Skip to main content

Currently Skimming:


Pages 34-42

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 34...
... 32 CHAPTER THREE EMERGENCY TRAINING AND EXERCISE DELIVERY METHODS This chapter is based on a review of literature and interviews with information sources, and includes the following topics: • Field crew meetings • Just-in-time training (JITT) • Interjurisdictional and interagency training and exercises • Joint training • Asynchronous training – Computer-based training without instructors – Prepackaged CDs and DVDs • Train-the-trainer • Planned events and incidents, exercises – Exercises – Discussion-based training › Workshops › Seminars › Tabletop exercises › Games – Operations-based training › Drills › Functional exercises › Full-scale exercises • Classroom training (including CCTV, VTC, VoIP)
From page 35...
... 33 the most effective format for learning; however, classroom training may not always be feasible. Therefore, as Security 101 recommends, the trainings should be designed to be flexible in terms of time duration and be designed as modules that can be integrated with other trainings or meetings (Security 101 2009)
From page 36...
... 34 use of the training, over an extended period of time (prevents decay if the learner cannot use the material upon returning to the job)
From page 37...
... 35 Computer-Based Training Without Live Instructors Online training is easily accessible wherever there is access to the web. Computer-based training that is available on demand without a live instructor alleviates the need to schedule the training in advance and can be taken anytime.
From page 38...
... 36 dents is that exercises are conducted in a "controlled, lowrisk setting" (HSEEP 2013, p.
From page 39...
... 37 graphic may be more comfortable with this training and exercise method, and may be more motivated to participate in simulated scenarios and exercises. Table 19 summarizes the advantages and disadvantages of this method.
From page 40...
... 38 perform initial VTC settings locally, update and apply patches, disable the auto-answering feature, disable wireless capabilities, separate VTCs from the rest of the IP network, and -- if remote access is necessary -- have strict access controls ("Video Teleconferencing," National Security Agency n.d.)
From page 41...
... 39 • The exercise should be held in a room with a conference table, or with the seating arranged in a manner in which the participants are able to see all other participants. • Having coffee/soda available for the participants helps promote a relaxed atmosphere.
From page 42...
... 40 conducted in a real-time setting that is more realistic than that of FEs. They provide the highest level of realism for any exercise type and require "critical thinking, rapid problem solving, and effective responses by trained personnel." Actual personnel, equipment, and other resources may be deployed (HSEEP 2013, p.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.