Skip to main content (Press Enter).
Toggle navigation
Center for Development of Security Excellence
Defense Counterintelligence and Security Agency
CDSE
Search
Search ...:
Search
Search ...:
Search
I'm interested in...
Counterintelligence
Cybersecurity
General Security
Industrial Security
Information Security
Insider Threat
Operations Security
Personnel Security
Physical Security
Special Access Programs
I'm looking for...
Case Studies
Job Aids
My Certificates/Digital Badges/Transcripts
My Certificates of Completion for Courses
My Webinar Certificates of Attendance
My Digital Badges
My Certifications
My Transcripts
Security Awareness Games
Security Posters
Security Shorts
Security Training Videos
Toolkits
Webinars and Conferences
I'm in need of...
Annual Mandatory Training
Controlled Unclassified Information (CUI) Training
Derivative Classification Training
Marking Classified Information Training
Operations Security (OPSEC) Training
Personally Identifiable Information (PII) Training
SPēD Certification
Home
Training
Security Shorts
Student Guides
Security Shorts Student Guides
The following student guides are available in PDF
format.
Counterintelligence
Academic Solicitation
Foreign Travel Brief
Counterintelligence Concerns for National Security Adjudicators
Critical Program Information (CPI)
Protecting Microelectronics
Suspicious Emails
Talking with Academia About Security
Cybersecurity
Assured File Transfer
Cybersecurity and the Use of New Personal Devices
Cybersecurity Attacks - The Insider Threat
Cybersecurity: Incident Response
Data Spills
General Security
Active Shooter Awareness
Industrial Security
Business Structures - KMP: To Clear or Not to Clear
The DGR Role and Responsibilities
Foreign Ownership, Control or Influence (FOCI)
Industrial Security for Senior Management
International Visit Requests
National Interest Determinations (NID) Process
Procuring GSA Approved Containers
You're a new FSO: Now What?
Information Security
Classified Storage Requirements
Completing the SF 700
Completing the SF 701
Completing the SF 702
Disposal and Destruction of Classified Information
Downgrading and Declassification
Marking in the Electronic Environment
Marking Syntax
NATO Information
Security Incidents Reporting Requirements
Termination Briefing
Insider Threat
DITMAC
Human Resources and Insider Threat
Personnel Security
Adverse Information Reporting
Continuous Evaluation Awareness
Reciprocity in the Personnel Security Program
Reporting Requirements At A Glance
The 13 Adjudicative Guidelines
Adjudicative Guideline A: Allegiance to the United States
Adjudicative Guideline B: Foreign Influence
Adjudicative Guideline C: Foreign Preference
Adjudicative Guideline D: Sexual Behavior
Adjudicative Guideline E: Personal Conduct
Adjudicative Guideline F: Financial Considerations
Adjudicative Guideline G: Alcohol Consumption
Adjudicative Guideline H: Drug Involvement
Adjudicative Guideline I: Psychological Conditions
Adjudicative Guideline J: Criminal Conduct
Adjudicative Guideline K: Handling Protected Information
Adjudicative Guideline L: Outside Activities
Adjudicative Guideline M: Use of Information Technology Systems
The Federal Investigative Standards
Physical Security
DOD Locks Approved to Safeguard Classified and Sensitive Materials
Functions of Entry Control Facilities (ECFs)/Access Control Points (ACPs)
How to Conduct an Inspection - Helpful Tips
Parts of a Physical Security Plan
Special Access Programs
Introduction to the Risk Management Framework (RMF) for Special Access Program (SAP)
Procedures for Transporting SAP
Special Access Program (SAP) Markings
Special Access Program (SAP) Security Roles and Responsibilities
Special Access Program (SAP) Security Incidents
Special Access Program (SAP) Types and Categories