1.Render-safe procedures (RSPs) 2.Post-incident scene management and forensic search and analysis procedures 3.EOD/IEDD equipment use 4.Robotic vehicle deployment and use 5.Safety procedures Robotic/manual deployment 6.Incident management Command, control and communications 7.Weapon/disrupter deployment and use Search in an IEDD role 8.Threat analysis Planned operations 9.Vehicle bomb disablement EOD/IEDD in hostile environments 10.Terrorist weapons IEDD in hostage rescue operations 11.Terrorist methods of operations IEDD in Special Forces roles 12.IED understanding and function Improvised mortars, grenades and rockets
IEDD Equipment Training Using the correct equipment is key to any render-safe procedure. Our instructors provide indispensable training in this area. Programmes include specialist equipment training, equipment solutions for EOD teams, requirements and recommendations for use, serviceability and suitability, and current equipment holding status.
C-IED Investigation Training There is an increased necessity for expertise in the face of terrorist attacks. In our C-IED investigation courses HMS instructors (former weapons intelligence operators) train personnel to enable them to investigate the aftermath of an attack. The programme primes students to capably operate within a weapons intelligence team; identifying devices used, how they were made and their composition.
Assault IEDD Course The Assault IEDD course is designed to train the experienced IED operator in the overt and covert techniques used in the rapid assessment and neutralization of access denial devices, so as to allow an assault team to reach its destination silently, safely and without compromise. The students will also be trained in the procedures carried out in order to stabilize and disable multi-switched complex IEDs, including hostage-type devices. The course is designed to be progressive, using a combination of theoretical instruction and practical exercises including operator search, radiography, manual techniques and alarm disablement. The course will culminate in a realistic ongoing hostage-type scenario necessitating a number of covert and overt approaches in order to identify, access and render-safe various IEDs before an armed assault team can conduct a rescue operation.
|