SlideShare a Scribd company logo
1 of 3
Download to read offline
Asia-Pacific Center for Security Studies
       ADVANCED SECURITY COOPERATION (ASC) Course 12- 1


Purpose

Advanced Security Cooperation (ASC) is an executive education course that addresses the
major security challenges confronting Asia-Pacific security practitioners. The course is
holistic in that it evaluates the complex nature of traditional and non-traditional security
dynamics. Most importantly, it affords fellows (country participants) the opportunity to think
critically about security issues and explore opportunities to develop collaborative strategies
that address a range of challenges directly. These involve topics of internal security,
including governance, the rule of law, security sector development, whole of government,
and economic development. The curriculum also includes issues of external and
transnational security involving trans-border challenges associated with the global commons
which require international collaboration and policy cooperation. These include maritime
security, terrorism, and disaster management. Through the practical application of critical
thinking and problem solving the course allows fellows to effectively understand and, in turn,
address the Asia-Pacific’s most pressing security issues. The ASC is a participant centered
learning experience in which interactive and dynamic teaching methods are adopted for the
benefit of a multi-national audience of practitioners.


Course description

Advanced Security Cooperation is a four and a half week course designed to enhance
individual leader capabilities in critical thinking, communication, collaboration, and
decision-making in complex and culturally diverse environments. Created specifically for
senior level security practitioners from across the Asia-Pacific region and beyond, the course
provides an international setting that seeks to:

   •   Enhance decision-making capacity in order to capitalize on opportunities for regional
       collaboration.

   •   Improve international cooperation and interagency effectiveness on regional security
       issues; construct solutions for addressing protracted challenges associated with the
       global commons.

   •   Enhance civil-military relations and security sector effectiveness.

   •   Increase capacity for improving governance and security sector integration.

   •   Develop extensive networks and relationships with a community of mid-career &
       senior level security practitioners and experts.




ASC 12-1
Asia-Pacific Center for Security Studies
          Advanced Security Cooperation (ASC) Course

Who would benefit by attending this course

The Advanced Security Cooperation Course attracts a broad range of participants from across
the region and beyond. The course curriculum is designed primarily for security practitioners
and experts whose current and future responsibilities require significant participation in
domestic and international security policy formulation and execution, and who have the
following backgrounds:

   •   Military & Law Enforcement Officers; Foreign Service, Foreign Affairs Officers

   •   Representatives of Government Agencies and International, Regional and Non-
       Governmental Organizations

   •   Business (self-funded) and Media Representatives


Educational Objectives

Enhance Knowledge on Security Trends and Tools of Cooperation
   • Identify key strategic trends that influence and shape the international and regional
      security environment.
   • Share best practices of governance and security sector development.
   • Mitigate tensions toward fostering cooperation in the global commons.

Enhance Leader Effectiveness
   • Understand and incorporate cultural and national sensitivities.
   • Communicate effectively (advocate/persuade, not just inform) in a variety of
      situations.
   • Cooperate, contribute and lead within a multi-national team.
   • Conduct complex problem analysis and project management.
   • Use information communication technology to enhance levels of cooperation.

Expand a Network of practitioners within the regional and global security community
   • Build relationships with practitioners from other agencies, organizations, institutions,
       and countries.
   • Develop an appreciation for a shared experience.
   • Explore new and emerging information communication technologies (ICT) to
       maintain relationships and connectivity beyond the APCSS experience.




ASC 12-1                                      2
Asia-Pacific Center for Security Studies
          Advanced Security Cooperation (ASC) Course


Educational Approach

Core Curriculum

The ASC has four modules which each provide an opportunity to put ideas into practice
through experiential learning. During Module I, fellows participate in understanding the
complexities of security cooperation and confidence building. This is done through an
exercise-based format running over three days that focuses on security complexity, causal
relationships, issue-framing, strategic development, strategic communications, and critical
problem-solving. These processes involve using analytic tools to evaluate the sources, scope
and implications of security problems. Module II provides fellows with a set of topics and
discussions on internal security cooperation, including security sector development, the role
of governance and rule of law, whole of society and whole of government approaches to
security, and disaster management. Module III is structured with in-depth framing lectures,
case studies, and seminar discussions on the roles and responsibilities of major powers and
issues of cooperation within the Asia-Pacific’s sub-regions. This includes a focus on
maritime security and law of the sea in critical and contested areas. In Module IV, the course
concludes with the composite skills-based exercise intended to tie together and apply the
knowledge and analytical tools developed over the previous three weeks. Throughout the
course, fellows will also participate in small group case studies on sub-regional and
transnational issues, and engage with an individual research project.

Elective Curriculum
The electives provide fellows with study of specific issues relevant to comprehensive
security. Electives are structured in two ways: elementary and advanced. Fellows will
choose two elementary and one advanced elective. These focused sessions are intended to
evaluate a range of critical issue associated with a particular security issue. A broad selection
of electives are offered by APCSS faculty this year: maritime security-law of the sea;
security sector development; health security; governance and security; China’s foreign
policy; soft power; the public-private nexus; disaster management; terrorism and extremism;
and environmental security.



ASC Course Manager: Dr. Justin Nankivell
Course Coordinator: Lt. Col. Reese Evers




ASC 12-1                                       3

More Related Content

Similar to Asc course description.april_3_2012

Safety, Security and Risk Management in Agro-industrial Organizations
Safety, Security and Risk Management in Agro-industrial OrganizationsSafety, Security and Risk Management in Agro-industrial Organizations
Safety, Security and Risk Management in Agro-industrial OrganizationsDr. Dan EKONGWE
 
Management Approach to disaster risk and humanitarian response
Management Approach to disaster risk and humanitarian responseManagement Approach to disaster risk and humanitarian response
Management Approach to disaster risk and humanitarian responseDr. Dan EKONGWE
 
School Safety Framework 2016.pdf
School Safety Framework 2016.pdfSchool Safety Framework 2016.pdf
School Safety Framework 2016.pdfXolaniRadebeRadebe
 
fiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltdfiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltdFiinovation
 
S15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalS15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalBrooke Peckins
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)Nuhu John
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
JDR Global Resources
JDR Global ResourcesJDR Global Resources
JDR Global ResourcesJDRglobal
 
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docxAgainst MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docxdaniahendric
 
Safety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdfSafety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdfBanchangHome
 
sc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxsc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxRiddhiRathod36
 
Safety education and training
Safety education and trainingSafety education and training
Safety education and trainingBimal Chandra Das
 
Drr practitioners workshop report
Drr practitioners workshop reportDrr practitioners workshop report
Drr practitioners workshop reportCSRU
 
2010 Summit Presentation
2010 Summit Presentation2010 Summit Presentation
2010 Summit Presentationgmoore22
 
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxSECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxTANKO AHMED fwc
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxJASS44
 
Fostering a Robust Process Safety Culture in the Oil & Gas Industry
Fostering a Robust Process Safety Culture in the Oil & Gas IndustryFostering a Robust Process Safety Culture in the Oil & Gas Industry
Fostering a Robust Process Safety Culture in the Oil & Gas Industrysoginsider
 
Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...Kayode Fayemi
 

Similar to Asc course description.april_3_2012 (20)

Safety, Security and Risk Management in Agro-industrial Organizations
Safety, Security and Risk Management in Agro-industrial OrganizationsSafety, Security and Risk Management in Agro-industrial Organizations
Safety, Security and Risk Management in Agro-industrial Organizations
 
Management Approach to disaster risk and humanitarian response
Management Approach to disaster risk and humanitarian responseManagement Approach to disaster risk and humanitarian response
Management Approach to disaster risk and humanitarian response
 
School Safety Framework 2016.pdf
School Safety Framework 2016.pdfSchool Safety Framework 2016.pdf
School Safety Framework 2016.pdf
 
fiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltdfiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltd
 
S15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalS15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_Final
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
JDR Global Resources
JDR Global ResourcesJDR Global Resources
JDR Global Resources
 
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docxAgainst MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
 
Safety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdfSafety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdf
 
sc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxsc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptx
 
Safety education and training
Safety education and trainingSafety education and training
Safety education and training
 
Drr practitioners workshop report
Drr practitioners workshop reportDrr practitioners workshop report
Drr practitioners workshop report
 
2010 Summit Presentation
2010 Summit Presentation2010 Summit Presentation
2010 Summit Presentation
 
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxSECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
 
Fostering a Robust Process Safety Culture in the Oil & Gas Industry
Fostering a Robust Process Safety Culture in the Oil & Gas IndustryFostering a Robust Process Safety Culture in the Oil & Gas Industry
Fostering a Robust Process Safety Culture in the Oil & Gas Industry
 
Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...
 
RISK MANAGEMENT Essays
RISK MANAGEMENT EssaysRISK MANAGEMENT Essays
RISK MANAGEMENT Essays
 
Albert res
Albert resAlbert res
Albert res
 

More from Teeranan

Csrt singapore workshop draft agenda 30jul12 1_
Csrt singapore workshop draft agenda 30jul12  1_Csrt singapore workshop draft agenda 30jul12  1_
Csrt singapore workshop draft agenda 30jul12 1_Teeranan
 
Ambush southern th
Ambush southern thAmbush southern th
Ambush southern thTeeranan
 
Nandhakwang thailand 07132012
Nandhakwang thailand 07132012Nandhakwang thailand 07132012
Nandhakwang thailand 07132012Teeranan
 
Political warfare 55
Political warfare 55Political warfare 55
Political warfare 55Teeranan
 
National power in_politics
National power in_politicsNational power in_politics
National power in_politicsTeeranan
 
Terrorism threat at the airport
Terrorism threat at the airportTerrorism threat at the airport
Terrorism threat at the airportTeeranan
 
New media and national security contents
New media and national security contentsNew media and national security contents
New media and national security contentsTeeranan
 
Apcss student handbook_sp2011
Apcss student handbook_sp2011Apcss student handbook_sp2011
Apcss student handbook_sp2011Teeranan
 
Asc course schedulemay2012
Asc course schedulemay2012Asc course schedulemay2012
Asc course schedulemay2012Teeranan
 
Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012Teeranan
 
Global issues 220355
Global issues 220355Global issues 220355
Global issues 220355Teeranan
 
Terrorist Risk in Thailand
Terrorist Risk in ThailandTerrorist Risk in Thailand
Terrorist Risk in ThailandTeeranan
 
Military PR using social network
Military PR using social networkMilitary PR using social network
Military PR using social networkTeeranan
 
Bomb in thailand
Bomb in thailandBomb in thailand
Bomb in thailandTeeranan
 
Thailand and asean
Thailand and aseanThailand and asean
Thailand and aseanTeeranan
 
Military power
Military powerMilitary power
Military powerTeeranan
 
ภาคใต้กับประชาคมอาเซียน
ภาคใต้กับประชาคมอาเซียนภาคใต้กับประชาคมอาเซียน
ภาคใต้กับประชาคมอาเซียนTeeranan
 
South thailand conflict
South thailand conflictSouth thailand conflict
South thailand conflictTeeranan
 
The unfamiliar war
The unfamiliar warThe unfamiliar war
The unfamiliar warTeeranan
 

More from Teeranan (20)

Csrt singapore workshop draft agenda 30jul12 1_
Csrt singapore workshop draft agenda 30jul12  1_Csrt singapore workshop draft agenda 30jul12  1_
Csrt singapore workshop draft agenda 30jul12 1_
 
Ambush southern th
Ambush southern thAmbush southern th
Ambush southern th
 
Nandhakwang thailand 07132012
Nandhakwang thailand 07132012Nandhakwang thailand 07132012
Nandhakwang thailand 07132012
 
Political warfare 55
Political warfare 55Political warfare 55
Political warfare 55
 
National power in_politics
National power in_politicsNational power in_politics
National power in_politics
 
Terrorism threat at the airport
Terrorism threat at the airportTerrorism threat at the airport
Terrorism threat at the airport
 
New media and national security contents
New media and national security contentsNew media and national security contents
New media and national security contents
 
Atfl
AtflAtfl
Atfl
 
Apcss student handbook_sp2011
Apcss student handbook_sp2011Apcss student handbook_sp2011
Apcss student handbook_sp2011
 
Asc course schedulemay2012
Asc course schedulemay2012Asc course schedulemay2012
Asc course schedulemay2012
 
Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012
 
Global issues 220355
Global issues 220355Global issues 220355
Global issues 220355
 
Terrorist Risk in Thailand
Terrorist Risk in ThailandTerrorist Risk in Thailand
Terrorist Risk in Thailand
 
Military PR using social network
Military PR using social networkMilitary PR using social network
Military PR using social network
 
Bomb in thailand
Bomb in thailandBomb in thailand
Bomb in thailand
 
Thailand and asean
Thailand and aseanThailand and asean
Thailand and asean
 
Military power
Military powerMilitary power
Military power
 
ภาคใต้กับประชาคมอาเซียน
ภาคใต้กับประชาคมอาเซียนภาคใต้กับประชาคมอาเซียน
ภาคใต้กับประชาคมอาเซียน
 
South thailand conflict
South thailand conflictSouth thailand conflict
South thailand conflict
 
The unfamiliar war
The unfamiliar warThe unfamiliar war
The unfamiliar war
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Asc course description.april_3_2012

  • 1. Asia-Pacific Center for Security Studies ADVANCED SECURITY COOPERATION (ASC) Course 12- 1 Purpose Advanced Security Cooperation (ASC) is an executive education course that addresses the major security challenges confronting Asia-Pacific security practitioners. The course is holistic in that it evaluates the complex nature of traditional and non-traditional security dynamics. Most importantly, it affords fellows (country participants) the opportunity to think critically about security issues and explore opportunities to develop collaborative strategies that address a range of challenges directly. These involve topics of internal security, including governance, the rule of law, security sector development, whole of government, and economic development. The curriculum also includes issues of external and transnational security involving trans-border challenges associated with the global commons which require international collaboration and policy cooperation. These include maritime security, terrorism, and disaster management. Through the practical application of critical thinking and problem solving the course allows fellows to effectively understand and, in turn, address the Asia-Pacific’s most pressing security issues. The ASC is a participant centered learning experience in which interactive and dynamic teaching methods are adopted for the benefit of a multi-national audience of practitioners. Course description Advanced Security Cooperation is a four and a half week course designed to enhance individual leader capabilities in critical thinking, communication, collaboration, and decision-making in complex and culturally diverse environments. Created specifically for senior level security practitioners from across the Asia-Pacific region and beyond, the course provides an international setting that seeks to: • Enhance decision-making capacity in order to capitalize on opportunities for regional collaboration. • Improve international cooperation and interagency effectiveness on regional security issues; construct solutions for addressing protracted challenges associated with the global commons. • Enhance civil-military relations and security sector effectiveness. • Increase capacity for improving governance and security sector integration. • Develop extensive networks and relationships with a community of mid-career & senior level security practitioners and experts. ASC 12-1
  • 2. Asia-Pacific Center for Security Studies Advanced Security Cooperation (ASC) Course Who would benefit by attending this course The Advanced Security Cooperation Course attracts a broad range of participants from across the region and beyond. The course curriculum is designed primarily for security practitioners and experts whose current and future responsibilities require significant participation in domestic and international security policy formulation and execution, and who have the following backgrounds: • Military & Law Enforcement Officers; Foreign Service, Foreign Affairs Officers • Representatives of Government Agencies and International, Regional and Non- Governmental Organizations • Business (self-funded) and Media Representatives Educational Objectives Enhance Knowledge on Security Trends and Tools of Cooperation • Identify key strategic trends that influence and shape the international and regional security environment. • Share best practices of governance and security sector development. • Mitigate tensions toward fostering cooperation in the global commons. Enhance Leader Effectiveness • Understand and incorporate cultural and national sensitivities. • Communicate effectively (advocate/persuade, not just inform) in a variety of situations. • Cooperate, contribute and lead within a multi-national team. • Conduct complex problem analysis and project management. • Use information communication technology to enhance levels of cooperation. Expand a Network of practitioners within the regional and global security community • Build relationships with practitioners from other agencies, organizations, institutions, and countries. • Develop an appreciation for a shared experience. • Explore new and emerging information communication technologies (ICT) to maintain relationships and connectivity beyond the APCSS experience. ASC 12-1 2
  • 3. Asia-Pacific Center for Security Studies Advanced Security Cooperation (ASC) Course Educational Approach Core Curriculum The ASC has four modules which each provide an opportunity to put ideas into practice through experiential learning. During Module I, fellows participate in understanding the complexities of security cooperation and confidence building. This is done through an exercise-based format running over three days that focuses on security complexity, causal relationships, issue-framing, strategic development, strategic communications, and critical problem-solving. These processes involve using analytic tools to evaluate the sources, scope and implications of security problems. Module II provides fellows with a set of topics and discussions on internal security cooperation, including security sector development, the role of governance and rule of law, whole of society and whole of government approaches to security, and disaster management. Module III is structured with in-depth framing lectures, case studies, and seminar discussions on the roles and responsibilities of major powers and issues of cooperation within the Asia-Pacific’s sub-regions. This includes a focus on maritime security and law of the sea in critical and contested areas. In Module IV, the course concludes with the composite skills-based exercise intended to tie together and apply the knowledge and analytical tools developed over the previous three weeks. Throughout the course, fellows will also participate in small group case studies on sub-regional and transnational issues, and engage with an individual research project. Elective Curriculum The electives provide fellows with study of specific issues relevant to comprehensive security. Electives are structured in two ways: elementary and advanced. Fellows will choose two elementary and one advanced elective. These focused sessions are intended to evaluate a range of critical issue associated with a particular security issue. A broad selection of electives are offered by APCSS faculty this year: maritime security-law of the sea; security sector development; health security; governance and security; China’s foreign policy; soft power; the public-private nexus; disaster management; terrorism and extremism; and environmental security. ASC Course Manager: Dr. Justin Nankivell Course Coordinator: Lt. Col. Reese Evers ASC 12-1 3