Homeland Security Policy and Coordination

Through critical analysis, this training course will evaluate the enforcement of security by this government agency, in order to ensure the safety and protection of the United States.


  • Lesson 1.1: Comprehending the formation of DHS
  • Lesson 1.2: Creating Legislation for DHS
  • Lesson 1.3: Assessing Prevention and Reduction in Terrorism
  • Lesson 1.4: Analyzing National Security

Airport Security: Effectiveness of Legislative Policies

By building awareness, the intent of this course is to critically examine legislation implemented by DHS and TSA and its effectiveness in regards to protecting the traveling public.


  • Lesson 2.1: Evaluating TSA and policies
  • Lesson 2.2: Examining Airport Security and Threats
  • Lessons 2.3: Determining Cargo Security Obstacles
  • Lessons 2.4: Implementing Biometrics into Airport Security
  • Lesson 2.5: Understanding TSA Programs

Creating the Line with Terrorism

This specialized training indulges in the sensitive information utilized for terrorist investigations within the subdivision of Customs and Border Protection. It will approach complex analysis concerning immigration reform, money laundering, drug trafficking, more.


  • Lesson 3.1: Reviewing Confidential Information Utilized for International Terrorism
  • Lesson 3.2: Immigration Reform
  • Lesson 3.3: Money Laundering and Drug Trafficking across the Border
  • Lesson 3.4: Interpreting Border Controls

Technological Advancement for Combatting Terrorist Progression

“Thinking outside the box” is the purpose of this course in order to better address not only the plethora of crimes performed by terrorists, but also their methods of execution from a multilateral perspective.


  • Lesson 4.1: Critical Thinking: Combat Terrorism
  • Lesson 4.2: Emerging Threats: Chemical Nuclear Weapons, and Biological Hazards
  • Lesson 4.3: Conquering Counterterrorism
  • Lesson 4.4: Cyber Terrorism

Intelligence: Critical Approach to the U.S. Patriot Act

Debates over the U.S. Patriot act occur in society, but in this course debates will also occur over this controversial legislation. From its purpose to even the violations of the Constitution, this discussion will heighten the needed awareness & solutions for reformation.


  • Lesson 5.1: U.S. Patriot Act Surveillance Mechanisms
  • Lesson 5.2: Intelligence and Cyber Intelligence
  • Lesson 5.3: Sabotage International Terrorism and Foreign Powers

FEMA: Emergency Response and Planning & Recovery

The unexpectancy of any disaster accompanies an undetermined calculation of impact on those enduring it. This course discusses the restoration process executed by FEMA before, during, and after any form of disaster.


  • Lesson 6.1: Evaluating FEMA Multilevel Government Agency
  • Lesson 6.2: Disasters Planning, Recovery, and Mitigate
  • Lesson 6.3: Government Agency Disaster Support and Deficiencies

Professional Ethics and Civil Liberties

In this training the correlation between the safeguard of civil liberties and the prevention of terrorist attacks will be analyzed.


  • Lesson 7.1: Safeguarding Civil Liberties and the Prevention of Terrorism
  • Lesson 7.2: Discerning DHS Policies and Security Measures to Protect Public Civil Liberties
  • Lesson 7.3: Identifying the Public Rights and Fairness in Airport Security

Terrorism: System Approach to Biometric Threats

This course discusses technology that can do the following: finger-printing, facial recognition, retinal eye scan, hand geometry, dynamic signature verification, and full body scan. The course talks about how biometrics analyzes the identity of person through human characteristics.


  • Lesson 8.1: Introducing Biometric Systems and Biometric Threats
  • Lesson 8.2: Multi-Layered Passenger Screening Biometric Enhancements
  • Lesson 8.3: Aiding Biometrics with Federal Funding

Infrastructure of Democratic Approach

This course will evaluate the efforts needed to maintain and strengthen the functioning infrastructure of society on various levels of both physical and cyber-space of government constructs, involving federal, state, local, and territorial entities.


  • Lesson 9.1: Maintaining Critical Infrastructure Systems
  • Lesson 9.2: Protecting America’s Infrastructure Security

DHS: Fundamentals of Management & Applied Communication of Effective Policies

This course will illustrate their purpose to the overall objective of safety and protection from terrorist threats. It will also emphasize on the methodology of effective communication between these supportive services and the department itself.


  • Lesson 10.1: Understanding Effective Communication Systems to Protect America from Terrorism
  • Lesson 10.2: Management of Infrastructure to Support DHS
  • Lesson 10.3: Communication Effective Policies to Secure Our Nation