Empty
Welcome Visitor
Browse Courses
  • Show All
  • +   Courses
Color Legend
Telecommunicator Courses
Trainer Courses
Supervisor/Manager Courses
General Courses
Online Courses
Refresh Data
Sort by: Default Ascending | Course number | Course name | Course start | Location | Course time | Course date
3006
Equip public safety policy writers with the skills and resources to effectively develop or improve policy in a 911 public safety environment while meeting industry standards and helping mitigate liability. Student learning objectives include identification and importance of policy from a risk management perspective, policy formatting comprehension, ability to research and apply industry standards, and practical application of writing policy to be used upon return to their places of business. More
Starts Starts: 10/24/2018 8:00 AM
Sessions Sessions: 3
Location Location:
Status Status: 12 open seats left
Class Size Class size: 30 seats
Add to cart
1013
All licensing students must meet TCOLE minimum standards as indicated in TCOLE Rule 217.1. This 40 hour class will be held Monday - Friday. Students will report back on Monday for half a day of review and then take the State Licensing Exam.

Before students will be allowed to attend this course, their agency's Chief must sign and return a TCOLE required letter verifying the student meets TCOLE minimum standards for the licensed Telecommunicator position. Students will also be required to take the TCOLE Rules Test (1305) for Telecommunicators and bring documentation that they passed. This test is located on the TCOLE Website at http://www.tcole.texas.gov/

After registering, students and supervisors will receive an email with further details on the above requirements.

Effective with all classes scheduled after January 1, 2015: You may no longer hold spots for classes posted. TC911 staff will monitor registrations and cancel duplicates or held spots immediately.

Classroom will not be open before 8:00 a.m. Please enter through the training room entrance, do not enter at the front of the building.

The classroom tends to be cool, bring a jacket. There is a refrigerator/freezer and microwave available to students. Any food or dishes left in the refrigerator beyond the date of the class will be discarded.

YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 11/5/2018 8:00 AM
Sessions Sessions: 6
Location Location:
Status Status: 8 open seats left
Class Size Class size: 30 seats
Add to cart
1014
YOU MUST HAVE A TCOLE PID NUMBER TO ATTEND THIS COURSE, WITH TWO YEARS EXPERIENCE AS A PEACE OFFICER, TELECOMMUNICATOR, OR JAILER. TO RECEIVE TCOLE CERTIFICATION, YOU MUST ATTEND 100% OF THIS COURSE. NO EXCEPTIONS. This is an intense, time consuming course. Students will be required to complete homework, as well as give two presentations on a law enforcement/dispatch topic. Students must bring a laptop to class and access to a printer is required. Classroom instruction will be given in the following areas: Teaching/Learning Process, Learning Objective Preparation, Lesson Plan Preparation, Instructional Media, Methods of Instruction, Testing and Evaluation, and Liability Issues related to training. Effective with all classes scheduled after January 1, 2015: You may no longer hold spots for classes posted. TC911 staff will monitor registrations and cancel duplicates or held spots immediately. Classroom will not be open before 8:00 a.m. Please enter through the training room entrance, do not enter at the front of the building. The classroom tends to be cool, bring a jacket. There is a refrigerator/freezer and microwave available to students. Any food or dishes left in the refrigerator beyond the date of the class will be discarded. EFFECTIVE OCTOBER 1, 2015 YOU WILL BE CHARGED A $25 NO SHOW FEE FOR 1 OR 2 DAY CLASSES, a $50 FEE FOR 3 OR 4 DAY CLASSES, AND A $100 FEE FOR FIVE DAY CLASSES IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE. More
Starts Starts: 11/12/2018 8:00 AM
Sessions Sessions: 5
Location Location:
Status Status: 2 wait spaces available
Class Size Class size: 4 seats
Wait space available
1014
YOU MUST HAVE A TCOLE PID NUMBER TO ATTEND THIS COURSE, WITH TWO YEARS EXPERIENCE AS A PEACE OFFICER, TELECOMMUNICATOR, OR JAILER.

TO RECEIVE TCOLE CERTIFICATION, YOU MUST ATTEND 100% OF THIS COURSE. NO EXCEPTIONS.

YOU MUST BE A TELECOMMUNICATOR TO REGISTER FOR THIS COURSE, IF YOU ARE NOT A TELECOMMUNICATOR YOUR REGISTRATION WILL BE CANCELLED.

This is an intense, time consuming course. Students will be required to complete homework, as well as give two presentations on a law enforcement/dispatch topic. Students must bring a laptop to class and access to a printer is required. Classroom instruction will be given in the following areas: Teaching/Learning Process, Learning Objective Preparation, Lesson Plan Preparation, Instructional Media, Methods of Instruction, Testing and Evaluation, and Liability Issues related to training.

Effective with all classes scheduled after January 1, 2015: You may no longer hold spots for classes posted. TC911 staff will monitor registrations and cancel duplicates or held spots immediately.

Classroom will not be open before 8:00 a.m. Please enter through the training room entrance, do not enter at the front of the building.

The classroom tends to be cool, bring a jacket. There is a refrigerator/freezer and microwave available to students. Any food or dishes left in the refrigerator beyond the date of the class will be discarded.

EFFECTIVE OCTOBER 1, 2015 YOU WILL BE CHARGED A $25 NO SHOW FEE FOR 1 OR 2 DAY CLASSES, a $50 FEE FOR 3 OR 4 DAY CLASSES, AND A $100 FEE FOR FIVE DAY CLASSES IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 11/12/2018 8:00 AM
Sessions Sessions: 5
Location Location:
Status Status: 3 wait spaces available
Class Size Class size: 9 seats
Wait space available
5304
Course Description: 

This course is for telecommunicators that are responsible for training individuals in the dispatch center. The training will focus on the responsibilities of trainers, training methods for adult learners, liability related to training, and giving feedback to your trainees.

Students will be required to give a 5 minute teach back to another student in the classroom.


EFFECTIVE OCTOBER 1, 2015 YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 12/10/2018 8:00 AM
Sessions Sessions: 3
Location Location:
Status Status: 19 open seats left
Class Size Class size: 30 seats
Add to cart
3802
Learning Objectives: Full Access Section 1 • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process Section 2 • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry Section 3 • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. Section 4 • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations Part 2 Section 1- Record Responsibility • Summarize the entering agency’s responsibility for records entered into TCIC and NCIC • Define the terms accuracy, timeliness and completeness in reference to TCIC and NCIC • Describe the methods used to maintain NCIC system integrity • Discuss the role of the FBI CJIS personnel and the TCIC Control room with quality control checks • Explain the automatic purging of records and retention periods Part 2: Section 2 – Property File Entry • List the definition, criteria for entry and the information required to enter a record into the Vehicle file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Vehicle file. • List the definition, criteria for entry and the information required to enter a record into the License Plate file. • List the definition, criteria for entry and the information required to enter a record into the Vehicle/Boat Part file. • List the definition, criteria for entry and the information required to enter a record into the Boat file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Boat file. • List the definition, criteria for entry and the information required to enter a record into the Gun file. • List the definition, criteria for entry and the information required to enter a record into the Article file. • List the definition, criteria for entry and the information required to enter a record into the Security file. Section 3 – Record Maintenance • Recognize the responses received when entering a record into TCIC and NCIC • Define the purpose for record modification and the responses received from TCIC and NCIC • Define the purpose for record cancelation and the responses received from TCIC and NCIC • Define the purpose of a locate message and the responses received from TCIC and NCIC • Define the purpose of a clear message and the responses received from TCIC and NCIC Section 4 – Wanted Person Entry • List the criteria for entry and the information required to enter a record into the Wanted Person file. • Indicate the $. messages associated with the Wanted Person file and the possible action required. • List the criteria for entry and the information required to enter a record into the Identity Theft file. • List the criteria for entry and the information required to enter a record into the Violent Person file. • List the criteria for entry and the information required to enter into the Threat Against Peace or Detention Officer file. • List the criteria for entry and the information required to enter into the Protection Order file. • Indicate the $. messages associated with the Protection Order file and the possible action required. • List the criteria for entry and the information required to enter a record into the Child Safety Check Alert List. • List the criteria for entry and the information required to enter into the Missing Person file. • List the criteria for entry and the information required to enter a Person With Information record. • Indicate the $. messages associated with the Missing Person file and the possible action required. • List the criteria for entry and the information required to enter into the Unidentified Person file. • Indicate the $. messages associated with the Unidentified Person file and the possible action required. Section 5 – Originating Agency Identifier Files • Explain the use of the On-line ORI file and the process for modifying the file using the MO transaction. • Summarize the process for ORI Validation and the information required to validate. Section 6 – Record Validation and $. Messages • Summarize the process for proper record validation • List the validation certification letter requirements • Define the $. Messages that may be received from NCIC and the possible actions required More
Starts Starts: 1/16/2019 8:00 AM
Sessions Sessions: 2
Location Location:
Status Status: 4 wait spaces available
Class Size Class size: 15 seats
Wait space available
3807
Learning Objectives: Upon successful completion, the student will be able to: • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to non criminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations More
Starts Starts: 1/16/2019 8:00 AM
Sessions Session: 1
Location Location:
Status Status: 5 wait spaces available
Class Size Class size: 15 seats
Wait space available
5309
Is your PSAP prepared for an Active Shooter event? Students will be able to recognize an active shooter incident, discuss the history of active shooters, and recognize potential warning signs of an active shooter. The students will learn the questions to ask callers, and be familiar with instructions to give callers in an active shooter situation. 



YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 2/11/2019 8:00 AM
Sessions Session: 1
Location Location:
Status Status: 28 open seats left
Class Size Class size: 30 seats
Add to cart
3802
Learning Objectives: Full Access Section 1 • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process Section 2 • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry Section 3 • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. Section 4 • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to noncriminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations Part 2 Section 1- Record Responsibility • Summarize the entering agency’s responsibility for records entered into TCIC and NCIC • Define the terms accuracy, timeliness and completeness in reference to TCIC and NCIC • Describe the methods used to maintain NCIC system integrity • Discuss the role of the FBI CJIS personnel and the TCIC Control room with quality control checks • Explain the automatic purging of records and retention periods Part 2: Section 2 – Property File Entry • List the definition, criteria for entry and the information required to enter a record into the Vehicle file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Vehicle file. • List the definition, criteria for entry and the information required to enter a record into the License Plate file. • List the definition, criteria for entry and the information required to enter a record into the Vehicle/Boat Part file. • List the definition, criteria for entry and the information required to enter a record into the Boat file. • List the criteria for entry and the information required to enter a record into the Abandoned/Stored Boat file. • List the definition, criteria for entry and the information required to enter a record into the Gun file. • List the definition, criteria for entry and the information required to enter a record into the Article file. • List the definition, criteria for entry and the information required to enter a record into the Security file. Section 3 – Record Maintenance • Recognize the responses received when entering a record into TCIC and NCIC • Define the purpose for record modification and the responses received from TCIC and NCIC • Define the purpose for record cancelation and the responses received from TCIC and NCIC • Define the purpose of a locate message and the responses received from TCIC and NCIC • Define the purpose of a clear message and the responses received from TCIC and NCIC Section 4 – Wanted Person Entry • List the criteria for entry and the information required to enter a record into the Wanted Person file. • Indicate the $. messages associated with the Wanted Person file and the possible action required. • List the criteria for entry and the information required to enter a record into the Identity Theft file. • List the criteria for entry and the information required to enter a record into the Violent Person file. • List the criteria for entry and the information required to enter into the Threat Against Peace or Detention Officer file. • List the criteria for entry and the information required to enter into the Protection Order file. • Indicate the $. messages associated with the Protection Order file and the possible action required. • List the criteria for entry and the information required to enter a record into the Child Safety Check Alert List. • List the criteria for entry and the information required to enter into the Missing Person file. • List the criteria for entry and the information required to enter a Person With Information record. • Indicate the $. messages associated with the Missing Person file and the possible action required. • List the criteria for entry and the information required to enter into the Unidentified Person file. • Indicate the $. messages associated with the Unidentified Person file and the possible action required. Section 5 – Originating Agency Identifier Files • Explain the use of the On-line ORI file and the process for modifying the file using the MO transaction. • Summarize the process for ORI Validation and the information required to validate. Section 6 – Record Validation and $. Messages • Summarize the process for proper record validation • List the validation certification letter requirements • Define the $. Messages that may be received from NCIC and the possible actions required More
Starts Starts: 3/4/2019 8:00 AM
Sessions Sessions: 2
Location Location:
Status Status: 15 open seats left
Class Size Class size: 15 seats
Add to cart
3807
Learning Objectives: Upon successful completion, the student will be able to: • Define the function and goal of the National and Texas Crime Information Centers • Explain the Criminal Justice Information Services (CJIS) System Agency concept and the relation between the FBI, Texas DPS and the local agency • Describe the relationship of TCIC/NCIC to TLETS/Nlets • Restate the CJIS Systems Access Policy for personnel access and terminal location • Describe the NCIC/TCIC system design • List the files in NCIC and TCIC and the retention periods for each file • Describe the record responsibility and the validation process • Define the general criteria for an inquiry. • Describe Vehicle file and list the information required to run an inquiry. • Describe Boat file and list the information required to run an inquiry. • Describe Gun file and list the information required to run an inquiry. • Describe Article file and list the information required to run an inquiry. • Describe Security file and list the information required to run an inquiry. • Describe Wanted Persons file and list the information required to run an inquiry. • List the possible files cross-searched with a Wanted Person inquiry. • Explain specific files and the criteria for inquiries (Concealed Handgun License, Protective Order, Sex Offender Registration and Missing Person). • List the procedures required for a positive Child Safety Check Alert and Foster Home Member inquiry hit. • Identify the ORI file and the information required to run an inquiry • Define the importance of confirming a hit. • List the hit confirmation levels of priority and define substantive response. • Describe the steps in confirming a hit. • Explain the use for Detained Wanted Person file. • List the files that do not require hit confirmation. • State the criteria for an Off-line Search and the possible search fields. • Define the Delayed Inquiry program. • Identify the sources of criminal history record information (CHRI). • Recognize that criminal justice agencies can only inquire into CHRI from NCIC/TCIC. • List the required fields for a QH inquiry into Texas CCH and NCIC III. • Explain the common purpose codes used for requesting CCH and III data. • Recognize the importance of the Operator, Requestor, Attention, and Reason for Inquiry fields in the QH and QR inquires. • Describe the possible TCIC/NCIC responses and resulting actions needed from a QH. • Restate that CHRI returns are confidential and not to be given to non criminal justice personnel. • Explain CHRI logging and secondary dissemination procedures. • Identify the only methods of CHRI storage and destruction. • Obey the CHRI related laws and list the possible sanctions for violations More
Starts Starts: 3/4/2019 8:00 AM
Sessions Session: 1
Location Location:
Status Status: 15 open seats left
Class Size Class size: 15 seats
Add to cart
57022

Note: This course will have 2 days of classroom training and 1 day of field exercises.

This 24 hour course will provide Public Safety Telecommunicators with the skills needed to be an integral part of a Critical Incident and/or SWAT Team. Basic Tactical deployment with an emphasis on communication responsibilities, duties and application of such skills will be addressed. We will focus on critical incidents, identifying the Command Structure, protocol for responding to such incidents, procedures for SWAT/TAC Team Deployment, Tactical Dispatch Team makeup and their functions, and more. Students will be required to demonstrate skills learned through scenario based activities which include a field exercise alongside a local SWAT/TAC Team.


YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY.
More
Starts Starts: 4/3/2019 8:00 AM
Sessions Sessions: 3
Location Location:
Status Status: 27 open seats left
Class Size Class size: 30 seats
Add to cart
5309
Is your PSAP prepared for an Active Shooter event? Students will be able to recognize an active shooter incident, discuss the history of active shooters, and recognize potential warning signs of an active shooter. The students will learn the questions to ask callers, and be familiar with instructions to give callers in an active shooter situation. 



YOU WILL BE CHARGED A NO SHOW FEE IF YOU CANNOT MAKE IT TO CLASS AND FAIL TO CANCEL PROPERLY. PLEASE REVIEW COURSE CANCELLATION POLICY ON THE TC911 WEBSITE.
More
Starts Starts: 5/6/2019 8:00 AM
Sessions Session: 1
Location Location:
Status Status: 30 open seats left
Class Size Class size: 30 seats
Add to cart
Total: 12 Page size: