eICS 5.1 End User Training

eICS 5.1 End User Training

eICS End User Training (Updated March 2024)

rate limit

Code not recognized.

About this course

This training course is designed to provide performance-based education about Juvare’s eICS solution for command staff who participate in response and recovery operations using the National Response Framework (NRF) and the Incident Command System (ICS).

Information about using eICS to respond to and recover from emergencies, hazards, and operational disruptions of any scale will be provided. After completing the course, command staff will be empowered to perform essential response and recovery functions using the eICS application.

During this course, command staff will learn how to:

  • Create and respond to an incident
  • Assign ICS positions
  • Create event log entries
  • View, edit, and save documents
  • Create, edit, and update objectives
  • Create, receive, and respond to messages
  • Create, edit, and deactivate locations on the map
  • Add contacts to an incident

Prerequisites

For this course, command staff should have the following prerequisites.

  • Knowledge of ICS philosophy and terminology
  • Recommended: Federal Emergency Management Administration (FEMA) courses IS-100, IS-700, and IS-200

Requirements

For this course, command staff should have the following requirements.

  • Access to a computer that has a reliable connection to the Internet and meets the minimum requirements for eICS hardware and software.

Requirements: https://www.juvare.com/product/requirements/hosted-requirements

  • Recommended: Android or iOS smartphone or tablet

Instructional Method

This course utilizes the following instructional methods:

  • Interactive Lessons with Knowledge Checks

Assessment Method

  • Skills Test

Total Course Time:

45 minutes

Contact Hours: 1 hour

Additional Resources

For more information about eICS, please access these resources:

Curriculum

  • Introduction to the Course
  • Introduction to eICS End User Course (2:30)
  • Response - Incident Response Management
  • Create an Incident (2:00)
  • Edit an Incident (1:00)
  • Escalate an Incident (2:00)
  • End an Incident (2:00)
  • Activate/Deactivate an ICS Position or Group (2:00)
  • Assign/Unassign an ICS Position (1:00)
  • Manage Labor Pool Groups (2:00)
  • Manage the Incident Event Log (2:00)
  • Manage Incident Files (3:00)
  • Add an Incident Objective (1:00)
  • Manage Incident Objectives (2:00)
  • Create a Resource Request (1:00)
  • Manage Resource Requests (2:00)
  • Manage Messages (2:00)
  • Manage Incident Locations (2:00)
  • Manage Incident Contacts (2:00)
  • Incident Response Management Knowledge Check
  • Recovery
  • Introduction to Recovery Section (2:08)
  • Add an Improvement Item (3:00)
  • Manage Improvement Items (1:00)
  • Manage Action Items (1:00)
  • Close an Incident (1:00)
  • Complete the After Action Report (3:00)
  • Print Forms or Reports (1:00)
  • eICS End User Quiz
  • Introduction to eICS End User Final Quiz (0:52)
  • eICS End User Final Quiz
  • Congratulations! (1:42)

About this course

This training course is designed to provide performance-based education about Juvare’s eICS solution for command staff who participate in response and recovery operations using the National Response Framework (NRF) and the Incident Command System (ICS).

Information about using eICS to respond to and recover from emergencies, hazards, and operational disruptions of any scale will be provided. After completing the course, command staff will be empowered to perform essential response and recovery functions using the eICS application.

During this course, command staff will learn how to:

  • Create and respond to an incident
  • Assign ICS positions
  • Create event log entries
  • View, edit, and save documents
  • Create, edit, and update objectives
  • Create, receive, and respond to messages
  • Create, edit, and deactivate locations on the map
  • Add contacts to an incident

Prerequisites

For this course, command staff should have the following prerequisites.

  • Knowledge of ICS philosophy and terminology
  • Recommended: Federal Emergency Management Administration (FEMA) courses IS-100, IS-700, and IS-200

Requirements

For this course, command staff should have the following requirements.

  • Access to a computer that has a reliable connection to the Internet and meets the minimum requirements for eICS hardware and software.

Requirements: https://www.juvare.com/product/requirements/hosted-requirements

  • Recommended: Android or iOS smartphone or tablet

Instructional Method

This course utilizes the following instructional methods:

  • Interactive Lessons with Knowledge Checks

Assessment Method

  • Skills Test

Total Course Time:

45 minutes

Contact Hours: 1 hour

Additional Resources

For more information about eICS, please access these resources:

Curriculum

  • Introduction to the Course
  • Introduction to eICS End User Course (2:30)
  • Response - Incident Response Management
  • Create an Incident (2:00)
  • Edit an Incident (1:00)
  • Escalate an Incident (2:00)
  • End an Incident (2:00)
  • Activate/Deactivate an ICS Position or Group (2:00)
  • Assign/Unassign an ICS Position (1:00)
  • Manage Labor Pool Groups (2:00)
  • Manage the Incident Event Log (2:00)
  • Manage Incident Files (3:00)
  • Add an Incident Objective (1:00)
  • Manage Incident Objectives (2:00)
  • Create a Resource Request (1:00)
  • Manage Resource Requests (2:00)
  • Manage Messages (2:00)
  • Manage Incident Locations (2:00)
  • Manage Incident Contacts (2:00)
  • Incident Response Management Knowledge Check
  • Recovery
  • Introduction to Recovery Section (2:08)
  • Add an Improvement Item (3:00)
  • Manage Improvement Items (1:00)
  • Manage Action Items (1:00)
  • Close an Incident (1:00)
  • Complete the After Action Report (3:00)
  • Print Forms or Reports (1:00)
  • eICS End User Quiz
  • Introduction to eICS End User Final Quiz (0:52)
  • eICS End User Final Quiz
  • Congratulations! (1:42)

Non-Discrimination Learning Environment Policy | Speaker/Trainer Financial Disclosure Policy | Privacy Policy