COVID-19: See our Phoenix Forward page

Digital Badge: Countering Terrorism

© John D. and Catherine T. MacArthur Foundation- used with permission.

Digital Badging

Government Affairs will be offering a Digital Badge for completing the approved classes at the Countering Terrorsm Series. A digital badge is a micro-credential that validates an accomplishment, skill set or competency a learner has earned. Digital Badges can be placed on a resume or digital platform, such as LinkedIn, to show employers you have the critical skill set and job-ready competencies that allow you to be a confident and engaging employee.


How to Earn the Digital Badge

  • Attend all 5 sessions 
  • Complete the entirety of each session
  • Pass the test with 80% or higher
  • Write a Terrorism Needs Assessment Plan
Countering Terrorism Digital Badge

 

Benefits for the employee:

Verified Knowledge

Badges are a quick and easy way to share verified knowledge and expertise to employers and colleagues.
Digital Access

Badges empower earners with 24/7 digital access on resumes, websites, social media and email signatures.
Competitive Edge

Badges provide a competitive edge and a way to differentiate from other candidates.

 

Benefits for the employer:

Recognize

Badges are a secure and verifiable way to recognize professional achievement.

Accomplishment

Badges offer a current record of accomplishment for candidates.

Countering Terrorism Digital Badge
Digital Badges
There's data inside!
  • Badge Name
  • Badge URL (description)
  • Badge Criteria
  • Badge Image
  • Issuer
  • Issue Date
  • Recipient
  • Criteria
  • ​Alignment
  • Evidence URL

 

Countering Terrorism 2021 Badge

(Total Hours: 10.0)
Value Statement: The Countering Terrorism series examines domestic and cyber terrorism.  Individuals learned that all communities large and small are vulnerable to terrorism. The individuals who completed this course series have gained an awareness of how to develop a hazard plan, strategies on preventing terrorism, and lessons learned from real-life events of domestic and cyber terrorism.   
 
Course Description Learning Outcomes Assessment #
Panel Session A:  Domestic Unrest:  Considerations for the Protection and Safety of our Citizens
The cities of Seattle, WA and Minnetonka Beach, MN shared their stories of civil unrest and what they learned and tips on how to plan for protests and riots.
Panel B:  Clerk’s Reflections:  Don’t think this can’t happen in your community! 
Clerks shared their experiences on how civil unrest and riots have affected their responsibilities and roles in their communities.
 
Learning Objectives
  • Always consider the protection and safety of your citizens and be prepared for the inevitable.
  • Need to continually update emergency plans.  The nature of events are always changing.
  • Importance of co-operative agreements between neighboring cities.
  • Who should be at the table when building emergency management plans.
Individuals were assessed using the following methods:
  1. Situational scenarios
  2. Breakout room problem-solving
Developing a Terrorism Needs Assessment Plan for your Community
Most organizations have emergency management plans. However, the plans are many times outdated and not known organization-wide. This session taught attendees how to do a Terrorism Needs Assessment Plan using a hazard risk assessment tool.

 
Learning Objectives
  • Be prepared for an emergency.  People will come to government for help.
  • Learn how to use a hazard risk assessment tool.  This tool prioritizes the hazards. It assists the community on where they need to spend their money and energy.
  • Importance of communicating the emergency management plan to the entire organization.  For a plan to be affective the entire organization needs to know and understand how the emergency operation will be carried out.  It isn’t for the authors only.
Individuals were assessed using the following methods:
  1. Individuals performed an emergency management hazard risk assessment for their community.
Business Email compromise Terrorism:  The next big digital threat
Learn from real world examples of the ever-changing techniques the hackers from the dark web are using to attack your IT system. 
Learning Objectives
  • Five Key Points of Data Security
  • Train and develop awareness on data security and protection.
  • Importance of training your employees.
Individuals were assessed using the following methods:
  1. Situational scenarios
  2. Polling
  3. Passed a test with a minimum score of 80% or better
Don’t Be held Ransom:  Learn defense measures against Ransomware. It can happen to you.
Ransomware is malware that is designed to cripple computer systems by encrypting all data and files until the ransom is paid.
This session covered the basics of how this malware is spread and how it behaves once a system is affected.
Learning Objectives
  • Importance of increasing the budgets for IT security.
  • How to detect a data breach.
  • Cyber insurance
  • Use table top exercise to test the security of your IT system.
  • What should you do if you have a ransomware attack.
  • Training your employees.
Individuals were assessed using the following methods:
  1. Situational scenarios
  2. Polling
  3. Passed a test with a minimum score of 80% or better
Naming, Blaming, Claiming Prejudice and Discrimination in Counter-Terrorism
This session explored the naming, blaming concepts that divide us as a nation when we all should be coming together.  It is important to represent all people involved when problem solving.
 
Learning Objectives:
  • Understanding implicit bias
  • Adaptive Leadership
  • Injustice is designed
  • Concept of naming the problem, owning the problem, and implementing a plan to correct the problem.
Individuals were assessed using the following methods:
  1. Situational scenarios
  2. Polling
  3. Passed a test with a minimum score of 80% or better