Stalkers & Other Dangerous Individuals
Acosadores e Individuos Peligrosos
About This Course
Identification and management of stalking behaviors and dangerous individuals. Covers typologies (rejected, resentful, predatory, intimacy-seeking), structured threat assessment (HCR-20, SAPR-V), victim safety planning, workplace violence prevention, and law enforcement coordination.
Learning Objectives
- 1Identify stalking typologies and behavioral indicators
- 2Conduct structured threat assessments using HCR-20 and SPJ methodologies
- 3Develop comprehensive victim safety plans
- 4Design workplace violence prevention programs
- 5Investigate stalking cases using professional techniques
- 6Recognize pathway-to-violence indicators
- 7Manage celebrity and high-profile stalking threats
- 8Coordinate with law enforcement and victim advocacy services
Course Modules
Who This Course Is For
Related Courses
Electronic & Physical Surveillance Methods & Countermeasures
ESIG-C03 · Surveillance/TSCM
Comprehensive training in surveillance detection, technical surveillance countermeasures (TSCM), and counter-surveillance operations. Covers electronic eavesdropping, physical surveillance techniques, RF detection, and sweep procedures for high-threat environments.
Telephone Eavesdropping & Countermeasures
ESIG-C13 · Surveillance/TSCM
Deep technical training on telephone network vulnerabilities, interception methods, and countermeasures. Covers PSTN/SS7 vulnerabilities, IMSI catchers, VoIP exploitation, commercial spyware (Pegasus), TSCM sweep procedures, and secure communications implementation.
Course Details
Included in Packages
Certificate
Included with Surveillance Countermeasures Specialist (ESI-CSCS) package