Gijrtskmtd6vdeopgzjb combatant commands map

Irregular Threats

Irregular Threats

Terrorism is complicated and deadly. Plus, terrorism has hybrid or asymmetric characteristics and comorbid qualities. That is, terrorism morphs or changes, and terrorism usually occurs simultaneously or along with other irregular threats such as insurgency, instability, unconventional warfare, corruption, crime, transnational organized crime, and the proliferation of weapons of mass destruction. The irregular nature and spill-over effect of terrorism reinforcement the complexity.

This course is an advanced level, on-line, non-classified, state-of-the-art course about irregular threats. It has a Introduction and six modules. The course first defines and explains irregular threats and then explores the various parts and pieces of a multidisciplinary approach that can be used to mitigate a variety of irregular threats. From there, the course provides a well-throughout framework in which to analyze and synchronize efforts against irregular threats. Risk based approaches are set forth for each of the established domains. A multidisciplinary approach is an effective counter to irregular threats. Professional referencing and citations are used to reinforce the validity of the content.

Teaching/Learning Objectives are threefold. The first objective is to provide clarity and knowledge which is gained by-way of an extensive review of terms, definitions, and concepts. The second objective is to illustrate the importance of Info and Intel and cooperation and collaboration. Then third, the course provides an advanced level of understanding that can be advanced further by each student, with additional study. These three goals are achieved with Prezi lectures, videos, reading assignments, and online reference and video libraries.

What to Expect? E-learning is a rather new phenomena and is different from face-to-face learning. Since 2010 numerous scholarly studies have provided a wealth of knowledge about the benefits, drawbacks, and best practices associated with e-learning. Scientifically substantiated techniques and methods have been integrated into this course-ware set to improve the quality and efficacy of the teaching/learning experience.

Intended Audience; Anyone interested in or working within the anti-terrorism (AT), counter-terrorism (CT) and combating terrorism (CbT) communities. Or anyone that deals diretly with irregular thretas. This is not a U.S. centric course. It is intended for a worldwide audience.

Requirements: Participants will need a home or office computer with Windows 7, 8, or XP, or an OS that is equal to Windows 7, 8, or XP. Or other comparable operating system.The student will also need a high speed internet connection of 1MB or better with a valid email address. The student must also be able to communicate in English at a 3/3 level. A graduate degree is highly recommended, but not mandatory.


Your Instructor


Richard J. Campbell
Richard J. Campbell

Richard J. Campbell developed the Irregular Threats course-ware, over a three-year period and is the primary instructor for the course. He spent over 22 years in the United States Army and retired in 1995. He served with the 2nd 75th Ranger Battalion at Fort Lewis WA for over 7-years and was assigned to the JFK Special Warfare Center at Fort Bragg NC for over 6-years. He retired in 1995 and then completed a BA and MA in psychology and worked on in-patient psychiatric wards, with court committed patients. He acted as a member of a multidisciplinary psychiatric treatment team.

In 2005 he was offered a job as an instructor and observer/controller on the Iraq-Kuwait border. In that position he trained coalition and US forces as they deployed to Iraq and Afghanistan. He primarily taught traffic check point operations and search and site exploitation in a JIEDDO funded search house. He taught and developed training in that position for over four years. Between 2009 and 2010 he wrote and published a book titled Asymmetric Tactical Training (2010).

In 2010 he was offered a position at the Counterinsurgency Training Center in Kabul Afghanistan (CTC-A). CTC-A was a part of the NATO Training Mission for Afghanistan (NTM-A). While there he acted as the curriculum developer, site-lead, and lessons learned coordinator. He held that position for two years or until the school closed.

His published papers can be viewed on Academia.edu, or on the Joint Center for International Security Force Assistance (JCISFA) website within the Community of Interest page. The links to his publications, LinkedIn profile, and Twitter account are below.

Academia.edu:

https://henley-putnam.academia.edu/RichardJCampbell

LinkedIn:

https://www.linkedin.com/profile/view?id=AAIAAAxi53gB-rffLk4hib80S2S021f9B1byBqc&trk=nav_responsive_tab_profile_pic

Twitter:

https://twitter.com/asytactrain



Class Curriculum


  Irregular Threats: Introduction
Available in days
days after you enroll
  MOD 1: Terrorism
Available in days
days after you enroll
  MOD 2: Plans and Operations
Available in days
days after you enroll
  MOD 3: Irregular Warfare
Available in days
days after you enroll
  MOD 4: Information and Intelligence
Available in days
days after you enroll
  Reference Library
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course should take you about 5 weeks to complete. That is, if you watch all the Prezi lectures and assigned videos and read the assigned readings. The course is updated at the end of each calendar year, so the site is closed first week of Nov. through end of Dec. New material is added and outdated content is removed or replaced.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!