On-line Education2018-11-15T11:00:28+00:00


All ESI On-Line Education courses can be purchased individually or as part of a complete Certificate Program. ESI offers the student unique alternatives in the educational and price options from which to choose:  

The student will be granted access the ESI On-line Training Website in order to complete the courses.  You will be able to acces the site via the Internet regardless of where in the world you find yourself. As long as you have access to the Internet, you can complete your studies at ESI. Because ON-LINE study eliminates the necessity of grading, packaging, shipping, and reproduction of textbooks or digital CDs, ESI has reduced the price of ON-LINE Distance Education by 50% to a little more than $200 per course.  One significant difference in the ON-LINE program is that the student is required to purchase the textbooks that ESI does not own the copyright to.

A Program is an assembly of self-selected On-line Education courses and a Residency conducted at ESI’s training facility in White Water and Grand Junction, Colorado. All ESI On-line Education courses have been Peer Reviewed by both the State and Federal regulatory agencies.


Principles of Protection consists of the 500 page ESI VIP Protection Manual written by ESI staff. It is this ESI VIP Protection Manual that became the foundation of the widely respected published book by Martha Braunig, The New Executive Protection Bible. This course will cover both High Profile Protective Details as well as its opposite Low Profile Covert Security. The course will cover all aspects of advance work, follow-up and limousine procedures, deployment of personnel and the organization of a team detail, working the protectee, and protective hardware. High Profile Protection Details concepts are taken from Secret Service methods and former Secret Service Agents who have operationalized these concepts in private practice. The course covers personal protection services, including dignitary, celebrity and single person protection details.

Principles of Protection
Personnel Requirements
Follow-up and Limousine Procedures
Advance Preparations
Deployment of Personnel
Working the Protectee
Protective Intelligence
Protective Hardware
Organization of Team Dress and Manner
Protective Techniques
Post Coverage Protection While Traveling
Protection While Walking
Protection in Assemblies
Protection of Residence
Special Problems
Crowd Control
Handling Cranks and Stalkers
Corporate Executive Protection and Crisis Management



For a number of years, ESI has emphasized the importance of Stalkers in the personal protective operations in both the Resident Training and this course. Indeed, included a weeklong Stalker Problem in the Resident Training that challenges the countersurveillance skills of the students.

Over the years, we have demonstrated to students the critical importance of the Protection Specialist identifying Behavioral Clues to Dangerousness and the ability to identify the discreet behavior of the Stalker in a crowd. ESI has accumulated film clips of numerous assassinations and failed attempts: Hinckley’s shooting of President Reagan, Bremer’s shooting of George Wallace, attempt to shoot President Park of Korea, and the attempt to kill President Ozal of Turkey, the assassination of the Prime Minister of Israel, Yitzhak Rabin, the slashing attack on President Marcos’s wife in the Philippines, even the embarrassing Pie-Attack on Microsoft Founder, Bill Gates, all have important lessons to teach.

These historic events captured by the ubiquitous video camera, teach us that each of these targets were the victim of stalkers and that this behavior is observable and identifiable. It is ESI’s point of view that the behavior is also “predictable” within a certain range of certainty that equip the Protection Specialist with a forewarning. The goal of this course is to teach students how to analyze the threat of a stalker, predict “dangerousness,” and develop a response strategy.

The Stalker Pathology
Psychological Archetypes
Obsessional Love
Stalking and Attachment
The Celebrity Stalker
The Stalked Spouse
Contact and Attempts
Logging Attempts
Dangerousness and Prediction
Laws on Stalking, Federal and State
Building a Case When the Law will Not Due
Response and Protection Strategy



ESI staff produced and directed this three-hour DVD course on Shooting. The Fundamentals of Defensive Shooting course is based upon the ESI Manual written by nationally known shooting instructor, Dick Barber, and three hours of DVD recordings of ESI Basic through Tactical Shooting Drills developed by ESI Range Master, Tony Pagni, and executed by ESI Shooting Staff and students. This course is designed for all Resident Training students as a prerequisite prior to arrival at the ESI shooting range and handling live-fire arms. In addition to the shooting drills, the course covers a broad spectrum of critical issues concerning the safe handling, carrying, and ownership of handguns. Mental aspects of training are covered in depth as well as the psychological stress of combat situations and their aftermath. Legal implications of the use of force are discussed, as well as modification of firearms. The four part DVD series is delivered to the student, and it is included in the cost of tuition.
The DVD series illustrates the essential shooting skills taught at the five-day Resident Training as well as testing requirements, however, students are warned not to attempt live-fire practical exercises until they arrive for training by ESI professional shooting staff.

Legal and Moral Aspects
Elements of Self-Defense
Defensive Weapons
Handguns in Self-Defense
Safe Gun Handling
Range Safety
Operation of the Handgun
Theory of Defensive Shooting
Selection of the Handgun
Carrying Handguns Concealed
Back-up Guns
Selection of Ammunition
Handgun Modifications
Grips, Sights, Finishes
Range Etiquette
Static Dry-Fire
Draw and Fire
Riot Shotgun
Handgun Maintenance
Shotgun Maintenance
Night Shooting
Levels of Response
Post-Shooting Trauma
Confrontational Defense
Weapon Retention
Individual Tactics.



This course will focus on the human factor in the collection of intelligence. It will cover both open and clandestine sources of information. Open sources of information include newspapers, magazines, commercial news clipping services, court transcripts and filings, libraries, and public records. The clandestine sources will analyze the history and current use of undercover agents, their recruitment, training, management, evaluation and control. Once the information is collected, it must be verified in order to assure its accuracy, and then distributed to the centers of the organization that can make use of it. The student will learn all aspects of human intelligence collection and the Intelligence Cycle.



Profiles of Terrorism consist of a 1,200-page manual authored by ESI, Terrorism, The Whole Story. Bodyguard students are introduced to the historical background of the terrorist movements of the 1970s through the contemporary period. The course will cover the modern organization and ideology of both left wing and right wing terrorist organizations. This encyclopedic collection of information of terrorist groups and attacks is unparalleled. The later chapters focus on contemporary terrorism of militant fundamentalists that justify their use of violence against innocent civilians with religious ideologies.

Historical Overview of Terrorism
Setting the Stage for Modern Terrorism
Categories of Terrorist Movements
Organizational Structure
Networks and Support
Mini-m-Manual of the Urban Guerrilla
Terrorist Group
Profiles Nationalism, Ethnicity and Insurgencies
Terrorism in the 60s, 70s, 80s and Trends for the 90s
Religious Terrorism
The Rise of Right-Wing Fundamentalism
High-Tech Terrorism
Single-Issue Terrorism
Criminal Terrorism
Future Trends
Legal Issues
Managing Terrorist Incidents



ESI staff wrote this manual. The student bodyguard will learn the theoretical basis of anti-ambush, evasive driving, basic driving skills and mechanics, legal considerations, armored car modifications and options. The course will cover vehicle dynamics and control, motorcades and convoy driving, road emergencies and accidents. The purpose of the Distance Education course will be to cover some of the aspects of defensive driving not covered in many driving schools. ESI no longer offers Evasive Driving as part of the Resident Training.

As the subject of Carjacking have both a Defensive Shooting component as well as Protective Driving aspect, the Executive Protection Driving course also includes an the in-depth study of carjacking. Damian Halforty who lives and works in Johannesburg, South Africa, the carjacking capital of the world, wrote the course. The CD Rom course covers such subjects as the history of the crime that now plaques many cities around the globe, proactive measures, awareness drills, case studies, reactive measures, weapons and technology to combat carjackers, survival skills and the psychological post trauma of carjack victims.

Basic Driving Skills
Driving Under Unusual Conditions
High Speed Driving
Vehicle Dynamics and Car Control
Motorcades and Convoy Driving
Road Emergencies and Accidents
Vehicle Security and Surveillance Detection
Kidnap Strategies and Case Studies
Armored Vehicles and Car Options
Pursuit Driving
Legal Considerations
Evasive Driving Techniques
Carjacking Countermeasures



Executive and dignitary protection require special attention to protocol and etiquette. Put simply, etiquette is made up of the social tools, which give the master of its knowledge confidence, control and ease in a wide variety of social situations. The bodyguard who is ignorant of the rules of social etiquette will not survive in the industry. This may be a simple familiarization with table manners, proper dress, and social intercourse, or in more precise surroundings, knowledge of social customs, cultural expectations, dignitary and political protocol. For executive level Protection Specialists, it is a survival tool no less important than a road map in a strange city.

Rules of Introduction: Formal and Ceremonial
Official Protocol
Celebrity and Dignitary Etiquette
Conversational Rules for a Protection Specialist
Common Courtesies
Manners in Public and Private
Rules of Conduct in Foreign Countries
Etiquette in Country Clubs and Yacht Clubs
Seated Dinners, Luncheons, Receptions,
Cocktail Parties, Private and Public Balls
Travel: Foreign and Domestic, VIP, Celebrity, Political, Diplomatic
Dress: Formal and Informal, Day, Evening and Special Events.



The course in Electronic Security surveys one of the most important prevention technologies available to perimeter security: electronic alarm systems. The protective specialists must be familiar with current technologies and their limitations. The course will emphasis site survey techniques, threat analysis as the preliminaries of physical security. The course will cover the different systems available for both interior and exterior sensors, their strength and weaknesses.

Physical Security
Threat Analysis
Site Survey
Principles of Operation and Applications
Exterior and Interior Sensors
Alarm Transmission and Control
Switching Sensors
Microwave Radar Sensors
CCTV Signaling and Control
Equipment Power Supplies
System Design Maintenance and Service
Electronic Countermeasures
Scanning and Countermeasures
Scramblers and Safe Phones.


This Course collates the most recent military and civilian assessment of Counter Insurgent Warfare. Beginning with renowned military theorist, William Lind and recent military manuals, it is supposed that we cannot fight a war that we don’t understand. While some civilian and military strategists believed the two contemporary wars are against state armed or supported forces, others believe these conflicts are fought as “asymmetrical” or low intensity operations.

This manual re-publishes several landmark articles that first reported the existence of holding camps known as “Black Sites”, which are interment networks that the CIA utilizes as a central element of its unconventional war against Al Qaeda cells. Casting off the normal insignias of modern armies, Al Qaeda wear no uniform, swear no allegiance to any state other than their “Calling” and there is no state to negotiate a truce or armistice. To cope with the asymmetrical nature of the international terrorist campaign, the Pentagon and the Central Intelligence Agency created a multi-service elite unit to globally stalk and capture Jihadicells. This course initiates the student into the nature of counter insurgency theory and tactics in order to enhance their understanding of the conflict of our times and generation.


This Manual begins with two mini-manuals; the first is a text by one of the rising ideological leaders of Al Qaeda, Abu Naji (a pseudonym), who wrote a strategic and tactical training manual called, The Management of Savagery. This text is the Al Qaeda playbook on how to create and manage global chaos to bring down western powers and governments that support the West. It is an extraordinary document that was recently translated by William McCants, a Fellow at West Point’s Combating Terrorism Center. The second Al Qaeda Manual is a document discovered in Al Qaeda safe house that expounds on the principles on military organization of terrorist cells. This book provides specific instructions on terrorist operations, including kidnapping and assassination, the use of explosives to disrupt and disable the economic fabric of enemy states. The manual gives its Jihadi members instruction on how to finance their cell operations on a global scale by counterfeiting, forgeries and kidnapping. It expounds on the military training and weapons, communications, transportation, espionage and Special Tactical Operations as a strategy of forcing governments to disperse military and financial resources. Understand the enemy and you will understand how to fight them.

The third document consists of U.S. military anti-terrorism manuals. The first is a collection of case studies of terrorist assaults in Tokyo subway, the Federal building in Oklahoma City, the Khobar Towers and the Cole bombings. The second is a Military Guide to Terrorism in the 21st Century, which was prepared under the direction of the U.S. Army Training and Doctrine Command. These handbooks support operational missions in the global war on terrorism.


This course begins with the Bureau of Diplomatic Security Protocols for protective operations. The document begins with an analysis of assassinations and terrorist methods of operation. The BDS specifies the purpose and duties of Protection Agents who work WPPS details. The manual covers Protective Detail Organization, Principal Interview, Team & Staff Interaction, Team and Motorcade Formations, Operational Security and Counter Terrorist Driving. Attached to the State Department Protocols are a collection of recommendations from protective detail veterans who served in Iraq on issues of gear and equipment, survival tips and a sample advance written by an ESI graduate who is stationed in Saudi Arabia.


This course contains four manuals: Human Intelligence Collection and Analysis, Deception Detection, Interviews and Interrogations, and Cross Cultural Communication. Jack Mc George PhD., former Secret Service Agent and an ESI teacher, wrote the Human Intelligence manual. Until his recent death in 2009, Jack taught at ESI for 25 years. Jack wrote this manual for a foreign government intelligence service, and ESI for distribution in our Distance Ed curriculum. We digitized this version and sanitized the original. We integrated the course into the program, and added three other manuals that are invaluable for investigators working in the field. Two of the manuals focus on ferreting truth from subjects being interrogated based on detecting clues of deception in verbal and non-verbal communication, while the third takes into consideration cultural factors.


While Field Intelligence is principally focused on the collection process, Operational Intelligence is devoted to the analytical component of intelligence. This manual is dedicated to criminal and terrorist network analysis; however, the analytical model can be applied to any information rich data, including free market competitive intelligence. The introduction begins with recent historical examples of the use of a wide variety of intelligence sources: electronic, signal, human sources and network analysis to track down leaders of the insurgency in Iraq, Zarqawi and Saddam Hussein and their global web of cells. The first manual introduces the student into the process of analysis, the tools of the trade and methodology. Link or Association Analysis is taught in simple language and demonstrates the technique of using Link Analysis model as to demonstrate the relationship between people, organizations, governments and objects. The student will learn how to use the information collection process to chart relationships and draw inferences from the facts as they emerge in the association process. Manual two is a workbook to give the student confidence to apply the technique to almost any type of problem.


This course will cover issues including personnel, document and physical security. Personnel security refers to the policies and procedures intended to determine that an individual is not now and is not likely to become a risk to security. A personnel security program is intended to prevent criminal activities by employees, espionage attempts by outside intelligence forces and unintentional acts by employees that could lead to a compromise situation. The course will cover the procedure in taking personal history statements and the follow-up investigations, and how to conduct special investigations. The course will also examine the issue of physical and document security, classification management, reproduction, disposal and transmission of sensitive or classified documents. Physical security will cover issues like the access control, security patrols, personnel identification and visitor control. In addition, it will suggest methods of detecting unauthorized intrusion or activity, alarm systems and facility clearances.



The course on Principles of Investigation covers the fundamentals of investigation, the investigative process, the scope of private investigation, and the qualities of the investigator. The methods of security investigation are also taught which include undercover investigation, surveillance and stakeouts, information and evidence collection, use of informants and basics of criminal and civil scene investigation.

This course will provide the student with the basic techniques and legal aspects of undercover work to enable the student to operate effectively and safely in private investigation. The use of undercover agents is filled with legal, moral and organizational pitfalls. The course will provide valuable guidance in the selection, recruitment and training of undercover agents. It will deal with briefing for assignments, establishing cover, disguises and evaluating the information attained through the use of agents in the field.
The Investigative Process
Private Investigation
Methods of Security Investigation
Undercover Investigation
Information and Evidence Collection
Research of Public and Private Records
Contacts and Informants
Report Writing and Court Procedure
Observation, Description and Identification
The Business of Private Investigations.
Selecting, Recruiting and Training Agents
Establishing Cover
Supervision and Communications
Informants and Suspects
Internal Investigations
Substance Abuse Investigations
Entrapment and Legal Issues of Undercover Work
Court Testimony



The goal of this course is to teach students the fundamental principles and techniques of successful interviewing and interrogation. It will cover such subjects as taking statements and confessions, as applied to private investigation, legal aid or law enforcement. It will delve into investigative interviews, formal statements, admissions and confessions.
Interviewing vs. Interrogation
Interview Preparation
Communication Skills
Investigative Interviews
Written and Oral Statements
Statements, Admissions and Confessions
Legal Issues of Interviewing
Reluctant and Deceptive Witnesses
Clues to Deception
Facial Expressions
Leakage of Expressions
Body Language and its Meaning.



Considered as a single curriculum, the Executive Protection Program consists of an intensive study of executive, dignitary and celebrity protection. On the average, it requires one to nine months to complete the program, depending on whether the student enrolls in the 28-Day Residency Program or combined

On -line Education courses and 15-Day Resident Training. If the student is enrolled in the On-line Education format, the Program will move at the rate that the student is able to invest time in their studies. The student should complete the nine On-line courses prior to arrival at Resident Training. If the student enrolls in the 28-Day Residency, the academic curriculum is completed in classroom or evening study.

Upon completion of any of the three Core Programs, the student is awarded a Certificate of Completion. An ESI Credential is awarded for Certified Protection Specialist ™C.P.S, Certified Crisis Management Specialist, Certified Protective Operations Specialists and the highest award as a Certified Security Specialist upon achieving a Grade Point Average of 80% or above.


If a student enrolls in the Residency format, the course is competed in a four-week period and the student is awarded the Certificate at the time of completion. It is possible to break the four-week curriculum into smaller modules and the student accumulates credit as the modules are completed.

The combined On-line Education / Resident Training is designed to be completed in a nine to twelve month period. The student may register in the program at any time and work as rapidly as is consistent with their schedule. Each course contains six Lessons, there are two factors that determine completion time. First, how fast the student studies because the courses will move at the speed that the student completes the course. The second factor is the finance program chosen. Courses are made available at the rate that the student pays for each course.

ESI converted its copyrighted textbooks and printed manuals to ON-LINE digital courses in January 2012. Access to On-Line Training Website is available via the Internet 24 hours a day. Esi was able to reduce the cost per course by 50% compared to the cost of the HOME DELIVERY format of Distance Education. The Syllabus and testing are done on-line with interactive support from the Director of Educationals Services if needed. Some courses that contain material that the copyright is owned by other authors and must purchased by the student.
We recommend that you work at a steady pace to complete each course within the time frame allowed; on the average it will require 15 to 20 hours per week to complete the course on schedule.
ESI is approved by Sallie Mae, a federally approved student tuition loan company
For information on student financing GO TO: STUDENT FINANCE PLANS
For Student Enrollment Forms GO TO: ENROLL ON LINE
The cost of administration and initial registration is separate from the cost of the individual courses, which are itemized.

Enroll Online
Training Dates

743 Horizon Drive Ste. 200-A
Grand Junction, CO 81506

Phone: 1-800-874-0888

Email: esi@esi-lifeforce.com