Study Format
NMLS Course Evaluation Form The following form is to be used in the evaluation process for determining whether or not to approve a request to have a course NMLS approved. Part One of the form focuses on
Interpersonal Communication Skills for Differential Diagnosis of Fever in Children
Interpersonal Communication Skills for Differential Diagnosis of Fever in Children National Master Trainer TOT Guide for training District Trainers Uganda July, 2013 TOT Guide Page 2 About this TOT Guide
Instructor Guide. Train-the-Trainer
Train-the-Trainer This instructor guide was written and developed by the Community Services Agency, Inc. of the New Jersey State AFL-CIO. DISCLAIMER: This material was produced under a Susan Harwood Training
How To Learn The Incident Command System
Incident Command System Training Guide Course description ICS - 100 Introduction to ICS is intended for personnel assigned to an incident or event who have a minimum requirement for understanding ICS.
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Studio Graphic Design Syllabus
Studio Graphic Design Syllabus Instructor: Mrs. Tracy Mintz Room: 504 Email: [email protected] Phone: 206-230-6312 Website: www.mercerislandschools.org/domain/1546 1 semester:.5 credit
Master of Science in Information Security and Assurance
Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are
Emergency Support Function 14 Long-Term Community Recovery and Mitigation
ESF Coordinator: Grant County Emergency Management Primary Agencies: Grant County Emergency Management Grant County Assessor s Office Grant County Public Works Grant County Building Department Support
St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus
St Petersburg College CTS1120 Online Intro Network Security Foundations - (8 weeks online) PROFESSOR: Ryan Irving Course Syllabus Instructor Web Page: http://www.spcollege.edu/instructors/id/irving.ryan
Survey: SFM Minimum Standards
Survey: SFM Minimum Standards DIVISION OF STATE FIRE MARSHAL Firefighter Minimum Standards Survey The Division of State Fire Marshal is facilitating a review of the Firefighter Minimum Standards Program.
DDSGN 150 Fall, 2010 9/27-12/6 M 12:45-2:55 PM + 2.5 hr ARR Room: Olympic 302 Prereq's: CIS 121 or permission
syllabus schedule assignments resources w DDSGN 150 Fall, 2010 9/27-12/6 M 12:45-2:55 PM + 2.5 hr ARR Room: Olympic 302 Prereq's: CIS 121 or permission Section: 1213 AF 5 Credits Instructors Info: Professor
2011 Pediatric Advanced Life Support (PALS) Classroom Course & Materials Frequently Asked Questions (FAQs) As of November 3, 2011
2011 Pediatric Advanced Life Support (PALS) Classroom Course & Materials Frequently Asked Questions (FAQs) As of November 3, 2011 Course Information Q: What is the PALS Course? A: The American Heart Association
How To Pass A Hearing Code
STUDENT 1. User Guide for HeartCode ACLS 1 TABLE OF CONTENTS INTRODUCTION TO HEARTCODE ACLS 3 HEARTCODE ACLS REQUIRED ACTIVITIES 4 HEARTCODE ACLS OVERVIEW 4 HOW TO ACCESS HEARTCODE ACLS PART ONE 6 HOW
WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO 64067. Course Syllabus
HS101 Principles of August 24 December 14, 2010 Instructor: Bret E. Brooks [email protected] -? [email protected] Course Description: WENTWORTH MILITARY ACADEMY JUNIOR COLLEGE Lexington, MO 64067 Course
Procedure: Hazardous Materials Medical Support and Rehabilitation Functions
Procedure: HAZARDOUS MATERIALS MEDICAL SUPPORT Purpose: This standard operating procedure requires that a medical support function be designated to the Hazardous Materials Group during all operations within
Drill of the Dead: Using Zombie Scenarios to Train Community Partners
Drill of the Dead: Using Zombie Scenarios to Train Community Partners Adam Powers, BS Preparedness Training and Exercise Coordinator Montana Department of Public Health and Human Services Brett Lloyd,
GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
Hazardous Materials Transportation Security Planning
Objectives To better understand security threats; To detail new security requirements; and To provide guidance and resources to assist in developing and adhering to a security plan. PART I Understanding
Training for Hazardous Materials Response: Technician
Training for Hazardous Materials Response: Technician Course Duration: 80 hours (10 days). Learning Objectives: Given an 80-hour course on hazardous materials response, students will be able to describe
Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours
Bergen Community College Division of Business, Social Science and Criminal Justice and Homeland Security Department of Criminal Justice and Homeland Security Master Course Syllabus Course Title: HSE-101
Course Title Penetration Testing: Procedures & Methodologies
Course Title Penetration Testing: Procedures & Methodologies Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics
Homeland Security for Schools: Threat Status Alert Worksheet
for Schools: Threat Status Alert Worksheet The Green Alert Status reflects a low risk of terrorist attacks. The primary goal of a safe school plan is to safeguard schools against crime, violence and disruption.
INTRODUCTION TO NETWORK SECURITY. Nischit Vaidya, CISSP Instructor
INTRODUCTION TO NETWORK SECURITY Nischit Vaidya, CISSP Instructor COPYRIGHT ARGOTIS, INC. 2 0 1 3 1 INSTRUCTOR BIOGRAPHY Nischit Vaidya, CISSP, Security+ President/CEO of Argotis, Inc. - Providing Cybersecurity
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
LESSON 3 -- CHECKING OUT CHECKING ACCOUNTS
LESSON 3 -- CHECKING OUT CHECKING ACCOUNTS LESSON DESCRIPTION AND BACKGROUND This lesson uses a poster Your Bank Account: 10 Questions to Ask from the Better Money Habits web site (www.bettermoneyhabits.com)
The Joint Commission Approach to Evaluation of Emergency Management New Standards
The Joint Commission Approach to Evaluation of Emergency Management New Standards (Effective January 1, 2008) EC. 4.11 through EC. 4.18 Revised EC. 4.20 Emergency Management Drill Standard Lewis Soloff
The Effect of Electronic Writing Tools on Business Writing Proficiency
The Effect of Electronic Writing Tools on Business Writing Proficiency Lisa Walters and Susan McNamara Lisa M. Walters is Visiting Assistant Professor of Business Administration and Susan McNamara is Assistant
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
Homeland Security Exercise Evaluation Program (HSEEP) INTRODUCTION & HSEEP FUNDAMENTALS
Homeland Security Exercise Evaluation Program (HSEEP) INTRODUCTION & HSEEP FUNDAMENTALS HSEEP Training Course Agenda Instructor Introduction Participant Introductions please respond with: Name preference
Tank Farm and Bulk Storage Fire Incidents
Instructor Manual Module 7 Tank Farm and Bulk Storage Fire Incidents Module Objective Upon the successful completion of this module, participants will be able to develop plans to fight or contain fires
INL PROGRAM PERFORMANCE METRIC EXAMPLES
1 INL PROGRAM PERFORMANCE METRIC EXAMPLES The purpose of this document is to assist Program Officers and Implementers with developing performance measurements that: 1. Are quantifiable 2. Are consistent
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
ADVANCED ALL-HAZARDS INCIDENT MANAGEMENT
FSTEP Course: Advanced All-Hazards Incident Management (2012) Hours: 48 Designed For: National Incident Management System (NIMS) Type-I Command and General Staff Description: All-hazards complex incident
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
College GP$: Goals, Problems, and $olutions
Course/Grade(s) Personal Finance/912 Module: My Financial Plan For Education Lesson Title: Does Debt Make Sense? Duration: 2 45 minute classes Materials/Resources/Technology: Student Activity Sheet B3A
NMLS Course Application Online Instructor Led Format
NMLS Course Evaluation Form The following form is to be used in the evaluation process for determining whether or not to approve a request to have an NMLS course approved. Part One of the form focuses
HIGHER EDUCATION COMMISSION English Language Teaching Reforms (ELTR) Phase II LI Division, Islamabad. Computer Assisted Language Learning (CALL)
HIGHER EDUCATION COMMISSION English Language Teaching Reforms (ELTR) Phase II LI Division, Islamabad Computer Assisted Language Learning (CALL) Short Term Courses/Fellowships One Week (36 hrs) HIGHER EDUCATION
AS 300 Lesson Objectives and Samples of Behaviors
Chapter 1. Introduction to Leadership Theory Cognitive Lesson Objective: Comprehend the importance of leadership in the operation and success of any organization. 1. Define the concept of leadership. (SG,
Master of Science in Emergency Management. EMGT 693: Field Experience Practicum. Student Field Experience Practicum Manual
Master of Science in Emergency Management EMGT 693: Field Experience Practicum Student Field Experience Practicum Manual EMGT 693: FIELD EXPERIENCE PRACTICUM Page 1 Table of Contents Section 1 Description,
Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE
Tampa Bay Catastrophic Plan ANNEX L: HURRICANE PHOENIX EXERCISE This page intentionally left blank Tampa Bay Catastrophic Plan Hurricane Phoenix A Storm Recovery Tabletop Exercise August 5, 2010 EXERCISE
Executive Protection Facility Security Convoy Escort
Executive Protection Facility Security Convoy Escort Who we are Trinity Defense Group is a highly professional security, consulting, and training organization. Trinity Defense coordinates a broad range
Urban Transport Security presented by Patrick Dillenseger RATP
Modular Urban Transport Safety and Security Analysis Final Conference 25 26 June 2012, Cologne Urban Transport Security presented by Patrick Dillenseger RATP 1 Table of Contents Urban Transport Security
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ETEC 275 Course Title: Computer and Network Security Division: Applied Science (AS) Liberal Arts (LA) Workforce
RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING
U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
ISM527 - Cyber Security Management
ISM527 - Cyber Security Management Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number
Program Title: Advanced Project Management Program ID: #1025924 Program Cost: $3,780 Duration: 37.5 hours. Program Description
Program Title: Advanced Project Management Program ID: #1025924 Program Cost: $3,780 Duration: 37.5 hours Program Description The Advance Project Management course is a training offering for professionals
TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING
Ralph Massaro VP of Operations TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING 10/26/2012 1 Humans - The Weakest Link? 82% of large organizations had staff driven security breaches(1) 47% had
Active Threat Scenario (ATS) RFP 1. INTRODUCTION
1. INTRODUCTION The Cook County Department of Homeland Security and Emergency Management (DHSEM) plays a lead role in the homeland security and emergency management mission within the Chicago Urban Area;
