Case File
efta-efta01125418DOJ Data Set 9OtherHenley-Putnam University
Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta01125418
Pages
1
Persons
0
Integrity
No Hash Available
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
Henley-Putnam University
Bachelor's Degrees Comparison
www.Henlev-Putnam.edu
Terrorism & Counterterrorism Studies
Intelligence Management
Strategic Security & Protection Management
Required courses
- Terrorist Techniques
- Counterterrorism
- Fundamentals of Threat Assessment
- Fundamentals of Intelligence
- Chemical, Biological, Radiological and Nuclear Weapons
- Effective Report Writing
- Open Source Research
- Foundations of Terrorism
- Religious Extremism
- Ethics
- Psychology of Violence
Required courses
Required courses
- Fundamentals of Intelligence
- Intelligence Collection
- Open Source Research
- Covert Action
- Counterintelligence
- Fundamentals of Critical Thinking and Logic
- Writing for the Intelligence Professional
- Fundamentals of Analysis
- History of Intelligence, Part 1
- History of Intelligence, Part 2
- Ethics
- foundations of Security
- Essentials of Executive Protection
- Protective Security Law
- Advance Work
- Managing the Security Organization
- Chemical, Biological, Radiological and Nuclear Weapons
- Effective Report Writing
- History of Executive/Dignitary Protection
- Foundations of Terrorism
- Etiquette & Rapport
- Ethics
Students choose 3 areas of emphasis
Extremist and Terrorist Groups
Collection Management
Protective Intelligence
- Right Wing Terrorism
- Ethno/Nationalist Terrorism
- Islamism and Terrorism
- Propaganda and Disinformation
- Interviewing and Briefing/Debriefing
- Collection Management
- Fundamentals of Analysis
- Open Source Research
- Intelligence Collection
Counterterrorism
Counterintelligence
Threat Assessment
- Counterintelligence
- Interviewing and Briefing/Debriefing
- Terrorists Support Networks
- World Intelligence Agencies
- Terrorist Support Networks
- Operational Security
- Workplace Violence, Workplace Security
- Interviewing and Briefing/Debriefing
- Psychology of Violence
Terrorist Operations
Intel Operations
Advance Operations
- Underground Economies
- Propaganda and Disinformation
- Strategy and Tactics
- Technical Surveillance
- Clandestine and Secure Communications
- Infiltration Techniques
- Travel & Hospitals
- Principal's Office & Residence
- Off-site Visits
Terrorism and Society
Analysis
Protection Operations
- Media and Terrorism
- Consequence Management
- Psychology of Fear
- Weapons Systems
- Underground Economies
- Fundamentals of Data Analysis
- Bomb Threat Management
- Fundamentals of Vehicular Security
- Building Security
Cyber/Information Security
Corporate Security
- Clandestine and Secure Communications
- Communication Theory
- Information Security
- Technical Surveillance
- Information Security
- Conflict Resolution
EFTA01125418
Technical Artifacts (1)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Domain
www.henlev-putnam.eduForum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.