CounterintelligenceThe Counterintelligence (CI) Awareness Program's purpose is to make DOD and Industry Security personnel aware of their responsibility to report unusual activities or behaviors and various threats from foreign intelligence entities, other illicit collectors of US defense information, and/or terrorists. Show
CybersecurityCybersecurity is the ability to protect or defend the use of cyberspace from attacks. General SecurityGeneral Security covers security topics and issues which may or may not be addressed in other security disciplines and content areas. Industrial SecurityThe Industrial Security Program is a multi-disciplinary security program focused on the protection of classified information developed by or entrusted to U.S. industry operating under the National Industrial Security Program (NISP). Information SecurityThe Information Security (INFOSEC) Program establishes policies, procedures, and requirements to protect classified and Controlled Unclassified Information (CUI) that, if disclosed, could cause damage to national security.
Insider ThreatInsider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security. If you are new to Insider Threat Program Management or Operations, we recommend you review the training products in the order listed to develop a foundation in Insider Threat Program Management and Operations concepts and principles. After review of these training products, additional training is available on this webpage to expand your knowledge and skills. Operations SecurityOperations Security (OPSEC) is the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation. OPSEC challenges us to look at ourselves through the eyes of an adversary and deny the adversary the ability to act.
Personnel SecurityThe Personnel Security Program establishes the standards, criteria, and guidelines upon which personnel security eligibility determinations are based.
Physical SecurityThe Physical Security (PHYSEC) Program is that part of security concerned with active and passive measures, designed to prevent the unauthorized access to personnel, equipment, installations, materials, and information; and to safeguard them against espionage, sabotage, terrorism, damage, and criminal activity. Special Access ProgramsA Special Access Program (SAP) is established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.
CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program. (ISC)² Certifications Meet the RequirementsYou need a cybersecurity certification that meets the U.S. Department of Defense (DoD) Directive 8570.1. We’ve got you covered. Refer to the chart below for many (ISC)² certifications that qualify. Our certifications are noted in bold, and they’re organized by Directive 8570.1 position category and level. Also check out our DoD Certification and Training brochure. Please note, the certifications below are the only commercial certifications the DoD will accept as fulfillment for the 8570.1M requirement.
More Information on Directive 8570.1Directive 8570.1 requires every full- and part-time military service member, defense contractor, civilian and foreign employee with "privileged access" to a DoD system — regardless of job series or occupational specialty — to get a commercial certification credential that has been accredited by the American National Standards Institute (ANSI). (ISC)² was the first organization to receive ANSI accreditation under ISO/IEC Standard 17024 for its CISSP certification. All of the (ISC)² certifications above meet these requirements. Directive 8570 divides the workforce into position categories that have various levels. It also specifies the types of commercial certifications that qualify for each of the defined categories. How often do you take cybersecurity fundamental training?Cybersecurity Fundamentals training, located on the Cybersecurity Training Center website (https://cs.signal.army.mil), must be completed every 3 years.
Where can I get a military cyber awareness certificate?You can go back to the Certificates tab at the top on the right side of the DoD Cyber Awareness Challenge, select the little ribbon under the column titled certificate. You'll see your Cyber Awareness Challenge completion certificate. Save it and send it to who is asking for it.
How do I take the DoD Cyber Awareness Challenge training?Link to https://ia.signal.army.mil/ and click on the DoD Cyber Awareness Challenge (Mandated Annual IA Training) link. A pop up window will come up, click on the Login to take the DoD Cyber Awareness Challenge Training button.
What are the key cyber security fundamentals?You can put the NIST Cybersecurity Framework to work in your business in these five areas: Identify, Protect, Detect, Respond, and Recover. Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.
|