Note: This section contains YouTube videos, this content cannot be accessed from certain DOD networks.
View important principles and tasks; about 5 -10 minutes. Please note, you will not receive a certificate of completion for watching these videos.
Most recent training videos listed first.

Alleged Directed Falsification (ADF) (Download Transcript)
This video provides a brief overview on Alleged Directed Falsification (ADF) and its impact on Personnel Security (Vetting) operations. The purpose of this training video is to reduce mistakes or omissions on the security (vetting) questionnaire to streamline the background investigation process.

Personnel Vetting Process #3
Part three of a three-part series on Personnel Vetting that introduces the Adjudication process to a newly hired Federal civilian, military member, or contractor.

Personnel Vetting Process #2 (Download transcript
)
Part two of a three-part series on Personnel Vetting that introduces the investigation process to a newly hired Federal civilian, military member, or contractor.

Personnel Vetting Process #1 (Download transcript
)
Part one of a three-part series on Personnel Vetting that introduces the pre-investigation process to a newly hired Federal civilian, military member, or contractor.

Financial Considerations
This video lesson provides a brief overview of how the Federal Government is reforming the policies, processes, and tools used to vet its civilian, contractor, and military personnel to ensure a trusted workforce.

How to Take Successful Electronic Fingerprints
This video provides a brief description of the electronic fingerprinting process. It also discusses common errors that may occur, proper technique, and the various aspects of the procedure.

Need-to-Know
This training video “Need-to-Know” is for a broad audience of security professionals and persons who have eligibility and access to classified information. It will explain and demonstrate the Need-to-Know concept as one component of authorized access to classified information and describe the responsibilities of the security professional and the holder of the information.