Identification of Threats and the Human Element Certificate of Completion

The Identification of Threats and the Human Element Certificate consists of two courses (8 credit hours) designed to meet the needs of online students in the fields of threat analysis and threat assessment. Courses included in the certificate introduce students to building the protocols for threat analysis, examining physical and informational procedures for assessing potential threats, and information management and communication best practices.

For professionals who want to further their education beyond a certificate and grow their careers in this direction, Bellevue University is offering the Master’s in Threat Assessment (available July 2025), which is built from courses such as those in this certificate of completion.

What You'll Learn

Students will learn to develop and demonstrate the following:

  • Analyze countermeasures for assessed threats to include them in an overall security plan.
  • Collaborate on countermeasures with your security team, based on threats presented.
  • Design concise and clear messages into a plan to relay security concerns.
  • Analyze actions taken by individuals and how that can be damaging to the organization.
  • List psychological factors to human interaction with security events.
  • Describe legal issues and regulations that guard an organization from security threats.

Certificate of Completion Courses designed to meeet the needs of online students in:

(Click a course name below to view course details).

This course discusses implementation of threat assessment and how inadequate threat assessments may result in compromised or unauthorized access. It also discusses how communication, its delivery, and protection needs to be of the highest standard to lead to more success and that a clear message is the most appropriate path to adequate communication. The course will include a discussion of security personnel contributions and how they guide and help develop an appropriate incident response plan based on the identified threats from threat assessment activities.

This course discusses the controls that are put in place in order to keep undesirable actions on the outside and desirable actions internal as this can expend a great deal of time and resources. The course looks at possible bad decisions on the part of users in the organization and how to nullify those decisions with appropriate countermeasures. The course helps students become aware of threats that are propagated through actions and behavior.