(888)899-3848

Active Threat Mitigation, Part 1: Introduction and Principles

Lead Instructor:  J. Hart
 Access:  Public   Status:  Active   Lesson:  Part of Course

Understanding Active Threats, knowing how to mitigate Active Threats, and knowing how to respond to Active Threats has unfortunately become a requirement for living in modern society. This lesson introduces the concepts necessary to properly implement risk reduction strategies and increase your risk awareness. Topics covered include an Introduction to the Course, Principles of Active Threat Mitigation, and Active Threat Characteristics and Law Enforcement.

An optional FTI Certification of Completion is available for this course by completing the test with a minimum score of 80%. You will have three attempts to achieve a passing grade, and all lessons must be fully viewed prior to taking the test. After viewing all lessons click on Testing Center to take the optional course test and earn your certificate.


Lesson Specs

Instructions

  1. Watch the Lesson
  2. Take notes on key aspects
  3. Ask questions on the Forum

Lesson Chapters

  1. Introduction
  2. Principles of Active Threat Mitigation
  3. Active Threat Characteristics and Law Enforcement

Lead Instructor

J. Hart

Director, Force Training Institute

As the Director of Force Training Institute, Jay Hart leads a team of first responders, anti-terrorism, cybersecurity, defensive tactics, and crisis management specialists with the vast cumulative experience and expertise in safety and security.

More...

Other Lessons in This Course

Part of Course

Active Threat Mitigation, Part 1: Introduction and Principles

Topics covered include an Introduction to the Course, Principles of Active Threat Mitigation, and Active Threat Characteristics and Law Enforcement.
Part of Course

Active Threat Mitigation, Part 2: Case Studies

This lesson covers a series of Active Threat Case Studies.
Part of Course

Active Threat Mitigation, Part 3: Response and Conclusion

The Run-Hide-Fight method presents a principle-based approach to responding to Active Threat incidents.