Exam review course

The exam review course covers 14 units: u. 1 -u. 10 – How to identify the threat of terrorism u. 11- u. 14 – How to counter the threat of terrorism CCTP training covers 14 units such as: Suicide Bombing; Improvised Explosive Devices IED; Vehicle Borne Improvised Explosive Devices (VBIED); Attack with Cold Weapons; Shooting; Parallel Attack; Kidnapping.

  1. 1 -u. 10 – How to identify the threat of terrorism.
  2. 11- u. 14 – How to counter the threat of terrorism.
Unit 1 Global Terrorism nowadays. Introduction to the Threat
  • Introduction to current trends in global terrorism
  • An overview of recent terrorist attacks worldwide
  • Analysis of selected case studies of various attack methods/ Modes of Operands Resources & Materials


Unit 2 Terrorist Organization
  • Introduction of selected terrorist organisations in the world
  • Introduction to the inspiration of each terrorist organisation, motivation and their key ideologies
  • Introduction to the parallels between common aspirations and cooperation’s amongst various terrorist groups.

Unit 3 Mumbai Terrorist attack 26/11/2008 case study, (parallel attack with various means)
  • Presentation of the case study of Mumbai terrorist attack – demonstration of terrorist capabilities
  • Analysis of security forces response and actions against terrorists in the presented case study
  • Analysis of early detection and preparation as a main counter terrorism activities

Unit 4 First Platform : Suicide Bomber, Mind Set & Modus Operandi
  • Introduction to the most deadly weapon of a terrorist organisation
  • Analysis of the main motivational factors and mindset of a suicide bomber
  • Analysis of the modus operandi of a suicide attacks

Unit 5 The stages of Terrorist attack and Suicide attack
  • Presenting the stages of executing an attack by a terrorist
  • Emphasis on the stages of suicide bomber attack

Unit 6 The Adversary
  • Analysis of the adversary’s motivation for an assassination
  • Analysis of adversary’s way of actions
  • Analysis of adversary’s system of actions

Unit 7 Improvised Explosive Device (IED) – The Terrorist style
  • Introduction to the bomb making – the terrorist style
  • Overview of Improvised Explosive Devices: Characteristics and Components
  • Analysis of terrorist modus of operandi during the deployment of IED’s

Unit 8 Booby Traps
  • Definition and overview of “Booby Traps”
  • Presenting the typology of “Booby Traps”
  • Analysis of victim’s mistakes triggering the IED
  • Explanation of tools and and methodology of countering the IED threat Resources & Materials
  • Case study – “innocent” briefcase
  • Case study – Moscow in July, 2003 – Actions and response of bomb technician – handling the threat (video)
  • Case study- Book Bomb, Nestle in Argentina
  • Booklet resource materials

Unit 9 The Adversary: Collection of intelligence before operation
  • Analysis of tools to identify and detect suspicious activities on the protected site
  • Introduction of counter intelligence methodology as prevention mean implemented in the security system

Unit 10 Second platform: VBIED – Vehicle Borne IED (Car Bomb)
  • Introduction to the theory of VBIED (Vehicle Borne Improvised Explosive Device) and VBIED deployment methodology
  • Introduction to the VBIED risk level evaluation to a secured site
  • Presentation of preventive and protective methodology against VBIED threat

Unit 11 The Security Concept
  • Introduction of Counter Terrorism Security Concepts
  • Presentation of the role of outer circles & perimeter as a method of prevention and early detection of the threat

Unit 12 Incident Management – “…after the attack”
  • The introduction of the terminology and definition of incident management as an integral part of a security system
  • The presentation of the post-attack key points of analysis as a protective measure

Unit 13 MIN/MAX – Minimum cost / Maximum security
  • The introduction of the Min/Max security strategy of preventing terrorist attacks
  • Analysis of prioritisation strategy – the process of developing and operating comprehensive security system by defining the priority areas Resources & Materials
  • Case study Pi-Glilot’ fuel depot, May 2002
  • Mobile gun video
  • Old city Jerusalem attack video
  • Case study- 09/11/2001
  • Booklet resource material

Unit 14 Operational file
  • The introduction of operational file components and practical implication in security system
  • Presentation of an evaluation and estimation tool for the security system structure