In Cooperation With
DAU logo

Security Resources

Return to DAU / Home

Traditionally, the acquisition process was said to be supported by three pillars: cost, schedule, and performance. We now recognize that these pillars must stand on a foundation of strong security to enable the development of uncompromised products and services critical to our nation's defense and economic well-being. We must prioritize and cultivate a culture of security by applying an intelligence-led, threat-driven, asset- focused mindset to critical technology protection. Just as security professionals must become knowledgeable and informed about the acquisition process, acquisition professionals will need to understand security fundamentals.

The Defense Acquisition University (DAU) and the Defense Counterintelligence and Security Agency (DCSA) Center for Development of Security Excellence (CDSE) are partnering to provide needed training and resources to both acquisition professionals and security professionals. This toolkit contains many helpful resources including job aids, case studies, security shorts, videos, and elearning courses to assist acquisition professionals in expanding their understanding of security fundamentals.

Access the following resources by type:

Case Studies icon  Case Studies

   Analyzed accounts of real-world security activities, events, or threats

eLearning icon  eLearning Courses

  Internet-based, self-paced training courses

Job Aids icon Job Aids

 Security products designed to provide guidance and information to perform specific tasks

Security Policies icon Policies

 Relevant security policies that detail security requirements for all classified programs

Security Shorts icon Security Shorts

 Training videos, usually in 10 minutes or less, that allow you to refresh your knowledge of a critical topic or quickly access information needed to complete a job

Security Training Videos icon Security Training Videos

  Five-ten minute videos that provide information and demonstrate various security procedures

Toolkits icon Toolkits

 Additional security resources you may find useful