SlideShare a Scribd company logo
1 of 3
Download to read offline
Asia-Pacific Center for Security Studies
       ADVANCED SECURITY COOPERATION (ASC) Course 12- 1


Purpose

Advanced Security Cooperation (ASC) is an executive education course that addresses the
major security challenges confronting Asia-Pacific security practitioners. The course is
holistic in that it evaluates the complex nature of traditional and non-traditional security
dynamics. Most importantly, it affords fellows (country participants) the opportunity to think
critically about security issues and explore opportunities to develop collaborative strategies
that address a range of challenges directly. These involve topics of internal security,
including governance, the rule of law, security sector development, whole of government,
and economic development. The curriculum also includes issues of external and
transnational security involving trans-border challenges associated with the global commons
which require international collaboration and policy cooperation. These include maritime
security, terrorism, and disaster management. Through the practical application of critical
thinking and problem solving the course allows fellows to effectively understand and, in turn,
address the Asia-Pacific’s most pressing security issues. The ASC is a participant centered
learning experience in which interactive and dynamic teaching methods are adopted for the
benefit of a multi-national audience of practitioners.


Course description

Advanced Security Cooperation is a four and a half week course designed to enhance
individual leader capabilities in critical thinking, communication, collaboration, and
decision-making in complex and culturally diverse environments. Created specifically for
senior level security practitioners from across the Asia-Pacific region and beyond, the course
provides an international setting that seeks to:

   •   Enhance decision-making capacity in order to capitalize on opportunities for regional
       collaboration.

   •   Improve international cooperation and interagency effectiveness on regional security
       issues; construct solutions for addressing protracted challenges associated with the
       global commons.

   •   Enhance civil-military relations and security sector effectiveness.

   •   Increase capacity for improving governance and security sector integration.

   •   Develop extensive networks and relationships with a community of mid-career &
       senior level security practitioners and experts.




ASC 12-1
Asia-Pacific Center for Security Studies
          Advanced Security Cooperation (ASC) Course

Who would benefit by attending this course

The Advanced Security Cooperation Course attracts a broad range of participants from across
the region and beyond. The course curriculum is designed primarily for security practitioners
and experts whose current and future responsibilities require significant participation in
domestic and international security policy formulation and execution, and who have the
following backgrounds:

   •   Military & Law Enforcement Officers; Foreign Service, Foreign Affairs Officers

   •   Representatives of Government Agencies and International, Regional and Non-
       Governmental Organizations

   •   Business (self-funded) and Media Representatives


Educational Objectives

Enhance Knowledge on Security Trends and Tools of Cooperation
   • Identify key strategic trends that influence and shape the international and regional
      security environment.
   • Share best practices of governance and security sector development.
   • Mitigate tensions toward fostering cooperation in the global commons.

Enhance Leader Effectiveness
   • Understand and incorporate cultural and national sensitivities.
   • Communicate effectively (advocate/persuade, not just inform) in a variety of
      situations.
   • Cooperate, contribute and lead within a multi-national team.
   • Conduct complex problem analysis and project management.
   • Use information communication technology to enhance levels of cooperation.

Expand a Network of practitioners within the regional and global security community
   • Build relationships with practitioners from other agencies, organizations, institutions,
       and countries.
   • Develop an appreciation for a shared experience.
   • Explore new and emerging information communication technologies (ICT) to
       maintain relationships and connectivity beyond the APCSS experience.




ASC 12-1                                      2
Asia-Pacific Center for Security Studies
          Advanced Security Cooperation (ASC) Course


Educational Approach

Core Curriculum

The ASC has four modules which each provide an opportunity to put ideas into practice
through experiential learning. During Module I, fellows participate in understanding the
complexities of security cooperation and confidence building. This is done through an
exercise-based format running over three days that focuses on security complexity, causal
relationships, issue-framing, strategic development, strategic communications, and critical
problem-solving. These processes involve using analytic tools to evaluate the sources, scope
and implications of security problems. Module II provides fellows with a set of topics and
discussions on internal security cooperation, including security sector development, the role
of governance and rule of law, whole of society and whole of government approaches to
security, and disaster management. Module III is structured with in-depth framing lectures,
case studies, and seminar discussions on the roles and responsibilities of major powers and
issues of cooperation within the Asia-Pacific’s sub-regions. This includes a focus on
maritime security and law of the sea in critical and contested areas. In Module IV, the course
concludes with the composite skills-based exercise intended to tie together and apply the
knowledge and analytical tools developed over the previous three weeks. Throughout the
course, fellows will also participate in small group case studies on sub-regional and
transnational issues, and engage with an individual research project.

Elective Curriculum
The electives provide fellows with study of specific issues relevant to comprehensive
security. Electives are structured in two ways: elementary and advanced. Fellows will
choose two elementary and one advanced elective. These focused sessions are intended to
evaluate a range of critical issue associated with a particular security issue. A broad selection
of electives are offered by APCSS faculty this year: maritime security-law of the sea;
security sector development; health security; governance and security; China’s foreign
policy; soft power; the public-private nexus; disaster management; terrorism and extremism;
and environmental security.



ASC Course Manager: Dr. Justin Nankivell
Course Coordinator: Lt. Col. Reese Evers




ASC 12-1                                       3

More Related Content

Similar to Asc course description.april_3_2012

S15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalS15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_Final
Brooke Peckins
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
stuimrozsm
 
JDR Global Resources
JDR Global ResourcesJDR Global Resources
JDR Global Resources
JDRglobal
 
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docxAgainst MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
daniahendric
 
Safety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdfSafety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdf
BanchangHome
 
Drr practitioners workshop report
Drr practitioners workshop reportDrr practitioners workshop report
Drr practitioners workshop report
CSRU
 
2010 Summit Presentation
2010 Summit Presentation2010 Summit Presentation
2010 Summit Presentation
gmoore22
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
JASS44
 
Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...
Kayode Fayemi
 

Similar to Asc course description.april_3_2012 (20)

Safety, Security and Risk Management in Agro-industrial Organizations
Safety, Security and Risk Management in Agro-industrial OrganizationsSafety, Security and Risk Management in Agro-industrial Organizations
Safety, Security and Risk Management in Agro-industrial Organizations
 
Management Approach to disaster risk and humanitarian response
Management Approach to disaster risk and humanitarian responseManagement Approach to disaster risk and humanitarian response
Management Approach to disaster risk and humanitarian response
 
School Safety Framework 2016.pdf
School Safety Framework 2016.pdfSchool Safety Framework 2016.pdf
School Safety Framework 2016.pdf
 
fiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltdfiinovation-innovative-financial-advisors-pvt-ltd
fiinovation-innovative-financial-advisors-pvt-ltd
 
S15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_FinalS15-CounterTerrorism-Executive_Summary_Final
S15-CounterTerrorism-Executive_Summary_Final
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
JDR Global Resources
JDR Global ResourcesJDR Global Resources
JDR Global Resources
 
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docxAgainst MindsetArne Padmos[email protected]ABSTRACTT.docx
Against MindsetArne Padmos[email protected]ABSTRACTT.docx
 
Safety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdfSafety-culture-effective-improvement-strategies.pdf
Safety-culture-effective-improvement-strategies.pdf
 
sc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptxsc-presentation-template-agreement-states (1).pptx
sc-presentation-template-agreement-states (1).pptx
 
Safety education and training
Safety education and trainingSafety education and training
Safety education and training
 
Drr practitioners workshop report
Drr practitioners workshop reportDrr practitioners workshop report
Drr practitioners workshop report
 
2010 Summit Presentation
2010 Summit Presentation2010 Summit Presentation
2010 Summit Presentation
 
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptxSECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
SECURITY AND STRATEGIC STUDIES COURSE RECAP ON SSS.pptx
 
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docxBCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
BCJ 4385, Workplace Security 1 UNIT V STUDY GUIDE Ri.docx
 
Fostering a Robust Process Safety Culture in the Oil & Gas Industry
Fostering a Robust Process Safety Culture in the Oil & Gas IndustryFostering a Robust Process Safety Culture in the Oil & Gas Industry
Fostering a Robust Process Safety Culture in the Oil & Gas Industry
 
Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...Final technical report on the project on good governance and the transformati...
Final technical report on the project on good governance and the transformati...
 
RISK MANAGEMENT Essays
RISK MANAGEMENT EssaysRISK MANAGEMENT Essays
RISK MANAGEMENT Essays
 
Albert res
Albert resAlbert res
Albert res
 

More from Teeranan

Apcss student handbook_sp2011
Apcss student handbook_sp2011Apcss student handbook_sp2011
Apcss student handbook_sp2011
Teeranan
 
Asc course schedulemay2012
Asc course schedulemay2012Asc course schedulemay2012
Asc course schedulemay2012
Teeranan
 
Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012
Teeranan
 

More from Teeranan (20)

Csrt singapore workshop draft agenda 30jul12 1_
Csrt singapore workshop draft agenda 30jul12  1_Csrt singapore workshop draft agenda 30jul12  1_
Csrt singapore workshop draft agenda 30jul12 1_
 
Ambush southern th
Ambush southern thAmbush southern th
Ambush southern th
 
Nandhakwang thailand 07132012
Nandhakwang thailand 07132012Nandhakwang thailand 07132012
Nandhakwang thailand 07132012
 
Political warfare 55
Political warfare 55Political warfare 55
Political warfare 55
 
National power in_politics
National power in_politicsNational power in_politics
National power in_politics
 
Terrorism threat at the airport
Terrorism threat at the airportTerrorism threat at the airport
Terrorism threat at the airport
 
New media and national security contents
New media and national security contentsNew media and national security contents
New media and national security contents
 
Atfl
AtflAtfl
Atfl
 
Apcss student handbook_sp2011
Apcss student handbook_sp2011Apcss student handbook_sp2011
Apcss student handbook_sp2011
 
Asc course schedulemay2012
Asc course schedulemay2012Asc course schedulemay2012
Asc course schedulemay2012
 
Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012Asc12 1 course_flow_march_28_2012
Asc12 1 course_flow_march_28_2012
 
Global issues 220355
Global issues 220355Global issues 220355
Global issues 220355
 
Terrorist Risk in Thailand
Terrorist Risk in ThailandTerrorist Risk in Thailand
Terrorist Risk in Thailand
 
Military PR using social network
Military PR using social networkMilitary PR using social network
Military PR using social network
 
Bomb in thailand
Bomb in thailandBomb in thailand
Bomb in thailand
 
Thailand and asean
Thailand and aseanThailand and asean
Thailand and asean
 
Military power
Military powerMilitary power
Military power
 
ภาคใต้กับประชาคมอาเซียน
ภาคใต้กับประชาคมอาเซียนภาคใต้กับประชาคมอาเซียน
ภาคใต้กับประชาคมอาเซียน
 
South thailand conflict
South thailand conflictSouth thailand conflict
South thailand conflict
 
The unfamiliar war
The unfamiliar warThe unfamiliar war
The unfamiliar war
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Asc course description.april_3_2012

  • 1. Asia-Pacific Center for Security Studies ADVANCED SECURITY COOPERATION (ASC) Course 12- 1 Purpose Advanced Security Cooperation (ASC) is an executive education course that addresses the major security challenges confronting Asia-Pacific security practitioners. The course is holistic in that it evaluates the complex nature of traditional and non-traditional security dynamics. Most importantly, it affords fellows (country participants) the opportunity to think critically about security issues and explore opportunities to develop collaborative strategies that address a range of challenges directly. These involve topics of internal security, including governance, the rule of law, security sector development, whole of government, and economic development. The curriculum also includes issues of external and transnational security involving trans-border challenges associated with the global commons which require international collaboration and policy cooperation. These include maritime security, terrorism, and disaster management. Through the practical application of critical thinking and problem solving the course allows fellows to effectively understand and, in turn, address the Asia-Pacific’s most pressing security issues. The ASC is a participant centered learning experience in which interactive and dynamic teaching methods are adopted for the benefit of a multi-national audience of practitioners. Course description Advanced Security Cooperation is a four and a half week course designed to enhance individual leader capabilities in critical thinking, communication, collaboration, and decision-making in complex and culturally diverse environments. Created specifically for senior level security practitioners from across the Asia-Pacific region and beyond, the course provides an international setting that seeks to: • Enhance decision-making capacity in order to capitalize on opportunities for regional collaboration. • Improve international cooperation and interagency effectiveness on regional security issues; construct solutions for addressing protracted challenges associated with the global commons. • Enhance civil-military relations and security sector effectiveness. • Increase capacity for improving governance and security sector integration. • Develop extensive networks and relationships with a community of mid-career & senior level security practitioners and experts. ASC 12-1
  • 2. Asia-Pacific Center for Security Studies Advanced Security Cooperation (ASC) Course Who would benefit by attending this course The Advanced Security Cooperation Course attracts a broad range of participants from across the region and beyond. The course curriculum is designed primarily for security practitioners and experts whose current and future responsibilities require significant participation in domestic and international security policy formulation and execution, and who have the following backgrounds: • Military & Law Enforcement Officers; Foreign Service, Foreign Affairs Officers • Representatives of Government Agencies and International, Regional and Non- Governmental Organizations • Business (self-funded) and Media Representatives Educational Objectives Enhance Knowledge on Security Trends and Tools of Cooperation • Identify key strategic trends that influence and shape the international and regional security environment. • Share best practices of governance and security sector development. • Mitigate tensions toward fostering cooperation in the global commons. Enhance Leader Effectiveness • Understand and incorporate cultural and national sensitivities. • Communicate effectively (advocate/persuade, not just inform) in a variety of situations. • Cooperate, contribute and lead within a multi-national team. • Conduct complex problem analysis and project management. • Use information communication technology to enhance levels of cooperation. Expand a Network of practitioners within the regional and global security community • Build relationships with practitioners from other agencies, organizations, institutions, and countries. • Develop an appreciation for a shared experience. • Explore new and emerging information communication technologies (ICT) to maintain relationships and connectivity beyond the APCSS experience. ASC 12-1 2
  • 3. Asia-Pacific Center for Security Studies Advanced Security Cooperation (ASC) Course Educational Approach Core Curriculum The ASC has four modules which each provide an opportunity to put ideas into practice through experiential learning. During Module I, fellows participate in understanding the complexities of security cooperation and confidence building. This is done through an exercise-based format running over three days that focuses on security complexity, causal relationships, issue-framing, strategic development, strategic communications, and critical problem-solving. These processes involve using analytic tools to evaluate the sources, scope and implications of security problems. Module II provides fellows with a set of topics and discussions on internal security cooperation, including security sector development, the role of governance and rule of law, whole of society and whole of government approaches to security, and disaster management. Module III is structured with in-depth framing lectures, case studies, and seminar discussions on the roles and responsibilities of major powers and issues of cooperation within the Asia-Pacific’s sub-regions. This includes a focus on maritime security and law of the sea in critical and contested areas. In Module IV, the course concludes with the composite skills-based exercise intended to tie together and apply the knowledge and analytical tools developed over the previous three weeks. Throughout the course, fellows will also participate in small group case studies on sub-regional and transnational issues, and engage with an individual research project. Elective Curriculum The electives provide fellows with study of specific issues relevant to comprehensive security. Electives are structured in two ways: elementary and advanced. Fellows will choose two elementary and one advanced elective. These focused sessions are intended to evaluate a range of critical issue associated with a particular security issue. A broad selection of electives are offered by APCSS faculty this year: maritime security-law of the sea; security sector development; health security; governance and security; China’s foreign policy; soft power; the public-private nexus; disaster management; terrorism and extremism; and environmental security. ASC Course Manager: Dr. Justin Nankivell Course Coordinator: Lt. Col. Reese Evers ASC 12-1 3