• Introduction to the threat of terrorism 
  • Terrorism History overview
  • The objectives of terrorism
  • Terrorism trends
  • Types of Terrorism
  • Religious Terrorism
  • How terrorist and terrorist groups operate and structure
  • Terrorism financing
  • Terrorism and use of technology
  • Assisting and cooperation
  • Terrorist training 
  • Recruitment
  • The evolution of ISIS 
  • Lone wolf
  • Radicalization
  • Inside the terrorist mind
  • Terrorist Profile
  • Terrorist Classifications
  • Module summary
  • Terrorist operation planning
  • Terror Asymmetrical tactics
  • Target selection
  • How terrorist chooses his targets
  • Attack planning cycle
  • Intelligence gathering 
  • Types of Terrorist Surveillance
  • Hostile Surveillance Countermeasures
  • Explosives
  • IED Lab/ Factory
  • Pipe bomb
  • Switches
  • Detonators
  • Booby Traps
  • IED Containers
  • Power source
  • PIES
  • Blast Effect
  • Suicide bomber
    • Suicide Bomber process
    • Suicide bomber motives
    • Suicide bomber methods of deployment
    • Suicide bomber vest 
    • Suicide bomber modus operandi 
    • Suicide Bomber blast effect
    • Possible warning signs for SB
  • Vehicle Borne Improvised Explosive Device
    • VBIED familiarization 
    • Why are VBIED attacks so deadly? 
    • VBIED Methods of attacks 
    • Possible warning signs for VBIED
  • Standoff Bombing
    1. Standoff Bombing/Drones
    2. Standoff Bombing/ the threat from above
  • Armed Assault
  • Ramming attack
    1. Ramming attack/ methods of attack
  • Sharp edge weapons attacks
  • Kidnapping and Hostage taking 
  • Hijacking 
  • Threat, Hoax and Deception 
  • Assassination
  • Sabotage and Arson 
  • Penetration attacks
  • Cyberterrorism 
  • CBRN 
  • Module summary
  • Coping with terrorism
  • Introduction to security planning 
  • Key security concepts
  • Security planning
  • Security By design
    1. The security layers 
    2. Standoff distance 
    3. CPTED 
    4. Perimeter protection 
    5. Access control 
    6. Site Characteristics 
    7. Target hardening
  • Examples on how to cope with the threats 
  • Summery security planning
  • Introduction to security countermeasures 
  • Physical means
    1. Physical barriers
    2. Natural obstacles  
    3. Fences, and walls
    4. Gates
    5. Physical security lighting 
    6. Doors, and locks
    7. Safe rooms
    8. Windows and glazing 
    9. Blast mitigation
  • Security technologies
    1. Integrated security systems
    2. Video 
    3. Access control system 
    4. Intrusion detection system 
    5. Security screening technologies 
    6. Explosive trace detectors 
    7. Vehicles screening
    8. Counter drones 
    9. K9
  • Human factor
    1. Training
    2. Security force
  • The intelligence layer
  • Security processes
    1. Management of security 
    2. Maintenance of security 
    3. Threat indicators 
    4. The Access control process 
    5. Security questioning 
    6. Document verification 
    7. Mail screening 
    8. “Breaking the routine”
  • Personal safety
  • Summery security countermeasures
  • Preparedness and Response planning
    1. Emergency Management Cycle
    2. Emergency Response Plan
    3. Leadership
    4. Emergency Response Team (ERT)
    5. The Emergency Operation Center (EOC)
    6. Business Continuity Plan (BCP)
    7. Communication Plan
    8. Security Awareness programs
    9. Training and Drills plan
    10. Red Team
    11. Evacuation Plan
    12. Search Plan
  • Emergency Response
    1. Situational Awareness
    2. Armed and Unarmed security response
    3. Alert Level System
    4. Emergency Scenarios Guidelines
    5. Unified Command
    6. Active Shooters (armed security)
    7. Active Shooters (unarmed security)
    8. Bomb Threats
    9. Sharp-Edged Weapon attack
    10. Suspicious Packages/items
    11. Suspicious Mail
    12. Explosion (post-blast)
    13. Explosive device (pre-blast)
    14. Projectile weapon (rocket/mortar/missile)
    15. Suicide Bomber
    16. VBIED
    17. Vehicle-As-Weapon attack
    18. Hostage-Taking

LEAVE YOUR EMAIL FOR 10% OFF YOUR FIRST COURSE