The DoD Security Specialist Course (SSC) course is administered in two phases: Phase I is the prerequisite eLearning courses/exams which provide a comprehensive introduction to common DoD security practices and Phase II is the instructor-led course. You are required to register and successfully complete Phase I before receiving approval to attend Phase II. See Registration Requirements below.

Description: This course provides students and/or learners a base line of fundamental knowledge to perform common DoD security tasks and practices in Industrial, Personnel, Information and Physical Security disciplines and understand their interrelationships, as well as the related policies, programs and procedures. Additionally, risk management concepts form the foundation of the course, and related content is woven throughout.

Learning Outcomes:
This course is designed to enable students to:

  • Describe the various types of threats to DoD infrastructure
  • Identify potential indicators of insider threats
  • Identify key components of insider threat program
  • Identify key avenues and actions associated with threat reporting
  • Define Risk Management and identify the five-step risk management process
  • Identify the relationship between industrial security and risk management
  • List the steps in the contracting process and identify security considerations for each
  • Identify the purpose of DD Form 254 and key sections containing security guidelines
  • Identify the relationship between personnel security and risk management
  • Recognize the purpose of the National Personnel Security Program
  • Identify the stages of the personnel security clearance process
  • Identify the roles and responsibilities of personnel involved in the clearance process
  • Identify the 13 adjudicative guidelines
  • Identify the nine adjudicative factors
  • Use adjudicative guidelines and factors to make an appropriate interim security clearance recommendation
  • Recognize the purpose of due process and continuous evaluation as it relates to personnel security
  • Define information security and its purpose
  • Identify the relationship between information security and risk management
  • Correctly mark a derivatively classified document
  • Properly safeguard and prepare for transportation a piece of classified information
  • Identify the requirements and regulations that guide technology transfer
  • Identify Controlled Unclassified Information (CUI) and its protective measures
  • Recognize the fundamentals of Cybersecurity
  • Define the purpose and identify the steps in the Risk Management Framework
  • Identify the purpose and techniques for disposal and destruction of classified material
  • Identify responsibilities for personnel who handle and process classified information
  • Define and list requirements for classified meetings, including security manager responsibilities
  • Differentiate between oversight and inspection and identify the steps in the inspection process
  • Differentiate between security violations and infractions and identify the process for handling security incidents
  • Recognize the fundamentals of Communications Security
  • Recognize the fundamentals of Technical Surveillance Countermeasures and TEMPEST
  • Identify the relationship between physical security and risk management
  • Recognize the fundamentals of Physical Security (security-in-depth, Unified Facility Criteria (UFC), criminal threat, the crime triangle, security coordination)
  • Identify the purpose and key components of a physical security plan
  • Apply the five steps in the risk management model towards physical security planning, using a fictional installation
  • Deliver a Security Education, Training, and Awareness briefing

Delivery Method: Instructor-led

Length: 52 Hours (7 days)

Target Audience: DoD and Federal civilian, military, and contractor security personnel.

Number of Students per Course: 42


  • Clearance Requirement: Secret
  • Attendance Requirement: Full-time attendance
  • Exam Requirements: Students must earn a 75 percent cumulative grade average of all practical exercises, quizzes and exams.

Prerequisites: Successfully complete the Phase I activities identified in the DoD Security Specialist Curriculum Navigation GS020.NAV document.

Registration Requirements: Students must be enrolled in Phase I as a prerequisite for Phase II registration. To enroll in Phase I, students first complete the DoD Security Specialist Curriculum Navigation GS020.NAV document which assigns the required Phase I eLearning activities. This document also provides instructions to navigate the eLearning courses. These courses are bundled into four apportioned 'Modules' and are assigned in order of recommended completion.

Once enrolled in Phase I, students may register and reserve a tentative spot in the Phase II Instructor-led course on their desired date. Students are placed in a "Pending Approval" status while completing Phase I and are approved on a first come, first serve basis. Students are approved in the order they successfully complete Phase I. Students are placed on a waiting list once maximum capacity is reached for Phase II. If additional space becomes available or cancellations are received for Phase II, students from the waiting list will be contacted. Course reservations for Phase II are prohibited.

Credits Recommended/Earned

  • ACE Credit Recommendation: (What's this?) 3 semester hours, upper division baccalaureate degree category
  • Professional Development Units (PDU) per SPeD: 45

Additional System Requirements: Check if your system is configured appropriately to use STEPP.


CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.

American Council on Education College Credit Recommendation Service

Course Schedule

Sep 18 - 26, 2018 (Eglin AFB, FL)
Dec 03 - 11, 2018 (Linthicum, MD)
Apr 08 - 16, 2019 (Linthicum, MD)
Jun17 - 25 2019 (Linthicum, MD)

Quick Links

Register for Phase I .

Register for Phase II .


Content related questions.