Securing Drinking Water and Wastewater Treatment Facilities

Internet Explorer: Due to browser incompatibility, some features of are not fully functional in Internet Explorer. For best results, please use a current version of Chrome, Firefox, Edge or Safari for an optimal experience.

Securing Drinking Water and Wastewater Treatment Facilities


Securing Drinking Water and Wastewater Treatment Facilities Workbook

The Securing Drinking Water and Wastewater Treatment Facilities Workbook contains the independent study course lessons, exercises and final exam materials which must be successfully completed to earn the state assign course credit.

Available on backorder

Course Registration

Registration entitles students to course support. After passing the final exam the registered student will also receive an offical Continuing Education Course Certificate of Completion that will be accepted by the Pennsylvania Department of Environmental Protection (DEP) for operator certification renewal for the licenses listed in the table of course details above.

Drinking Water Operator
Professional Engineer
Wastewater Operator
Credit Hours:
Course ID:
Format Options:
Paper Workbook - Paper Exam

Available on backorder

SKU: PA-2953 Category: Tag:


Securing Water and Wastewater Treatment Facilities was developed in response to concerns of a lack of security in water and wastewater treatment plants. The objectives of this course are to provide water and wastewater treatment operators with information about the need for security, the basic methodology involved in security planning, resources available for security planning such as vulnerability templates, customizing a security plan and adding security plan results into an emergency response plan. This course was designed for independent study.

At the completion of this course, the student will be able to:

  • Discuss the importance of implementing a security program at their facilities
  • Identify critical assets
  • Identify potential threats
  • Describe ways to increase security using tools that deter, detect, delay and respond to threats
  • Demonstrate the interdependency between tools that deter, detect, delay and respond
  • Identify tools that enhance recovery from a security breach
  • Identify resources that identify and characterize threats
  • Describe the six common vulnerability assessment elements
  • Describe the assessment method of the six common Vulnerability Analysis template
  • Choose an appropriate vulnerability assessment template based on the characteristics of a treatment system
  • Perform a vulnerability assessment that includes: identifying and prioritizing critical assts and vulnerabilities using a threat and criticality matrix
  • Identify protection tools that reduce the Criticality Rating and/or the Vulnerability Level of a Critical Asset
  • Evaluate the practicality of identified protection tools based on versatility, alternatives and cost
  • Describe the purpose of an Emergency Response Plan (ERP)
  • Identify the four key planning components and eight core elements of an Emergency Response Plan
  • Identify areas where security issues should be included in an emergency response plans


There are no reviews yet.

Only logged in students who have purchased this product may leave a review.