Worldide Network Enterprises Homeland Security Training and Consulting
Course Calendar
(Please submit request for Courses and Calendar )
Homeland Security: "Protecting the Nation's Critical Infrastructure" (HS) ¨
Emergency Management for Business & Industry "Contingency Planning"(EMBI)¨
SECURING EDUCATIONAL FACILITIES: "Ensuring Safety on Campus-A Balanced Approach" ¨
AIRPORT & AVIATION SAFETY: "Balancing Security Issues with the Terrorist Threat" (AAS) ¨
HARBOR & MARITIME SECURITY: "Protecting America's Ports" (HMS) ¨
Computer Forensic Analysis (CFA) ¨
Understanding Security Technologies (UST) ¨
Security Management for Government & Industry (SMGI) ¨
Protection of Computers & Proprietary Information (PCPI)
Technical Surveillance CounterMeasures (TSCM) ¨
TelCo Technology Investigations (TTI)
Bomb Threat Planning/Management (BTPM)
Executive/VIP Protection (EVIP) ¨
Dignitary Protection & Operational Planning (DPOP) ¨
Covert Operations & Surveillance Tehnologies (COST) ¨
Covert Investigation & Surveillance Technology (CIST)
Counter Terrorism & the Asset Threat Spectrum (CATS) ¨
Competitive CounterIntelligence (CCI) ¨
Insurance Fraud & Abuse (IFA) ¨
Investigative Techniques and Procedures (ITP)
Case Management and Report Writing (CMRW)
Interviews and Interrogations (I&I)
Fire and Arson Investigation (FAI)
Industrial Fire Systems (IFS) ¨
Violence In the Workplace (VIW)¨
Emerging Global Threats & GeoPolitical Impacts (GTGI)¨
Course Calendar
(Please submit request for Courses and Calendar )
Homeland Security: "Protecting the Nation's Critical Infrastructure" (HS) ¨
Emergency Management for Business & Industry "Contingency Planning"(EMBI)¨
SECURING EDUCATIONAL FACILITIES: "Ensuring Safety on Campus-A Balanced Approach" ¨
AIRPORT & AVIATION SAFETY: "Balancing Security Issues with the Terrorist Threat" (AAS) ¨
HARBOR & MARITIME SECURITY: "Protecting America's Ports" (HMS) ¨
Computer Forensic Analysis (CFA) ¨
Understanding Security Technologies (UST) ¨
Security Management for Government & Industry (SMGI) ¨
Protection of Computers & Proprietary Information (PCPI)
Technical Surveillance CounterMeasures (TSCM) ¨
TelCo Technology Investigations (TTI)
Bomb Threat Planning/Management (BTPM)
Executive/VIP Protection (EVIP) ¨
Dignitary Protection & Operational Planning (DPOP) ¨
Covert Operations & Surveillance Tehnologies (COST) ¨
Covert Investigation & Surveillance Technology (CIST)
Counter Terrorism & the Asset Threat Spectrum (CATS) ¨
Competitive CounterIntelligence (CCI) ¨
Insurance Fraud & Abuse (IFA) ¨
Investigative Techniques and Procedures (ITP)
Case Management and Report Writing (CMRW)
Interviews and Interrogations (I&I)
Fire and Arson Investigation (FAI)
Industrial Fire Systems (IFS) ¨
Violence In the Workplace (VIW)¨
Emerging Global Threats & GeoPolitical Impacts (GTGI)¨
- Vulnerability Assessment Fundamentals (VAF) ¨ (DOD, DOE only)
- Advanced Vulnerability Assessment (AVA) ¨ (DOD, DOE only)
- Loss Control & Prevention (LCP)
- Counterfeit, Alterations and Duplication (CAD) ¨
- Drugs in the Workplace (DIW)
- Human Resource Management Services (HRMS)¨
- Expert Witness Testimony in Security(EWTS)
- Security of Financial Institutions & Assets (SFIA)
- Parking Facility Protection (PFP)
- Background Checks and Investigations (BCI)
- Crisis Management Resolution (CMR)¨
- Hospital and Medical Center Security (HMCS)
- Forensic Hypnosis Investigation (FHI)
- Security Responsibility and Contingency Planning (SRCP)
- Personal Protection and Security (PPS)
- Liability & Legal Concerns of Security (LLCS)
- Security/Risk Management (SRM)
- Protection of Museums & Cultural Property (PMCP)
- Ethical Hacking Techniques(EHT)¨
- Host & Network Intrusio Detection(HNID)¨
- Commercial & Open Source Firewalls (COSF)¨
- Records & Information Management (RIM)¨
- Risk Management & Contingency Planning (RMCP)¨
- Securing Educational Facilities (SEF)¨
- Non-Violent Crisis Intervention (NVCI)¨
- Investigative Proedures for Insurance Adjusters