CyberAwareness Challenge for the Intelligence Community DS-IA110.06
This course was created by DISA and is hosted on CDSE's learning management system STEPP. This course does not have a final exam.
Description: This revised version of CyberAwareness Challenge, updated with emerging cybersecurity threats, is a serious game that simulates the decisions that Federal government information systems users make every day as they perform their work. Rather than using a narrative format, the Challenge presents cybersecurity, information assurance (IA), and information systems security (ISS) awareness instructional topics through first-person simulations and mini-games. This allows the user to practice and review IA/ISS concepts in an interactive manner. The introduction explains that information systems users are responsible for protecting sensitive and classified information, as well as the information system on which this information resides. In the introduction, users are presented with the types of decisions they are expected to make throughout the Challenge, as well as the consequences of their decisions in the scoring mechanisms. As a user makes these situational decisions, they are introduced to threats associated with the insider threat, identity theft, spyware, malicious code, and phishing, as well as what to do when encountering classified or sensitive documents on the Internet. Users experience the importance of maintaining information security situational awareness when out of a secure area. Users learn security concepts they need for their daily routine at work, while teleworking, and on their home systems. The users of the Intelligence Community (IC) option covers unique Sensitive Compartmented Information (SCI) issues and environment concerns.
Course Resources: N/A
This course is designed to enable students to:
- Identify IA/ISS and why it is important
- Identify the different types of information and the requirements to protect each content type
- Identify the different forms and methods of cyber-attacks
- Identify the types of technologies that are particularly vulnerable to attacks
- Identify unique Sensitive Compartmented Information (SCI) issues
Length: 1 hour 20 Minutes
Target Audience:Users of government-provided or government-authorized information systems in the intelligence community (intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program)
Number of Student per Course: N/A
- Clearance Requirement: N/A
- Attendance Requirement: N/A
- Exam Requirements: N/A
- ACE Credit Recommendation: (What's this?) N/A
- Continuing Education Units per IACET: N/A
- Professional Development Units per SPeD: 3
Additional System Requirements: Check to check if your system is configured appropriately to use STEPP.
CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.