To provide students with the knowledge and skills necessary to analyse asymmetric threats, and to examine the operational roles of the military in countering such threats.
If you wish to join a resident course you may have your agency POC send a seat request.
Please click on the POC Finder
to obtain the contact information of your agency POC.
ADL courses can be accessed without the need for enrolment but students are required
to register through the JADL portal
using a military/government email address otherwise they will not be accepted.
ASYMMETRIC WARFARE DEFINITION:
Given references, the student will be able to explain the definition of asymmetric warfare in temporary security environment
WAGING AND COUNTERING:
Given references, the student will be able to apply the principles of waging and countering the assymmetric warfare
ANALYZING CURRENT THREATS:
Given references, the student will be able to analyse current asymmetric warfare threats
This course is designed for military officers (OF-2 to OF-5), warrant officers and senior non-commissioned officers who are preparing for a National or International Joint Operations assignment that may involve joint planning. The civilians and Government Agencies involved in combined activities with military or interagency cooperations are considered eligible.
||English 3332 IAW STANAG 6001
||NCO: OR-7 thru OR-9
Officer: OF-2 thru OF-5
This one-week course is comprised of an overview of Asymmetric Warfare areas of interest. The course has a different area of interest for each day, culminating in a practical exercise, which addresses: AW concepts, strategic philosophies, and operational approaches conducted with operational vignettes and case studies.
Lessons will be conducted through interactive lectures on concepts, principles and procedures. Lectures will be followed by a case study on a former or current Asymmetric Warfare threats and followed by performance-oriented syndicate work in order to comprehend the knowledge and skills for meeting the aim of the course.
The course explores the following security challenges:
State Sponsored Activities
Transnational Organized Crime
The Information Environment