Book Review | Chapter 34 or C34 [A6-A] | C35 [A6-B] |
A Manager's Guide to Implement Your Crisis Management Plan | Terrorism, Civil Unrest and Demonstrations | Kidnap and Hostage Situations |
|
|
|
C36 [A6-C] | C37 [A6-D] | C38 [A6-E] |
Extortion or Blackmail | Threats against People | Threats against Property |
Staff Accident | Death at Work | Protest at University |
TSP Failure | Misinformation | |
Cybersecurity Attacks | ||
Malware | Phishing | Ransomware |
Cybersecurity Attacks | ||
DDoS | Data Breach | |
To learn more about the course and schedule, click the buttons below for the CM-300 Crisis Management Implementer [CM-3] and the CM-5000 Crisis Management Expert Implementer [CM-5].
Please feel free to send us a note if you have any questions. |
||||