Fundamentals of MIC Threat Assessment 

Richard Eckert

Lead Instructor

Torben Lund Skovhus

Lead Instructor
Course 103
Over 6 hours of e-learning, 48 Activities total, 30 Lectures, 8 Self assessments, and 31 downloadable resources.

What's included?

  • Over 6 hours of learning content! 
  • How to conduct a MIC threat assessment
  • Data collection, integration and analysis
  • MIC decision-making based on outcomes
  • Apply knowledge in actual case studies
  • Interview with an expert
  • Valuable lists of resources for more information
  • Downloadable lesson notes
  • Feedback from instructors on specific assignments
  • Certificate of completion provided at end of course

Increase your understanding

Learn how to conduct a MIC threat assessment, the types of data required, data integration for MIC analysis and decision making in the context of corrosion management. Gain confidence in your corrosion threat assessment outcomes. 

Apply your new knowledge

 You will also learn how to put the ideas presented to you into action with case study assignments that receive feedback directly from the instructors. See how multiple lines of evidence are used to diagnose cases of MIC and consider abiotic corrosion mechanisms that are not related to microbiology. 

Course Lessons

How do I know if MIC is a problem for my assets? 

MIC Threat Assessment

MIC threat assessment is the process of collecting and integrating multiple lines of evidence about an asset to determine if MIC is a threat that must be mitigated and monitored. MIC threat assessment is also performed during asset design to help in materials selection and the need for mitigation in the asset design. Learn how data from molecular microbiological methods (MMM) are used to help assess MIC threats and how MMM data should be integrated with other important information about the operating environment. 
Patrick Jones - Course author
Created with