Dod cybersecurity fundamental training for security+ ceus

Counterintelligence

The Counterintelligence (CI) Awareness Program's purpose is to make DOD and Industry Security personnel aware of their responsibility to report unusual activities or behaviors and various threats from foreign intelligence entities, other illicit collectors of US defense information, and/or terrorists.

Cybersecurity

Cybersecurity is the ability to protect or defend the use of cyberspace from attacks.

General Security

General Security covers security topics and issues which may or may not be addressed in other security disciplines and content areas.

Industrial Security

The Industrial Security Program is a multi-disciplinary security program focused on the protection of classified information developed by or entrusted to U.S. industry operating under the National Industrial Security Program (NISP).

Information Security

The Information Security (INFOSEC) Program establishes policies, procedures, and requirements to protect classified and Controlled Unclassified Information (CUI) that, if disclosed, could cause damage to national security.

  • Classification Conflicts and Evaluations IF110.06
  • Derivative Classification IF103.16
  • DOD Annual Security Awareness Refresher IF142.06
  • DOD Initial Orientation and Awareness Training IF140.06
  • DOD Mandatory Controlled Unclassified Information (CUI) Training IF141.06
  • Identifying and Safeguarding Personally Identifiable Information (PII) DS-IF101.06
  • Information Security Emergency Planning IF108.06
  • Introduction to Information Security IF011.16
  • Marking Special Categories of Classified Information IF105.16
  • Original Classification IF102.16
  • Security Classification Guidance IF101.16 
  • Transmission and Transportation for DOD IF107.16
  • Unauthorized Disclosure (UD) of Classified Information and Controlled Unclassified Information (CUI) IF130.16

Insider Threat

Insider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security. If you are new to Insider Threat Program Management or Operations, we recommend you review the training products in the order listed to develop a foundation in Insider Threat Program Management and Operations concepts and principles. After review of these training products, additional training is available on this webpage to expand your knowledge and skills.

Operations Security

Operations Security (OPSEC) is the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation. OPSEC challenges us to look at ourselves through the eyes of an adversary and deny the adversary the ability to act.

  • OPSEC Awareness for Military Members, DOD Employees and Contractors GS130.16

Personnel Security

The Personnel Security Program establishes the standards, criteria, and guidelines upon which personnel security eligibility determinations are based.

  • Introduction to DOD HSPD-12 CAC Credentialing PS112.16
  • Introduction to National Security Adjudication PS001.18 
    Dod cybersecurity fundamental training for security+ ceus
  • Introduction to Personnel Security PS113.16
  • Introduction to Suitability Adjudications for the DOD PS010.16

Physical Security

The Physical Security (PHYSEC) Program is that part of security concerned with active and passive measures, designed to prevent the unauthorized access to personnel, equipment, installations, materials, and information; and to safeguard them against espionage, sabotage, terrorism, damage, and criminal activity.

Special Access Programs

A Special Access Program (SAP) is established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.

  • ICD 705 Physical Security Construction Requirements for SAP SA501.16
  • Special Access Programs (SAP) Overview SA001.16
  • Special Access Program (SAP) Personnel Security Official (SPO) Training SA106.16
  • Special Access Program (SAP) Security Annual Refresher SA002.16
  • SCI Security Refresher SCI100.16

CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.

(ISC)² Certifications Meet the Requirements

You need a cybersecurity certification that meets the U.S. Department of Defense (DoD) Directive 8570.1.

We’ve got you covered.

Refer to the chart below for many (ISC)² certifications that qualify. Our certifications are noted in bold, and they’re organized by Directive 8570.1 position category and level. Also check out our DoD Certification and Training brochure.

Please note, the certifications below are the only commercial certifications the DoD will accept as fulfillment for the 8570.1M requirement.

CSSP AnalystCSSP Infrastructure SupportCSSP Incident ResponderCSSP AuditorCSSP Manager
CEH
CFR
CCNA Cyber Ops
CCNA-Security
CySA+
GCIA
GCIH
GICSP
Cloud+
SCYBER
PenTest+
SSCP
CEH
CySA+
GICSP
CHFI
CFR
Cloud+
CND
CEH
CFR
CCNA Cyber Ops
CCNA-Security
CHFI
CySA+
GCFA
GCIH
SCYBER
PenTest+
CEH
CySA+
CISA
GSNA
CFR
PenTest+
CISSP-ISSMP
CISM
CCISO

More Information on Directive 8570.1

Directive 8570.1 requires every full- and part-time military service member, defense contractor, civilian and foreign employee with "privileged access" to a DoD system — regardless of job series or occupational specialty — to get a commercial certification credential that has been accredited by the American National Standards Institute (ANSI).

(ISC)² was the first organization to receive ANSI accreditation under ISO/IEC Standard 17024 for its CISSP certification. All of the (ISC)² certifications above meet these requirements.

Directive 8570 divides the workforce into position categories that have various levels. It also specifies the types of commercial certifications that qualify for each of the defined categories.

How often do you take cybersecurity fundamental training?

Cybersecurity Fundamentals training, located on the Cybersecurity Training Center website (https://cs.signal.army.mil), must be completed every 3 years.

Where can I get a military cyber awareness certificate?

You can go back to the Certificates tab at the top on the right side of the DoD Cyber Awareness Challenge, select the little ribbon under the column titled certificate. You'll see your Cyber Awareness Challenge completion certificate. Save it and send it to who is asking for it.

How do I take the DoD Cyber Awareness Challenge training?

Link to https://ia.signal.army.mil/ and click on the DoD Cyber Awareness Challenge (Mandated Annual IA Training) link. A pop up window will come up, click on the Login to take the DoD Cyber Awareness Challenge Training button.

What are the key cyber security fundamentals?

You can put the NIST Cybersecurity Framework to work in your business in these five areas: Identify, Protect, Detect, Respond, and Recover. Make a list of all equipment, software, and data you use, including laptops, smartphones, tablets, and point-of-sale devices.