Name *FirstLastEmail *Course Selection *BOMB THREAT PLANNING & MANAGEMENT (BTPM) COUNTERING TERRORISM & the ASSET THREAT SPECTRUM (CATS)COMPETITIVE COUNTER INTELLIGENCE (CCI)COMPUTER FORENSIC ANALYSIS (CFA)COVERT INVESTIGATION & SURVEILLANCE TECHNOLOGY (CIST)CASE MANAGEMENT and REPORT WRITING (CMRW) DIGNITARY PROTECTION & OPERATIONAL PROCEDURES (DPOP) ISA EXECUTIVE PROTECTION AND DIGNITARY PROTECTION SPECIALIST - INCLUDES (DPOP) (EVIP) EXECUTIVE PROTECTION TACTICAL MEDIC (EPTM)EXECUTIVE/VIP PROTECTION & PLANNING (EVIP)EMERGING GLOBAL THREATS & GEOPOLITICAL IMPACTS (GTGI)HARBOR & MARITIME SECURITY: "Protecting America's Ports" (HMS)HOMELAND SECURITY: "Protecting Critical Infrastructure" (HLS)INTERVIEWS and INTERROGATIONS (I&I)INCIDENT RESPONSE FOR BUSINESS & INDUSTRY (IRBI)INDUSTRIAL SECURITY SYSTEMS - DESIGN & APPLICATION (ISS)INVESTIGATIVE TECHNIQUES and PROCEDURES (ITP)NON VIOLENT CRISIS INTERVENTION (NVCI)PROTECTION OF COMPUTERS & PROPRIETARY INFORMATION (PCPI)ROOT ISSUES & CAUSAL EFFECTS - CYBER (RICE-C)RISK MANAGEMENT for GOVERNMENT & INDUSTRY (RMGI)SECURITY COUNTERMEASURES for GOVERNMENT & INDUSTRY (SCGI) SECURING CYBER-SPACE (SCS)SECURING EDUCATIONAL FACILITIES: "Ensuring Safety on Campus" (SEF)SECURING MASS TRANSIT: "Enhancing Passenger Safety" (SMT)TECHNICAL SURVEILLANCE COUNTER MEASURES (TSCM)TELCO TECHNOLOGY INVESTIGATIONS (TTI) UNDERSTANDING SECURITY TECHNOLOGIES (UST)VIOLENCE IN THE WORKPLACE (VIW)Comment or Message *MessageSubmit