Skip to main content (Press Enter).
Home Logo: Center for Development of Security Excellence
Center for Development of Security Excellence Defense Counterintelligence and Security Agency
CDSE
Search
Search
Search
  • STEPP Login
  • I'm interested in...
    • Counterintelligence
    • Cybersecurity
    • General Security
    • Industrial Security
    • Information Security
    • Insider Threat
    • Operations Security
    • Personnel Vetting
    • Physical Security
    • Special Access Programs
  • I'm looking for...
    • Case Studies
    • Job Aids
    • My Certificates/Digital Badges/Transcripts
      • My Certificates of Completion for Courses
      • My Webinar Certificates of Attendance
      • My Digital Badges
      • My Certifications
      • My Transcripts
    • Security Awareness Games
    • Security Posters
    • Security Shorts
    • Security Training Videos
    • Toolkits
    • Webinars and Conferences
  • I'm in need of...
    • Annual Mandatory Training
    • Controlled Unclassified Information (CUI) Training
    • Derivative Classification Training
    • Marking Classified Information Training
    • Operations Security (OPSEC) Training
    • Personally Identifiable Information (PII) Training
    • SPēD Certification

HomeTrainingeLearning CoursesProtecting Assets in the NISP CI117.16Course Resources for Protecting Assets in the NISP CI117.16
Course Resources for Protecting Assets in the NISP CI117.16
  • NISPOM 32 CFR Part 117 PDF icon
  • Protecting Assets in the NISP CI117.16 Student Guide PDF icon
  • Certificate of Completion
  • Counterintelligence (CI) Awareness Integration Plan PDF icon
  • Counterintelligence Glossary PDF icon
  • Counterintelligence Toolkit
  • DOD Directive 5240.06 PDF icon
  • National CI Strategy 2016 PDF icon
  • National Industrial Security Program (NISP) 5220.22 PDF icon
  • Case Studies
    • CI Case Study - Attempted Acquisition of Technology, Illegal Export to Iran
    • CI Case Study - Attempted Acquisition of Technology
    • CI Case Study - Attempted Acquisition of Technology - Front Companies
    • CI Case Study - Exploitation of Relationships - Nuclear
  • Job Aids
    • Foreign Collection Methods: Indicators and Countermeasures PDF icon
    • Counterintelligence Awareness for Defense Critical Infrastructure PDF icon
    • Foreign Intelligence Entity Targeting Recruitment Methodology PDF icon
    • Industrial Base Technology List (IBTL) PDF icon
    • Understanding Espionage and National Security Crimes PDF icon

Questions

Email questions and comments to dcsa.cdsetraining@mail.mil.

ABOUT CDSE

Awards

Customer Base

Electronic Library

History

Information for Visitors

Mission/Vision

News

Products and Services

Professional Affiliations

ABOUT THIS SITE

A-Z Listing of Terms

Accessibility/Section 508

Disclaimer

FOIA

Information Quality

No FEAR Act

Open GOV

Plain Writing Act

Privacy Policy

Sitemap

USA.gov

CONNECT

Contact CDSE

Follow us on Twitter

Follow us on YouTube

Follow us on Facebook

Follow us on LinkedIn

Subscribe to CDSE news and updates

Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1