NCBRT/ACE eLearning Courses

The content below is hosted on Moodle and requires a login. Registration is simple and provides instant access to course content. Click the New User button above to register and access this free training. Course offerings are organized by type: DHS/FEMA Certified Courses, Micro Modules, and Webinars. Some content is also available in Spanish, and is listed separately below.

 

New Users

Register

Register

DHS/FEMA Certified Courses

These training courses are certified by DHS/FEMA and offer a certificate of completion and continuing education units. Participants are required to obtain a FEMA Student ID (SID) prior to enrolling in these courses.

 

Shopping Center Security Terrorism Awareness Training Program (AWR-304-W)

Shopping Center Security Terrorism Awareness Training Program (AWR-304-W)slide preview

This course provides security training personnel with increased awareness of the various facets of terrorism and criminal activity that could occur at a retail facility. During this course participants will examine weapons that may be used in a terror attack and will be able to describe various attack tactics that may be used against a retail facility. Participants will also be able to assess potentially suspicious behavior and will be able to conduct surveillance at their facility. The course describes proper response to terrorist or criminal incidents.

Sign-in

Micro Modules

Micro Modules are brief, webinar-formatted presentations based on NCBRT course content. They may be used as review or refresher for users who have previously taken NCBRT training or serve as an introduction to topics for those who have not completed the related course. Certificates of completion are available for each Micro Module.

 

Types of Criminal Intelligence

Types of Criminal Intelligence slide preview

The purpose of this LSU NCBRT presentation is to provide an overview of the three types of criminal intelligence: tactical, operational, and strategic intelligence. This presentation gives definitions and examples of each type of intel and describes when different kinds of criminal intelligence are most useful for law enforcement.

Sign-in

 

Power of Questioning

Power of Questioning slide preview

This presentation demonstrates the importance of questioning as an instructional strategy for those training first responders and other personnel. Effective instructors use questions to lead learners into deeper understanding. The module highlights tools of effective instructors when asking questions and facilitating debate, discusses why and how instructors should ask questions, how instructors can use questions to build relationships with students, types of questions instructors can use in trainings, and more.

Sign-in

 

Levels of PPE

Levels of PPE slide preview

This Micro Module addresses types and levels of personal protective equipment, or PPE. Ensuring that responders are wearing the correct PPE for a specific incident is crucial to protect lives and decrease contamination risk. In this presentation, we discuss the four levels of PPE, the types of clothing and gear for each level, and the types of conditions in which to use each type of PPE.

Sign-in

 

Assessment Techniques

Assessment Techniques slide preview

The purpose of this LSU NCBRT presentation equips responders with the tools necessary to successfully assess and manage crisis situations during behavioral health response calls. When responding to a behavioral health crisis, responders should assess three factors on the scene: situation, individual behavior, and volatility. This video offers tools to responders to mitigate harm to the person in crisis, themselves, and others on the scene.

Sign-in

 

Negotiating Closed Doors

Negotiating Closed Doors slide preview

The purpose of this LSU NCBRT presentation is to provide tactically sound techniques for law enforcement to use when negotiating a closed door during an active shooter incident. First responders encounter more closed doors than open doors. Doors may be most likely locked and possibly barricaded. Given the urgency of the situation and the primary focus of stopping the killing, the responder will need to make good decisions on what time is spent negotiating locked doors.

Sign-in

 

Negotiating Open Doors

Negotiating Open Doors slide preview

The purpose of this LSU NCBRT presentation is to provide tactically sound techniques for law enforcement to use when negotiating an open door during an active shooter incident. When responders determine that they will enter a room, they must quickly and decisively take steps to pass through the door or threshold and be prepared to handle any problem. Properly negotiating a door prior to making entry sets officers up for success by identifying specific tasks to be performed and limiting their exposure to potential threats prior to making entry.

Sign-in

 

The PATROL Framework

The PATROL Framework slide preview

This LSU NCBRT presentation provides an overview of the de-escalation technique known as PATROL, which stands for Planning, Assessment, Time, Redeployment or Containment, Other Resources, and Lines of Communication. PATROL is a decision-making process used by law enforcement, but it is also a set of tactics that can be used by anyone finding themselves in a situation requiring de-escalation. It can be used to plan for, assess, and respond to an intense, volatile or potentially volatile situation.

Sign-in

 

Affirming Learning

Affirming Learning slide preview

The purpose of this LSU NCBRT presentation is to explain the three tasks that are required to affirm learning in the classroom, which are monitoring, assessing, and evaluating. This information is primarily for those tasked with training first responders and others in emergency response related fields. Effective instructors monitor, assess, and evaluate student learning to ensure they attain knowledge and skills specified in the course.

Sign-in

 

Subcategories of Domestic Violent Extremist Actors

Subcategories of Domestic Violent Extremist Actors slide preview

This LSU NCBRT presentation provides an overview of the subcategories of Domestic Violent Extremist actors identified by the US Department of Homeland Security. Racially or ethnically motivated violent extremists (RMVEs) are “groups or individuals who facilitate or engage in the potentially unlawful use or threat of force or violence with intent to intimidate or coerce, in furtherance of political and/or social agendas, which are deemed to derive from bias, often related to race or ethnicity, held by the actor against others, including a given population or group. RMVE subcategories present some of the most lethal DVE threats and are most likely to conduct mass-casualty attacks against citizens.

Sign-in

 

Hostile Surveillance Points vs Hostile Surveillance Detection Points

Hostile Surveillance Points vs Hostile Surveillance Detection Points slide preview

This LSU NCBRT presentation outlines the differences between hostile surveillance points and hostile surveillance detection points. Hostile or adversarial surveillance is when a potential offender performs surveillance on a target to gather critical information. Watching for on-site hostile surveillance is called conducting hostile surveillance detection. This module will help emergency personnel better recognize, communicate, and act upon suspicious behaviors.

Sign-in

 

Intentional Biological Incidents

Intentional Biological Incidents slide preview

The purpose of this LSU NCBRT presentation is to review the different types of intentional biological incidents. This intentional use of biological agents as weapons can be a biocrime or an act of biowarfare, bioterrorism, or agroterrorism. To induce social disruption, an offender might select a particular biological agent because of its ability to be highly contagious and debilitating.  Intentional incidents may involve a wide area of exposure at one time or exposure at multiple locations.

Sign-in

 

Crime, Terrorism, and Threats to Critical Infrastructure

Crime, Terrorism, and Threats to Critical Infrastructure slide preview

This LSU NCBRT presentation outlines the correlation between criminality, terrorist groups, and threats to critical infrastructure. Officers on the ground may identify aspects of local crimes that feed into something larger, like terrorism. Law enforcement agencies have traditionally been reactive. However, given the link between crimes, criminal organizations, and terrorism, proactive intelligence is critical at the state and local levels. All terrorist acts are criminal, but not all criminal acts have a link to terrorism.

Sign-in

 

Types of Biological Incidents

Types of Biological Incidents slide preview

The purpose of this LSU NCBRT presentation is to explain the different types of biological incidents. Emergency responders, law enforcement, and public health officials should be aware of the implications and consequences of biological incidents—whether natural, accidental, or intentional. Law enforcement plays a critical role and should be involved early in a response to a biological incident so that critical evidence is not lost in the event that a crime has been committed. Understanding these incidents enables a comprehensive and effective response, highlighting the importance of cooperation among various agencies to safeguard public health and security. 

Sign-in

 

Types of Biological Agents

Types of Biological Agents slide preview

The purpose of this LSU NCBRT presentation is to provide an overview of the types of biological agents that may be present during a domestic biological incident. Responders may be involved in response to biological incidents. Knowing if an organism is bacterial, viral, fungal, or resulting from a toxin can greatly impact response actions. This information is key both to protecting responders and to preventing further illness in the community.

Sign-in

 

Attacker Characteristics

Attacker Characteristics slide preview

The purpose of this LSU NCBRT/ACE presentation is to provide an overview of observable attacker characteristics that may indicate an attack is part of a larger incident and a potential Complex Coordinated Terrorist Attack (or CCTA). There are several observable characteristics that may also include plans to overwhelm resources and make the attack as effective as possible. Recognition of these clues early in the attack will allow responders to activate appropriate assets and employ response resources as efficiently as possible.

Sign-in

 

Biological Agents: Routes of Exposure

Biological Agents: Routes of Exposure slide preview

This LSU NCBRT presentation provides an overview of the major routes of entry for biological agents into the body. The most common routes of exposure are ingestion, injection, absorption, and inhalation. Specific examples of each are provided.

Sign-in

 

Active Listening Techniques

Active Listening Techniques slide preview

The purpose of this LSU NCBRT presentation is to provide an overview of active listening techniques for de-escalating tense situations. Active listening is a general approach to listening that helps you gain more information, improve your understanding of other points of view, and work cooperatively with others.  Course participants will learn about de-escalating situations with people in a behavioral health crisis. Active listening and other communication techniques will be emphasized. Participants will participate in scenario-based exercises to practice and demonstrate their understanding of de-escalation and intervention.

Sign-in

 

Assessing Information for Intelligence Purposes

Assessing Information for Intelligence Purposes slide preview

This LSU NCBRT presentation describes the process of assessing the validity of information for intelligence purposes. The content provided is for informational purposes. Officers should follow their agency’s standard operating procedures. Analysis often involves interpreting many different types of raw data and information, and the accuracy of information used to produce intelligence products is critical. Information collected from all sources should be evaluated for source reliability, information validity, relevancy, and materiality. Intelligence personnel and investigators will evaluate the reliability of the source and the validity of the information gathered.

Sign-in

 

Tactics Used by Violent Extremists Against Law Enforcement

Tactics Used by Violent Extremists Against Law Enforcement slide preview

This LSU NCBRT presentation provides an overview of the tactics that violent extremists may employ to enact violence against first responders. It covers ways to improve responder safety, and techniques to counter violent extremist threats through interagency and community partnerships. Violent extremism is challenging to predict. Situational awareness should always be a first line of defense for responders interacting with crowds or individuals that may become violent.

Sign-in

 

Communication Between Responders and the Public

Communication Between Responders and the Public cover slide

This LSU NCBRT presentation describes strategies that first responders can use to establish communication between themselves and their communities. First responder agencies must work together to prevent and efficiently respond to extremist threats. Agencies must maintain awareness of trends and tactics to effectively prevent, prepare for, or respond to such an attack. In advance of high-profile dates, events, or other civic activities, first responders and their agencies need help from community groups and the private sector to identify threats and suspicious behavior.

Sign-in

 

Suspicious Activity Reports

Suspicious Activity Reports slide preview

This LSU NCBRT presentation provides participants with an overview of the fundamentals of Suspicious Activity Reports (SARs). The Information Sharing Environment (ISE) is the platform on which the National Terrorism Information Sharing and Suspicious Activity Reporting (SAR) initiatives are managed. A suspicious activity is an observed behavior reasonably indicative of preoperational planning related to terrorism or other criminal activity. It is critical for agencies to share collected information. SARs record suspicious activities that need further inquiry and follow-up.

Sign-in

 

Establishing a Baseline

Establishing a Baseline slide preview

The purpose of this presentation is to provide guidelines on how to establish a baseline for area observation. Emergency responders, security professionals, security support staff, and the public must work together to identify suspicious objects, substances, and people. To find something abnormal or suspicious first requires an understanding of the normal or expected. This is called establishing a baseline for the area or event.

Sign-in

 

Door Barricading

Door Barricading slide preview

The purpose of this presentation is to provide demonstrations of effective door barricading techniques. During an active threat incident, it is important for individuals to place as many obstacles and time-consuming barriers between themselves and the threat as possible. Taking steps to impede or stop the progress of a threat could increase survivability and save lives. Participants are encouraged to apply principles from this course to plans and procedures in their workplaces.

Sign-in

 

Consolidating Training Needs

Consolidating Training Needs preview

The purpose of this presentation is to illustrate the benefits of consolidating training needs into a jurisdictional multiyear training plan. This plan provides opportunities for interagency collaboration and training. It allows jurisdictions to train with other agencies or jurisdictions that will be responding during an emergency. Consolidating several agencies’ needs into one jurisdiction-wide training plan allows agencies with common training goals to work together, share resources, and provide each other with help and support. Multidisciplinary training can lead to a better-informed, better-connected response community, and a far more successful response.

Sign-in

 

Assessment Team Check-Up

Assessment Team Check-Upslide preview

The purpose of this presentation is to teach emergency planners how to ensure that their training assessment team includes members that adequately represent the jurisdiction. Team members from the whole community will be responsible for completing the assessment process. The team will analyze response capabilities to identify training needs, develop training goals for the jurisdiction, identify training sources, and create a multiyear training plan.

Sign-in

 

Facial Image Comparison

Facial Image Comparisonslide preview

The purpose of this presentation is to outline the practical steps of facial image comparison when examining photo identification documents. This course provides participants with the skills to evaluate the authenticity of identification documents and ensure that documents are lawfully possessed. The course provides techniques participants can use during the interview process to identify imposters that include comparing the face of the person presenting the document to the photograph on the document, Identifying the principle features of the subject’s face to see if it matches the photograph, and more.

Sign-in

 

Terrorist Preoperational Planning

Terrorist Preoperational Planningslide preview

The purpose of this presentation is to provide an overview of the preoperational activities leading up to a planned terrorist attack. Preoperational Planning can be done secretly and remotely, over several months or years. This presentation identifies those preoperational behaviors so that participants can learn to better recognize suspicious activities that could indicate a terrorist attack.

Sign-in

 

Preparedness Tools

Preparedness Toolsslide preview

The purpose of this presentation is to provide an overview of the documents that planning teams should refer to when completing a readiness assessment. By evaluating their abilities to meet their emergency operations plan (EOP) using traditional and national preparedness tools, participants learn that agencies that plan and train together are much better equipped to successfully respond together.

Sign-in

 

Behavior Considerations for Document Inspection

Behavior Considerations for Document Inspectionslide preview

The purpose of this presentation is to review some of the behavioral considerations for the inspection of identity documentation. This course provides participants with the skills to evaluate the authenticity of identification documents and ensure that documents are lawfully possessed. This course provides a professional and comprehensive examination of overt and covert security features of genuine current state drivers licenses and federal travel documents. It also provides tools and techniques that participants can use during the interview process to identify imposters and to examine identification documents that subjects present to them.

Sign-in

 

Refreshing Your Jurisdictional Profile

Refreshing Your Jurisdictional Profileslide preview

The purpose of this presentation is to provide guidance on how emergency planners can understand and enhance their jurisdictional profiles. Constantly changing communities must plan for threats and their associated needs must be consistently and continuously reviewed. Response communities, resource groups, and critical infrastructure must also be identified within the established geographic region.

Sign-in

 

Document Inspection Process

Document Inspection Processslide preview

The purpose of this presentation is to review the process and considerations for the inspection of identity documentation. This course provides participants with the skills to evaluate the authenticity of identification documents and ensure that documents are lawfully possessed. It also provides tools and techniques that participants can use during the interview process to identify imposters and to examine identification documents that subjects present to them.

Sign-in

 

Overview of the RTIPP Process

Overview of the RTIPP Processslide preview

The purpose of this presentation is to provide an overview of the seven steps in the Readiness: Training Identification and Preparedness Planning process. The RTIPP process assists jurisdictions efficiently plan and schedule training that is relevant to community preparedness. It is critical that agencies within a jurisdiction plan and train together so they can respond effectively when an incident occurs. In an all hazards, whole community approach, public sector agencies, private sector organizations, and nongovernmental organizations all play a role in preparedness.

Sign-in

 

Communicating Risk Effectively in a Food Emergency

Communicating Risk Effectively in a Food Emergencyslide preview

The purpose of this presentation is to provide an overview of risk communication and the guidelines and strategies for developing effective risk communication in a food emergency.

Sign-in

 

Staging in an Active Shooter Incident

Staging in an Active Shooter Incidentslide preview

The purpose of this presentation is to provide a focused overview of staging and staging concepts for all responders as well as law enforcement. It also provides tactical approach, tools, and resource considerations for a response attributed to an intentional act by individuals that creates or evolves into an active shooter incident or complex coordinated attack (CCA).

Sign-in

 

Mechanical Breaching

Mechanical Breachingslide preview

The purpose of this presentation is to provide examples of mechanical breaching for law enforcement. The video will review methods of mechanical breaching including: forcing, cutting and crushing or breaking.

Sign-in

 

Consideration for Breaching

Consideration for Breachingslide preview

The purpose of this presentation is to provide an informational introduction for basic considerations during breaching for law enforcement officers. The content reviews entry points and mechanical breaching tools.

Sign-in

 

Tables and Chairs: Setting Up An Incident Command Post

Tables and Chairs: Setting Up An Incident Command Postslide preview

The purpose of this presentation is to provide participants one example of physically establishing an incident command post (ICP). During an emergency, it is critical for individuals to know their various roles and responsibilities as well as how information should flow within the ICP.

Sign-in

 

Building Emergency Action Plans (BEAPs)

Building Emergency Action Plans (BEAPs)slide preview

The purpose of this presentation is to provide an informational introduction for Building Emergency Action Plans, or BEAPs. A BEAP details emergency actions at the building level, including occupant actions and should support an Emergency Operations Plan.

Sign-in

 

Behavioral Intervention Teams (BITs)

Behavioral Intervention Teams (BITs)slide preview

The purpose of this presentation is to provide an informational reminder of key principles for Behavioral Intervention Teams. BITs are formed to respond to the early detection of and intervention of worrisome or potentially harmful behavior and to prevent campus violence. These BITs provide a centralized point to which concerned members of the campus community can report instances of worrisome or potentially harmful behavior.

Sign-in

 

Introduction to Emergency Operations Plans

Introduction to Emergency Operations Plansslide preview

The purpose of this presentation is to provide an informational introduction for Emergency Operating Plans, or EOPs. An EOP serves as the cornerstone of preparedness and emergency activities of a campus. This presentation provides resources for campuses to begin developing their EOPs.This presentation was created using content from NCBRT's PER-340, Active Threat Integrated Response Course.

Sign-in

 

Pressure Points

Pressure Pointsslide preview

The Pressure Points video illustrates how to use pressure points in controlling severe bleeding as a first step before tourniquet application or wound packing occurs.

Sign-in

 

BATH Assessments

BATH Assessmentsslide preview

The LSU NCBRT/ACE BATH Assessments presentation is part of a series of micro modules based on certified course content. The purpose of this presentation is to provide emergency responders an overview or refresher of key principles for BATH Assessments. Using this simple assessment tool, responders identify and treat life-threatening bleeding, maintain an open airway, monitor for signs of tension pneumothorax, and attempt to maintain the victim’s body temperature to prevent hypothermia. This presentation was created using content from NCBRT's PER-340, Active Threat Integrated Response Course.

Sign-in

 

Negotiating Doors

Negotiating Doorsslide preview

This presentation provides emergency responders an overview or refresher of key principles for negotiating open and closed doors as they clear rooms during an active threat situation. When responders make room entries, they must move quickly and decisively through the door and prepare to engage the threat.

Sign-in

 

Wound Packing

Wound Packingslide preview

The purpose of this video presentation is to provide emergency responders an overview or refresher of key principles of wound packing. Wound packing is performed during the indirect threat care phase of an incident when there is no active threat. It may be used to control severe bleeding in places where tourniquets are not effective, such as bleeding near the junction of the torso and a limb.

Sign-in

 

Movement to Contact

Movement to Contactslide preview

The Movement to Contact micro module provides emergency responders an overview or refresher of key principles for team movement as they move to mitigate an active threat. This presentation looks at team sizes and configurations, as well as the advantages and disadvantages of a few common ones.

Sign-in

 

Direct Threat Care - Tourniquets

Direct Threat Care - Tourniquetsslide preview

The purpose of this presentation is to remind Emergency Responders of key tourniquet application principles in a direct threat care environment.

Sign-in

 

Zones of Operation During an Active Threat

Zones of Operation During an Active Threatslide preview

Zones of operation are defined by the relative level of threat. These designations determine where certain actions and specific personnel are allowed to operate. As a result, and for a safer and more efficient response, we identify and label areas at the scene based on our knowledge of the potential threat(s) in each of those areas. We do this by assigning identifiers: the hot zone, the areas of highest risk; the warm zone, an area of intermediate risk; and the cold zone, areas of least risk with regard to the incident. This presentation was created using content from NCBRT’s PER-340, Active Threat Integrated Response Course.

Sign-in

 

Direct Pressure

Direct Pressureslide preview

The purpose of this presentation is to remind emergency responders of key principles for applying direct pressure to injuries sustained during an active threat incident when tourniquets may not be an option. This presentation was created using content from NCBRT’s PER-340, Active Threat Integrated Response Course.

Sign-in

 

Rescue Task Force Formations

Rescue Task Force Formationsslide preview

The purpose of this presentation is to provide Emergency Responders an informational reminder of key principles surrounding the formation and response of a Rescue Task Force (RTF) in an active shooter or active threat incident. This presentation was created using content from NCBRT’s PER-275, Law Enforcement Active Shooter Emergency Response, and PER-340, Active Threat Integrated Response Course.

Sign-in

 

Contact Team Principles and Priorities

Contact Team Principles and Prioritiesslide preview

This presentation will address contact team concepts, principles, and priorities. These include solo officer entries, bypassing the wounded, and directing follow-on responders. This presentation was created using content from NCBRT’s PER-275, Law Enforcement Active Shooter Emergency Response, and PER-340, Active Threat Integrated Response Course.

Sign-in

 

CAN and SIM

CAN and SIMslide preview

The purpose of this presentation is to remind Emergency Responders of key principles of CAN (Conditions, Actions, and Needs) reports, and using SIM (Security, Immediate Action Plan, Medical Intervention) during an active threat incident. These principles can assist first responders to identify needs and rapidly respond to active threat incidents. This presentation was created using content from NCBRT’s PER-335, Critical Decision Making for Complex Coordinated Attacks, and PER-340, Active Threat Integrated Response Course.

Sign-in

Webinars

Webinars are short training videos to provide instruction on specific topics. Certificates of completion are available for each webinar.

 

Fourth Generation Nerve Agents

Fourth Generation Nerve Agentsslide preview

This video provides the viewer information regarding fourth generation nerve agents (FGA). After viewing, you will understand FGA mechanisms of toxicity, signs and symptoms of FGA poisoning, medical countermeasures, and immediate protective actions to prevent further contamination.

Sign-in

 

After Action Reports/Improvement Plans During a Pandemic

After Action Reports/Improvement Plans During a Pandemicslide preview

NCBRT is presenting a two-part webinar on after action plans/improvement plans in a pandemic response. Part 1 of this presentation provides a basic understanding of after-action reports/improvement plans, or AAR/IPs, during a major disaster such as a pandemic. We will discuss the key issues to address and some basic steps to use when writing an AAR/IP. The presentation will also define after-action reports/improvement planning and their importance for documentation and continued improvement activities during a pandemic response. We will identify how conducting an after-action report for infectious diseases, which are long-term, complex incidents, varies from AAR/IP reporting for other incidents. In the second part of NCBRT’s presentation on after action plans/improvement plans in a pandemic response, we will focus on the mechanics of writing the report: what to include in the report, what sources may be used to obtain that information, and how to use the templates available for writing the report. It will also include a review of AAR/IPs written for the pandemic response to the H1N1 pandemic at the local, state, and federal level.

Sign-in

 

Time, Distance, and Shielding - D.U.I.

Time, Distance, and Shielding - D.U.I.slide preview

In this short video, LSU NCBRT/ACE provides personal protective measure best practices that help minimize the spread of viral pathogens while conducting a field sobriety test. 

Sign-in

 

Mass Fatality Management

Mass Fatality Managementslide preview

This webinar focuses on tactics for managing fatalities resulting from COVID-19. This webinar will focus on how handling fatalities during a pandemic can differ from other types of disasters. It will also provide considerations for managing mass fatalities such as the storage of remains and methods of identification to assist in repartition to families.

Sign-in

 

Time, Distance, Shielding - B.U.I. on Water

Time, Distance, Shielding - B.U.I. on Waterslide preview

In this short video, LSU NCBRT/ACE has partnered with NASBLA to provide personal protective measure best practices that help minimize the spread of viral pathogens while conducting the seated battery of standardize field sobriety testing (SFST).

Sign-in

 

Demobilization in a Pandemic

Demobilization in a Pandemicslide preview

LSU NCBRT/ACE created the Demobilization in a Pandemic webinar to help individuals understand demobilization plans and procedures for jurisdictions, agencies, and departments under federal guidance during a pandemic. This webinar will explain the importance of plans, procedures and documentation during a major public health disaster such as a pandemic and how that affects the U.S. response at the federal, tribal, state and local levels.

Sign-in

 

Breaking the Chain: Preventing the Spread of Surface Contamination

Breaking the Chain: Preventing the Spread of Surface Contaminationslide preview

This short video demonstrates the ease and prevalence of potential contamination by following the chain of contamination through ordinary, daily activities. The video also provides concrete, CDC-approved techniques that can help curb the spread of germs and contagious particles.

Sign-in

 

Handling COVID-19 Exposed Evidence

Handling COVID-19 Exposed Evidenceslide preview

These two videos will highlight the proper precautions to take when conducting a crime scene investigation where the scene and the evidence are contaminated by COVID-19. The first video provides an overview of safely collecting and storing contaminated evidence, maintaining chain of custody, using exposed evidence in a court room, decontaminating evidence, and lab analyst protections. The second video lays out step-by-step procedures for safely collecting and packaging latent fingerprint, hair and fiber, serological, soil trace, impression, and document evidence.

Sign-in

 

First Responder PPE Guidelines

First Responder PPE Guidelinesslide preview

This 11-minute video provides an overview of protective gear available to responders for outbreak response. It addresses how the gear protects people, what its limitations may be, and techniques for properly donning and doffing PPE so responders can adequately protect themselves.

Sign-in

 

EOC Operations During Social Distancing

EOC Operations During Social Distancingslide preview

This webinar features protocol during social distancing for Emergency Operations Centers.

Sign-in

 

Responder Wellness During COVID-19

Responder Wellness During COVID-19slide preview

In this webinar, LSU NCBRT/ACE examines aspects of COVID-19 that may cause anxiety or stress for the responder community. The video also offers techniques that responders can practice to help manage or mitigate that anxiety.

Sign-in

 

Alternate Care Sites

Alternate Care Sitesslide preview

The presentation includes information on setting up alternative care sites and how alternative sites can relieve some of the burden on hospitals.

Sign-in

 

Safer at Home

Safer at Homeslide preview

This short video provides tips for emergency responders on how to ensure that they are protecting themselves, their families and their homes from COVID-19 exposure after a shift. 

Sign-in

 

CDC Sequence for Donning and Doffing PPE

CDC Sequence for Donning and Doffing PPEslide preview

This 6-minute video walks viewers step-by-step through the guidelines prescribed by the CDC for donning and doffing a gown, mask/respirator, face shield, and gloves.

Sign-in

 

Officer Safety: Time, Distance and Shielding

Officer Safety: Time, Distance and Shieldingslide preview

This animated video serves as a visual tool for highlighting the proper precautions that officers and emergency responders should take when performing their day-to-day operations during the COVID-19 pandemic.

Sign-in

 

COVID-19 Roll Call Training

COVID-19 Roll Call Trainingslide preview

This video provides information on how officers can keep themselves safe before, during, and after contact with others in the course of their job. It also addresses steps officers can take at the end of a shift to go home safely. 

Sign-in

Micro Modules en Español

Micro Modules are brief, webinar-formatted presentations based on NCBRT course content. They may be used as review or refresher for users who have previously taken NCBRT training or serve as an introduction to topics for those who have not completed the related course. Certificates of completion are available for each Micro Module.

 

Taponamiento de Heridas

Taponamiento de Heridasslide preview

El propósito de esta presentación en video es brindar a los servicios de emergencia una descripción general o un repaso de los principios clave del Taponamiento de heridas. El taponamiento de heridas se realiza durante la fase de atención de amenazas indirectas de un incidente cuando no hay una amenaza activa. Puede usarse para controlar el sangrado severo en lugares donde los torniquetes no son efectivos, como el sangrado cerca de la unión del torso y una extremidad.

Sign-in

 

Negociar Puertas

Negociar Puertasslide preview

Esta presentación proporciona a los servicios de emergencia una descripción general o un repaso de los principios clave para negociar puertas abiertas y cerradas mientras limpian las habitaciones durante una situación de amenaza activa. Cuando los socorristas ingresan a la habitación, deben moverse rápida y decisivamente a través de la puerta y prepararse para enfrentar la amenaza.

Sign-in

 

Movimiento Para Hacer Contacto

Movimiento Para Hacer Contactoslide preview

El micro módulo Movimiento para hacer contacto proporciona a los servicios de emergencia una descripción general o un repaso de los principios clave para el movimiento del equipo a medida que avanzan para mitigar una amenaza activa. Esta presentación analiza los tamaños y configuraciones de los equipos, así como las ventajas y desventajas de algunos de los más comunes.

Sign-in

 

Formaciones de equipos de rescate

Formaciones de equipos de rescateslide preview

El propósito de esta presentación es proporcionar al personal de respuesta a emergencias un recordatorio informativo de los principios clave que rodean la formación y respuesta de un Grupo de trabajo de rescate (RTF) en un incidente de tirador activo o amenaza activa. Esta presentación se creó utilizando contenido de PER-275 de NCBRT, Respuesta de emergencia de tirador activo de aplicación de la ley, y PER-340, Curso de respuesta integrada a amenazas activas.

Sign-in

 

Zonas de Operacion Durante una Amenaza Activa

Zonas de Operacion Durante una Amenaza Activaslide preview

Las zonas de operación se definen por el nivel relativo de amenaza. Estas designaciones determinan dónde se permite operar ciertas acciones y personal específico. Como resultado, y para una respuesta más segura y eficiente, identificamos y etiquetamos áreas en la escena en base a nuestro conocimiento de las amenazas potenciales en cada una de esas áreas. Hacemos esto asignando identificadores: la zona caliente, las áreas de mayor riesgo; la zona cálida, zona de riesgo intermedio; y la zona fría, áreas de menor riesgo con respecto al incidente. Esta presentación se creó utilizando contenido del PER-340, Curso de respuesta integrada a amenazas activas de NCBRT.

Sign-in

 

Atención de Amenaza Directa Aplicación de Torniquete

Atención de Amenaza Directa Aplicación de Torniqueteslide preview

El propósito de esta presentación es para recordarle al personal de respuesta a emergencias los principios clave de la aplicación de torniquetes en un entorno de atención directa a amenazas.

Sign-in

 

Presión Directa

Presión Directaslide preview

El propósito de esta presentación es recordarle a los servicios de emergencia los principios clave para aplicar presión directa a las lesiones sufridas durante un incidente de amenaza activa cuando los torniquetes pueden que no sean una opción. Esta presentación se creó utilizando contenido del PER-340, Curso de respuesta integrada a amenazas activas de NCBRT.

Sign-in

 

Principios Y Prioridades del Equipo de Contacto

Principios Y Prioridades del Equipo de Contactoslide preview

Esta presentación abordará los conceptos, principios y prioridades del equipo de contacto. Estos incluyen entradas de oficiales en solitario, evitando a los heridos y dirigiendo a los respondedores de seguimiento. Esta presentación se creó utilizando contenido de PER-275 de NCBRT, Respuesta de emergencia de tirador activo de aplicación de la ley, y PER-340, Curso de respuesta integrada a amenazas activas.

Sign-in

 

CAN Y SIM

CAN Y SIMslide preview

El propósito de esta presentación es recordarle al personal de respuesta a emergencias los principios clave de los informes CAN (Condiciones, Acciones y Necesidades) y el uso de SIM (Seguridad, plan de acción Inmediata, intervención Médica) durante un incidente de amenaza activa. Estos principios pueden ayudar a los socorristas a identificar necesidades y responder rápidamente a incidentes de amenazas activas. Esta presentación se creó utilizando contenido del PER-335 de NCBRT, Toma de decisiones críticas para ataques coordinados complejos, y PER-340, Curso de respuesta integrada a amenazas activas.

Sign-in

Webinars en Español

Webinars are short training videos to provide instruction on specific topics. Certificates of completion are available for each webinar.

 

Desmovilización en una pandemia

Desmovilización en una pandemiaslide preview

LSU NCBRT / ACE creó el seminario web Desmovilización en una pandemia para ayudar a las personas a comprender los planes y procedimientos de desmovilización para jurisdicciones, agencias y departamentos bajo la guía federal durante una pandemia. Este seminario web explicará la importancia de los planes, los procedimientos y la documentación durante un desastre de salud pública importante, como una pandemia, y cómo eso afecta la respuesta de los EE. UU. A nivel federal, tribal, estatal y local.

Sign-in

 

Manejo De Fatalidades Masivas

Manejo De Fatalidades Masivasslide preview

Este seminario web se centra en las tácticas para manejar las muertes resultantes de COVID-19. Este seminario web se centrará en cómo el manejo de las muertes durante una pandemia puede diferir de otros tipos de desastres. También proporcionará consideraciones para el manejo de muertes masivas, como el almacenamiento de restos y métodos de identificación para ayudar en la distribución a las familias.

Sign-in

 

Romper la Cadena: Evitar la Propagacion de la Contaminacion Superficial

Romper la Cadena: Evitar la Propagacion de la Contaminacion Superficialslide preview

Este breve video demuestra la facilidad y la prevalencia de la contaminación potencial siguiendo la cadena de contaminación a través de las actividades diarias ordinarias. El video también proporciona técnicas concretas aprobadas por los CDC que pueden ayudar a frenar la propagación de gérmenes y partículas contagiosas.

Sign-in

 

El manejo de COVID-19 de evidencia expuesta

El manejo de COVID-19 de evidencia expuestaslide preview

Estos dos videos resaltarán las precauciones apropiadas a tomar al llevar a cabo una investigación de la escena del crimen donde la escena y las evidencias están contaminadas por COVID-19. El primer video proporciona una visión general de la recopilación y almacenamiento seguro de evidencias contaminadas, el mantenimiento de la cadena de custodia, el uso de evidencias expuestas en una sala de la corte, la descontaminación de evidencias y las protecciones de los analistas de laboratorio. El segundo video establece procedimientos paso a paso para recolectar y empaquetar de forma segura huellas dactilares latentes, cabello y fibra, serológicos, rastros de suelo, impresiones y documentos de evidencia.

Sign-in

 

Operaciones del EOC durante el distanciamiento social

Operaciones del EOC durante el distanciamiento socialslide preview

LSU NCBRT/ACE presenta este webinario que incluye los protocolos durante el distanciamiento social para los Centros de Operaciones de Emergencia.

Sign-in

 

Salud del Respondedor Durante COVID-19

Salud del Respondedor Durante COVID-19slide preview

En este seminario web, LSU NCBRT/ACE examina aspectos de COVID-19 que pueden causar ansiedad o estrés para la comunidad de respondedores. El video también ofrece técnicas que los respondedores pueden practicar para ayudar a manejar o mitigar esa ansiedad.

Sign-in

 

Seguridad del Oficial: Tiempo, Distancia, Proteccion

Seguridad del Oficial: Tiempo, Distancia, Proteccionslide preview

Este video animado sirve como una herramienta visual para destacar las precauciones adecuadas que los oficiales y los respondedores de emergencia deben tomar al realizar sus operaciones diarias durante la pandemia de COVID-19.

Sign-in

 

Pautas de EPP para Personal de Respuesta

Pautas de EPP para Personal de Respuestaslide preview

Este vídeo de 11 minutos ofrece una visión general del equipo de protección disponible para los respondedores para la respuesta al brote. Aborda cómo el equipo protege a las personas, cuáles pueden ser sus limitaciones y las técnicas para ponerse y quitarse EPP para que los respondedores puedan protegerse adecuadamente.

Sign-in

 

Sitios de Atención Alternativos

Sitios de Atención Alternativosslide preview

La presentación incluye información sobre la creación de sitios de atención alternativos y cómo los sitios alternativos pueden aliviar parte de la carga para los hospitales.

Sign-in

 

CDC Secuencia para Ponerse y Quitarse EPP

CDC Secuencia para Ponerse y Quitarse EPPslide preview

Un video de 6 minutos que guía a los espectadores paso a paso a través de las pautas prescritas por los CDC para ponerse y quitarse un vestido, máscara / respirador, protector facial, y guantes.

Sign-in

 

Mas Seguros en su Casa

Mas Seguros en su Casaslide preview

Diseñada para aquellos cuyas profesiones exigen que se pongan en mayor riesgo de contraer COVID-19, esta presentación en vídeo de 3 minutos y medio introduce varias medidas de seguridad que los respondedores de emergencia y otro personal esencial pueden utilizar antes y después de los turnos para minimizar el riesgo de introducir el coronavirus en sus hogares.

Sign-in

 

Capacitación de Covid-19 Roll Call

Capacitación de Covid-19 Roll Callslide preview

Para garantizar la seguridad de los oficiales durante la crisis del COVID-19, este video de capacitación de 18 minutos para las fuerzas del orden, ofrece información sobre cómo los oficiales pueden mantenerse seguros antes, durante y después del contacto con otros en el curso de su trabajo. También aborda los pasos que los oficiales pueden tomar al final de un turno para proteger a sus seres queridos.

Sign-in