To learn more about this training CD-Rom and how to order it, please see our order page.

Site Map

Preface
-
Print Preface

Introduction
-
Print Introduction

Tabletop Exercises

- Simple Tabletop Exercises
-- Intentional Contamination
---
Scenario 1
--
Security Breach
---
Scenario 2
--
Cyber Security Breach
---
Scenario 3
---
Scenario 4
--
Physical Attack
---
Scenario 5
---
Scenario 6
--
Interdependency
---
Scenario 7
---
Scenario 8

Enhanced Tabletop Exercises
-- Intentional Contamination
---
Scenario 1
--
Security Breach
---
Scenario 2
--
Physical Attack
---
Scenario 6
--
Interdependency
---
Scenario 8

Customize a Tabletop Exercise
-
Print Customize a Tabletop Exercise

Train-the-Trainer Presentations
- Background, Purpose, Value of Exercises
-
How to Set Up for a Zenith City Tabletop Exercise
-
How to Conduct an Enhanced Zenith City Tabletop Exercise
-
How to Conduct an After Action Review
-
Incident Command System – Introduction and Overview
-
National Incident Management System – Introduction and Overview
-
Response Protocol Toolbox – Introduction and Overview
- National Response Plan

Useful Water Security Web Links

Useful Water Security Documents

Free Software