Certified Counter Terrorism Practitioner

Prepare the right way for the CCTP exam. The course features a pre- and post-tests, along with 7 learning modules built to help you succeed in your journey towards CCTP certification. In addition to CCTP exam preparation, this online, self-paced course provides in-depth information on 60+ Counter Terrorism areas, saves your time, allows you to focus on the areas you need to improve and enables you to effectively put counter terrorism and security principles into your organization. 

ONDEMAND allows you the freedom to study and prepare at your own pace, with CCTP materials comprehensively covering terrorism and counter-terrorism concepts and practices. Counter Terrorism Practitioner course is crafted in collaboration with highly experienced and motivated professionals – a comprehensive course which focuses on kinetic and managerial practice in security and counter-terrorism. It has two significant approach advantages: Conceptual clarity, and the use of international experience and case studies. This is best for ensuring world-standard applicable skills, while providing practitioners with simple thought frameworks useful for continuous expansion of knowledge.

Benefits of CTCB ON DEMAND include:

  • Learn on your tablet or desktop
  • Save study time–focus on the areas you need to improve
  • Track your progress with pre- and post-tests
  • Receive complimentary “The Complete Counter Terrorism Guide”
  • One-time CTCB online extension purchase

Access to This course is restricted

For reasons of security and public responsibility, the CCTP Exams Preparatory Course is restricted to specific audiences. We require that all students to apply for admission to restricted courses by completing the application form for eligibility and identity verification purpose. All statements made by students to establish their credibility are subject to verification and any misrepresentation or omission of information is ground for rejection.

Counter Terrorism Certification Board reserves the right to deny admittance to anyone where verification of qualifications or credentials has not been obtained. CTCB also reserves the right to reject any applications for enrolment based on its discretionary assessment of the student’s statements and/or qualifications.

Module 1 – Introduction to the threat of terrorism

  • Introduction to the threat of terrorism 
  • Terrorism History overview
  • The objectives of terrorism
  • Terrorism trends
  • Types of Terrorism
  • Religious Terrorism
  • How terrorist and terrorist groups operate and structure
  • Terrorism financing
  • Terrorism and use of technology
  • Assisting and cooperation
  • Terrorist training 
  • Recruitment
  • The evolution of ISIS 
  • Lone wolf
  • Radicalization
  • Inside the terrorist mind
  • Terrorist Profile
  • Terrorist Classifications
  • Module summary

Module 2 – Terrorist operation planning

  • Terrorist operation planning
  • Terror Asymmetrical tactics
  • Target selection
  • How terrorist chooses his targets
  • Attack planning cycle
  • Intelligence gathering 
  • Types of Terrorist Surveillance
  • Hostile Surveillance Countermeasures

Module 3 – Terrorist Modus Operandi

  • Introduction to Terrorist TTP’s
    1. Explosives
    2. IED Lab/ Factory
    3. Pipe bomb
    4. Switches
    5. Detonators
    6. Booby Traps
    7. IED Containers
    8. Power source
    9. PIES
    10. Blast Effect
  • Suicide bomber
    1. Suicide Bomber process
    2. Suicide bomber motives
    3. Suicide bomber methods of deployment
    4. Suicide bomber vest 
    5. Suicide bomber modus operandi 
    6. Suicide Bomber blast effect
    7. Possible warning signs for SB
  • Vehicle Borne Improvised Explosive Device
    1. VBIED familiarization 
    2. Why are VBIED attacks so deadly? 
    3. VBIED Methods of attacks 
    4. Possible warning signs for VBIED
  • Standoff Bombing
    1. Standoff Bombing/Drones
    2. Standoff Bombing/ the threat from above
  • Armed Assault
  • Ramming attack
    1. Ramming attack/ methods of attack
  • Sharp edge weapons attacks
  • Kidnapping and Hostage taking 
  • Hijacking 
  • Threat, Hoax and Deception 
  • Assassination
  • Sabotage and Arson 
  • Penetration attacks
  • Cyberterrorism 
  • CBRN 
  • Module summary

Module 4 – Counter measures

  • Coping with terrorism

Module 5 – Security Planning

  • Introduction to security planning 
  • Key security concepts
  • Security planning
  • Security By design
    1. The security layers 
    2. Standoff distance 
    3. CPTED 
    4. Perimeter protection 
    5. Access control 
    6. Site Characteristics 
    7. Target hardening
  • Examples on how to cope with the threats 
  • Summery security planning

Module 6 – Security Counter measures

  • Introduction to security countermeasures 
  • Physical means
    1. Physical barriers
    2. Natural obstacles  
    3. Fences, and walls
    4. Gates
    5. Physical security lighting 
    6. Doors, and locks
    7. Safe rooms
    8. Windows and glazing 
    9. Blast mitigation
  • Security technologies
    1. Integrated security systems
    2. Video 
    3. Access control system 
    4. Intrusion detection system 
    5. Security screening technologies 
    6. Explosive trace detectors 
    7. Vehicles screening
    8. Counter drones 
    9. K9
  • Human factor
    1. Training
    2. Security force
  • The intelligence layer
  • Security processes
    1. Management of security 
    2. Maintenance of security 
    3. Threat indicators 
    4. The Access control process 
    5. Security questioning 
    6. Document verification 
    7. Mail screening 
    8. “Breaking the routine”
  • Personal safety
  • Summery security countermeasures

Module 7 – Preparedness and Response

  • Preparedness and Response planning
    1. Emergency Management Cycle
    2. Emergency Response Plan
    3. Leadership
    4. Emergency Response Team (ERT)
    5. The Emergency Operation Center (EOC)
    6. Business Continuity Plan (BCP)
    7. Communication Plan
    8. Security Awareness programs
    9. Training and Drills plan
    10. Red Team
    11. Evacuation Plan
    12. Search Plan
  • Emergency Response
    1. Situational Awareness
    2. Armed and Unarmed security response
    3. Alert Level System
    4. Emergency Scenarios Guidelines
    5. Unified Command
    6. Active Shooters (armed security)
    7. Active Shooters (unarmed security)
    8. Bomb Threats
    9. Sharp-Edged Weapon attack
    10. Suspicious Packages/items
    11. Suspicious Mail
    12. Explosion (post-blast)
    13. Explosive device (pre-blast)
    14. Projectile weapon (rocket/mortar/missile)
    15. Suicide Bomber
    16. VBIED
    17. Vehicle-As-Weapon attack
    18. Hostage-Taking

Course completion requirements

To receive a certificate of completion, participants are required to do the following:
  • Fill up the course enrollment form
  • Receive approval from CTCB administration office for your course enrollment
  • Complete each and every unit
  • Pass each and every unit quiz
  • No certificate will be awarded to participants who do not meet the above completion requirements.

Computer Requirements

CTCB ON DEMAND fully supports Windows, Mac OS X, and Chromebook platforms. Support is available for iOS (iPads) and Android Tablets. While smart phones can be used, the screens are too small to display all of the aspects of the Virtual Classroom. For the best online learning experience, the use of a device with a larger screen is HIGHLY recommended. A physical keyboard is also recommended.

• Complete this course to earn certification of completion “Physical Security Consultant” course.

Certification of Completion

Complete this course to earn certification of completion for “Counter Terrorism Practitioner” course.

Yaniv Peretz

A highly skilled security professional with over 19 years of experience in the industry, Yaniv Peretz has designed various training programs as well as serving as an advisor to many critical infrastructures in South East Asia, United States of America & Europe.

In 2000, Yaniv was part of the Ministry of Foreign Affairs in Israel and played a role in the commanding force when Israel withdrew from Lebanon during the warfare of the South Lebanon conflict. After joining the Embassy of Israel in Spain in 2001, Yaniv went on to serve in the Embassies in the world before joining the Embassy of Israel in Singapore in 2002 as a Senior Security Agent.

In this prestigious role, he planned security strategies, designed scenarios and implemented protection methods for daily routines, special events as well as exigent circumstances. Mr Peretz is being invited on regular basis as speaker to various security conferences and events and is being interviewed as subject matter expert on regular basis to newspapers and TV media.


Special Agent (Ret.) Bashan

Former head of Bomb Security department (ISA Israel), served in the ID F and the Secret Service for over 20 years. He was a member of the government VIP protection unit, and served as a team leader, responsible for three different Israeli Prime Ministers. He is an expert in bomb security and preventive sabotage and was for many years the department head in that field. As chief instructor, he has trained hundreds of Israeli security officers stationed in Israel and abroad. In this capacity, he formulated and implemented procedures and security systems that are still in use today at Tel Aviv’s Ben-Gurion International Airport.

Price

Course feeCertification feeCorporate price
BUY NOW – USD 990$BUY NOW – USD 700$Contact us for the corporate
price. Minimum of 3 participants
from the same organisation are
required

Course fee includes

  • Non-transferrable access to e-learning for up to 120 days
  • Reading materials
  • Fully pre-recorded course covering over 60+ learning modules
  • Final quiz to track your progress
  • Case studies and real-world scenarios
  • Benefits
  • Restriction Level
  • Covered Topics
  • Requirements
  • Certification
  • Course Instructors
  • Pricing

Benefits of CTCB ON DEMAND include:

  • Learn on your tablet or desktop
  • Save study time–focus on the areas you need to improve with over 60 learning modules
  • Track your progress with pre- and post-tests
  • Receive complimentary "The Complete Counter Terrorism Guide"
  • One-time CTCB online extension purchase

Access to This course is restricted

For reasons of security and public responsibility, this Course is restricted to specific audiences. We require that all students to apply for admission to restricted courses by completing the application form for eligibility and identity verification purpose. All statements made by students to establish their credibility are subject to verification and any misrepresentation or omission of information is ground for rejection.

Counter Terrorism Certification Board reserves the right to deny admittance to anyone where verification of qualifications or credentials has not been obtained. CTCB also reserves the right to reject any applications for enrolment based on its discretionary assessment of the student’s statements and/or qualifications.

  • Introduction to the threat of terrorism 
  • Terrorism History overview
  • The objectives of terrorism
  • Terrorism trends
  • Types of Terrorism
  • Religious Terrorism
  • How terrorist and terrorist groups operate and structure
  • Terrorism financing
  • Terrorism and use of technology
  • Assisting and cooperation
  • Terrorist training 
  • Recruitment
  • The evolution of ISIS 
  • Lone wolf
  • Radicalization
  • Inside the terrorist mind
  • Terrorist Profile
  • Terrorist Classifications
  • Module summary
  • Terrorist operation planning
  • Terror Asymmetrical tactics
  • Target selection
  • How terrorist chooses his targets
  • Attack planning cycle
  • Intelligence gathering 
  • Types of Terrorist Surveillance
  • Hostile Surveillance Countermeasures
  • Explosives
  • IED Lab/ Factory
  • Pipe bomb
  • Switches
  • Detonators
  • Booby Traps
  • IED Containers
  • Power source
  • PIES
  • Blast Effect
  • Suicide bomber
    • Suicide Bomber process
    • Suicide bomber motives
    • Suicide bomber methods of deployment
    • Suicide bomber vest 
    • Suicide bomber modus operandi 
    • Suicide Bomber blast effect
    • Possible warning signs for SB
  • Vehicle Borne Improvised Explosive Device
    • VBIED familiarization 
    • Why are VBIED attacks so deadly? 
    • VBIED Methods of attacks 
    • Possible warning signs for VBIED
  • Standoff Bombing
    1. Standoff Bombing/Drones
    2. Standoff Bombing/ the threat from above
  • Armed Assault
  • Ramming attack
    1. Ramming attack/ methods of attack
  • Sharp edge weapons attacks
  • Kidnapping and Hostage taking 
  • Hijacking 
  • Threat, Hoax and Deception 
  • Assassination
  • Sabotage and Arson 
  • Penetration attacks
  • Cyberterrorism 
  • CBRN 
  • Module summary
  • Coping with terrorism
  • Introduction to security planning 
  • Key security concepts
  • Security planning
  • Security By design
    1. The security layers 
    2. Standoff distance 
    3. CPTED 
    4. Perimeter protection 
    5. Access control 
    6. Site Characteristics 
    7. Target hardening
  • Examples on how to cope with the threats 
  • Summery security planning
  • Introduction to security countermeasures 
  • Physical means
    1. Physical barriers
    2. Natural obstacles  
    3. Fences, and walls
    4. Gates
    5. Physical security lighting 
    6. Doors, and locks
    7. Safe rooms
    8. Windows and glazing 
    9. Blast mitigation
  • Security technologies
    1. Integrated security systems
    2. Video 
    3. Access control system 
    4. Intrusion detection system 
    5. Security screening technologies 
    6. Explosive trace detectors 
    7. Vehicles screening
    8. Counter drones 
    9. K9
  • Human factor
    1. Training
    2. Security force
  • The intelligence layer
  • Security processes
    1. Management of security 
    2. Maintenance of security 
    3. Threat indicators 
    4. The Access control process 
    5. Security questioning 
    6. Document verification 
    7. Mail screening 
    8. “Breaking the routine”
  • Personal safety
  • Summery security countermeasures
  • Preparedness and Response planning
    1. Emergency Management Cycle
    2. Emergency Response Plan
    3. Leadership
    4. Emergency Response Team (ERT)
    5. The Emergency Operation Center (EOC)
    6. Business Continuity Plan (BCP)
    7. Communication Plan
    8. Security Awareness programs
    9. Training and Drills plan
    10. Red Team
    11. Evacuation Plan
    12. Search Plan
  • Emergency Response
    1. Situational Awareness
    2. Armed and Unarmed security response
    3. Alert Level System
    4. Emergency Scenarios Guidelines
    5. Unified Command
    6. Active Shooters (armed security)
    7. Active Shooters (unarmed security)
    8. Bomb Threats
    9. Sharp-Edged Weapon attack
    10. Suspicious Packages/items
    11. Suspicious Mail
    12. Explosion (post-blast)
    13. Explosive device (pre-blast)
    14. Projectile weapon (rocket/mortar/missile)
    15. Suicide Bomber
    16. VBIED
    17. Vehicle-As-Weapon attack
    18. Hostage-Taking

Course completion requirements

To receive a certificate of completion, participants are required to do the following:
  • Fill up the course enrolment form
  • Receive approval from CTCB administration office for your course enrolment
  • Complete each and every unit
  • Pass each and every unit quiz
  • No certificate will be awarded to participants who do not meet the above completion requirements.

Computer Requirements

CTCB ON DEMAND fully supports Windows, Mac OS X, and Chromebook platforms. Support is available for iOS (iPads) and Android Tablets. While smart phones can be used, the screens are too small to display all of the aspects of the Virtual Classroom. For the best online learning experience, the use of a device with a larger screen is HIGHLY recommended. A physical keyboard is also recommended.

Certification of Completion

Complete this course to earn certification of completion for "Counter Terrorism Practitioner" course.

Certification of Completion

Complete this course to earn certification of completion for “Counter Terrorism Practitioner” course.

Yaniv Peretz

A highly skilled security professional with over 19 years of experience in the industry, Yaniv Peretz has designed various training programs as well as serving as an advisor to many critical infrastructures in South East Asia, United States of America & Europe.

In 2000, Yaniv was part of the Ministry of Foreign Affairs in Israel and played a role in the commanding force when Israel withdrew from Lebanon during the warfare of the South Lebanon conflict. After joining the Embassy of Israel in Spain in 2001, Yaniv went on to serve in the Embassies in the world before joining the Embassy of Israel in Singapore in 2002 as a Senior Security Agent.

In this prestigious role, he planned security strategies, designed scenarios and implemented protection methods for daily routines, special events as well as exigent circumstances. Mr Peretz is being invited on regular basis as speaker to various security conferences and events and is being interviewed as subject matter expert on regular basis to newspapers and TV media.


Special Agent (Ret.) Bashan

Former head of Bomb Security department (ISA Israel), served in the ID F and the Secret Service for over 20 years. He was a member of the government VIP protection unit, and served as a team leader, responsible for three different Israeli Prime Ministers. He is an expert in bomb security and preventive sabotage and was for many years the department head in that field. As chief instructor, he has trained hundreds of Israeli security officers stationed in Israel and abroad. In this capacity, he formulated and implemented procedures and security systems that are still in use today at Tel Aviv’s Ben-Gurion International Airport.

 

COURSE FEECERTIFICATION FEECorporate price

BUY NOW – USD 990$

BUY NOW – USD 700$Contact us for the corporate price. Minimum of 3 participants from the same organisation are required

Course fee includes

  • Non-transferrable access to e-learning for up to 120 days
  • Reading materials
  • Fully pre-recorded course covering over 60+ learning modules
  • Final quiz to track your progress
  • Case studies and real-world scenarios
error: Content is protected !!

LEAVE YOUR EMAIL FOR 10% OFF YOUR FIRST COURSE