Plan, develop, prepare, and conduct U.S. doctrinally sound, cost-effective military training and education for Western Hemisphere students while promoting democratic
values and respect for human rights in order to foster cooperation among multinational military and police forces. Supports all TRADOC initiatives and policies
and supports Combatant Commander Security Cooperation plans. Analyze, design, develop, implement, and evaluate (ADDIE) training and education executed by the school’s
two teaching departments ensuring that the programs of instruction support COCOM priorities, needs of client countries, and reflect current U.S. doctrine.
DGSLT organization consists of a Leadership Development Division and a Tactics Division
Partner nation and US cadets engage and demonstrate leadership potential, team building, and cross-cultural interaction creating enduring
partnerships through hands-on tactical and leadership training.
Student Profile: Military: Cadet or equivalent - military or law enforcement.
Duration: 4 weeks, 2 days
Schedule: 3 Iteration: Oct - Nov, May - Jun, Jul - Aug
*Dates are subject to change, please confirm and coordinate with your Country’s SCO.
This 49-day course provides comprehensive and specialized training in countering transnational criminal organizations and elicit network
operations at a detachment task force or platoon level. The course will emphasize tactical level planning, and command and control, during the effective execution
of counter-transnational threat operations against realistic targets and objectives.
Student Profile: Military NCOs and officers, and law enforcement or civilian equivalent
Duration: 7 weeks
Schedule: 2 Iterations: Feb - Mar, Sep - Nov
This is course develops medical skills required of personnel serving in military or law enforcement units. Major subject areas include basic
lifesaver measures; force health protection; treatment of complicated injuries; fluid replacement; splinting; cardiopulmonary resuscitation; combat trauma treatment;
invasive skills; limited primary care; combat evacuation; and physical fitness.
Additional instructions integrate training on human rights; the rule of law; rules of engagement; due process; civilian control of themilitary, and the role of the
military in a democratic society.
Student Profile: Private (E-3) to Captain (O3) ; Career Field/MOS: MOS related to ground operations (no need to be in a medical MOS)
Experience: Must have been assigned to a squad or patrol ground unit. Note: This course integrates demanding daytime and nighttime field training.
Duration: 9 weeks
Schedule: 2 Iterations: Feb – Apr, Jun – Aug
Training will include a combination of classroom & field instruction and practical exercises that develop and enhance the students competency
to execute breaching operations and humanitarian assistance through urban search & rescue operations. The skills include mechanical, ballistic, and explosive
breaching, identifying and performing high/low angle operations, confined space rescue, implement collapsed support operations, determine potential victim locations
and remove victim from a collapsed structure. Additionally, students will lift and move heavy loads as a team member, breach and cut structural components, and
install/construct temporary structural support with shoring in an urban setting. This course does not include lessons in water rescue nor flooded environments.
Student Profile: Military NCOs and officers, and law enforcement or civilian equivalent.
Duration: 6 weeks, 1 day
Schedule: 1 Iteration: Mar - Apr
Security force personnel collaborate with multinational and multiservice peers at the operational analyst-level in order to enhance students’
capacity to evaluate, analyze, and strategize. Students accomplish this by applying various analytical techniques in an illicit trafficking operational environment.
Students learn to develop the commander’s situational awareness and employ specific intelligence techniques during tactical operations while effectively focusing on
local and transnational-level organized crimes.
Duration: 6 weeks 2 days
The content of the Course Repository is limited to only those courses that have been
validated by the Office of the Registrar and approved for public release by the
school. Many older courses will not appear in the repository.
However, if you would like to request that a particular course be evaluated and added
to the repository then you can contact the
Office of the Registrar.
Contact Army University for information about privacy and privacy-related requirements
to include Privacy Act system of record notices; DD Form 2930, Privacy Act Assessments;
Office of Management and Budget control numbers required by the Paperwork Reduction
Act of 1995; Privacy Act statements, social security number justification/elimination
plans, and more.
32 CFR Part 505
Army Regulation 25-22
Records Management and Declassification Agency Privacy
Army G-6/CIO Privacy Impact Assessment (.pdf file)
Leader's Guide to Protecting Personally Identifiable Information (.pdf file)
System Owner's Guide to Accreditation and Data Protection (.pdf file)
DOD ID Number and PII Policy
Report possible and confirmed breaches of PII IAW
TRADOC Regulation 1-8.
Personal Information. Information about an individual that identifies,
links, relates, or is unique to, or describes him or her, for example, a social
security number (SSN); age; military rank; civilian grade; marital status; race;
salary; home/office phone numbers; other demographic, biometric, personnel; medical;
and financial information, etc. Such information is also known as PII (that is,
information which can be used to distinguish or trace and individual’s identity
such their name, SSN, date and place of birth, mother’s maiden name, and biometric
records including any other personal information which is linked or linkable to
a specified individual). This information can be in hard copy (paper copy files)
or electronic format, stored on personal computers, laptops, and personal electronic
devices such as blackberries and found within databases. This includes but is not
limited to, education records, financial transactions, medical files, criminal records,
or employment history.
PII Breach. A loss of control, compromise, unauthorized disclosure,
unauthorized acquisition, unauthorized access, or any similar term referring to
situations where persons other than authorized users and for an other than authorized
purpose have access or potential access to personally identifiable information,
whether physical or electronic. This includes, but is not limited to, posting PII
on public-facing websites; sending via e-mail to unauthorized recipients; providing
hard copies to individuals without a need to know; loss of electronic devices or
media storing PII (for example, laptops, thumb drives, compact discs, etc.); use
by employees for unofficial business; and all other unauthorized access to PII.
www.ArmyUniversity.edu website is provided as a public service by Army University
representing Schools and Centers Army-wide. Information presented on this site is
considered public information and may be distributed or copied unless otherwise
specified. Use of appropriate byline/photo/image credits is requested.
User Terms of Agreement
External Links Disclaimer
The appearance of hyperlinks to external sites does not constitute endorsement by
the Army University or the Department of the U.S. Army of the linked web site or
the information, products or services contained therein. The Army University does
not exercise any editorial control over the information found at these locations.
Such links are provided consistent with the stated purpose of this DoD web site.
The use of copyrighted material within the Army is subject to U.S. copyright law
as reflected in Army regulations. It is Army policy to recognize and respect the
rights of copyright owners. This page does not create any right, remedy, or cause
of action for any person against the Army.
It is Department of the Army policy to recognize the rights of copyright owners
(e.g., photo journalists or embedded media) consistent with the Army's mission and
worldwide commitments. Copyrighted works will not be reproduced or distributed outside
of the Army without the written or electronically conveyed permission of the copyright
In the event a copyright owner grants the Army written or electronically conveyed
permission to use copyrighted material for internal command information or morale
and welfare purposes, commanders or heads of Army activities will take care to assure
that such permission is not abused by improper use of the material.
In addition, any use of copyrighted material, for which permission has been obtained,
will carry attribution for the source of the material. Army Public Affairs will
continue to make every effort to reinforce this policy through public affairs channels
and to ensure widest dissemination of these guidelines around the Army, and at every
level of command.
Copyrighted material in the Army's possession should be safeguarded from accidental
Copyright issues are under the purview of the Office of the Judge Advocate General
and are covered in Army Regulation 27-60, Intellectual Property.
Army Regulation 25-1 prohibits the posting of documents or information protected
by a copyright on Army websites without the permission of the copyright holder.
Licensed use. A license is a contract which identifies the terms under which the
Army can use a copyrighted work (e.g., can use my painting on the Army website for
a period of 6 months, but not for any other purposes). There is no required format
for a license and different licenses will vary greatly in their terms. At a minimum,
the organization which receives the license should file a record copy. This will
vary based on the scope of the license and intended use of the copyrighted work.
For example, Office of Chief of Public Affairs might keep track of any licenses
which allow use of a copyrighted work on the Army website, but a battalion might
keep track of a license to use a copyrighted work in a locally distributed document.
Use of information in these resources is governed by the U.S. copyright law, as
well as individual database vendor agreements. According to the fair use clauses
of U.S. copyright law, you may cite short excerpts in papers and reports for classroom
and other academic uses if you also cite the source of the information (e.g. journal
article). You may not use entire works for this purpose. When using information
from these databases, properly cite and credit the source.
If you have any questions or comments about the information presented here, please
forward them to us using our Contact Us link.
To verify course completion, please click the image below.
To determine if a course you have completed has ACE credit recommendation, please click the image below.
To determine if there are related credentials and occupations for a course you have completed, please click the image below.