Operational Deployment of Breaching Methods
Fulfills EBRR/ Explosive Breacher Recertification Requirements
|Duration:||5 Days||HOST A COURSE|
This advanced course is designed to provide trained breachers with comprehensive understanding and practical experience in the effective deployment of explosive breaching as a primary method of forced entry backed by secondary non-energetic breaching tools. This curriculum provides participants with a unique opportunity to learn and practice the proper deployment of complete breaching packages for the purpose of achieving desired mission and breaching objectives.
This training specifically concentrates on the utilization of proper tactics and appropriate integration of explosive breaching into a wide range of missions to include: High Risk Search Warrants, Barricaded Suspects, Hostage Rescues, and Active Shooters. Unlike any other breaching course, participants will be instructed, drilled, and tested in their ability to properly match and utilize explosive breaching based on various mission profiles. From the planning phases and briefs, to executions and debriefs, students will physically participate in each phase of simulated missions and be provided with optimal training platforms to combine and hone their tactical and breaching skills.
While the main concentration of the course is the implementation of Explosive Breaching, the course does involve some use of Manual, Mechanical, Ballistic, Thermal, and Hydraulic breaching
Derived directly from years of real-world operational experience with large metropolitan agencies around the nation, this course curriculum addresses, in detail, this critical topic which directly influences the safe, effective, and successful utilization of explosive breaching in real-life missions. Topics include:
- Define proper deployment methodologies of explosive breaching methods
- Target reconnaissance and assessments
- Proper charge selection and placement
- Proper selection and utilization of back-up breaching tools
- Define proper deployment methodologies of MMBTH tools in support of explosive breaching
- Mission planning and briefing
- Firing sequences and counts
- Misfires and failed breach contingencies
- Stack formations and locations
- Dynamic and slow methodical/ deliberate entries
- Utilization of armored vehicles in support of a breach
- Integration and utilization of various resources such as snipers, K9, negotiators, etc.