Currently not available. Please check back at a later date.

Description: This course provides a comprehensive introduction to common DoD security practices in the Industrial Security, Personnel Security, Information Security, and Physical Security disciplines and their interrelationships. Additionally, risk management concepts form the foundation of the course, and related content is woven throughout.

The course is administered in two phases:

Phase I is the prerequisite eLearning courses/exams which provide a comprehensive introduction to common DoD security practices.

Phase II is the virtual instructor-led course, delivered asynchronously via the CDSE Collaborative Learning Environment (CLE). You are required to successfully complete Phase I before requesting registration for Phase II.

Learning Objectives:
Module 0: Course Introduction

  • Recognize the Sakai tools that will be used in the course
  • Describe the overall structure of the Security Specialist Course (SSC)
  • Identify the purpose and audience of the SSC Course
  • Identify your role in the security field
  • Identify and understand the importance of Security Education Training and Awareness (SETA)

Module 1: Threats to DoD Assets and Risk Management

  • Describe the type of criminal threats
  • Describe the types of terrorists, their command and organizational structures, indicators, and tactics
  • Identify potential indicators of insider threats
  • Define risk management and identify the five-step risk management process

Module 2: Industrial Security

  • Identify the relationship between industrial security and risk management
  • List the steps in the contracting process and identify security considerations for each
  • Identify the purpose of DD Form 254 and key sections containing security guidance

Module 3: Personnel Security

  • Identify the relationship between personnel security and risk management
  • Recognize the purpose of the National Personnel Security Program
  • Identify the stages of the personnel security clearance process
  • Identify the roles and responsibilities of personnel involved in the clearance process
  • Identify the 13 adjudicative guidelines
  • Identify the nine adjudicative factors
  • Using adjudicative guidelines and adjudicative factors, make an appropriate interim security clearance eligibility determination for a scenario employee

Module 4: Information Security

  • Define information security and its purpose
  • Identify the relationship between information security and risk management
  • Correctly mark a derivatively classified document
  • Properly safeguard and prepare for transportation a piece of classified information
  • Identify the requirements and regulations that guide technology transfer
  • Identify unclassified controlled information and its protective measures
  • Identify the purpose and techniques for disposal and destruction of classified material
  • Identify responsibilities for personnel who handle and process classified information
  • Define and list requirements for classified meetings, including security manager responsibilities
  • Differentiate between oversight and inspection and identify the steps in the inspection process
  • Differentiate between security violations and infractions, and identify the process for handling security incidents
  • Recognize the fundamentals of Communications Security
  • Recognize the fundamentals of Technical Surveillance Countermeasures and TEMPEST

Module 5: Physical Security

  • Identify the relationship between physical security and risk management
  • Apply the five steps in the risk management model towards physical security planning, using a fictional installation

Module 6: Course Conclusion

  • Complete the final course exam
  • Review the role of the four core security disciplines in risk management
  • Describe the three primary characteristics of a successful security professional
  • Apply the knowledge gained to develop a Security Education, Training, and Awareness briefing

Delivery Method: Virtual Instructor-led

Length: 52 hours over eight weeks

Target Audience: Entry-level DoD and Federal civilian, military, and contractor security personnel.

Number of Students per Course: 30 (Unless determined otherwise by the course manager)


  • Clearance Requirements: Secret
  • Attendance Requirements: Full-time attendance at all sessions and participation in practice exercises and discussion forums
  • Exam Requirement: Students must earn a 75 percent cumulative grade average on all practical exercises, discussion forums and exam.

Prerequisites: The Phase I eLearning requirements are listed below in the recommended order of completion. You must complete all identified prerequisites in order to request registration in Phase II.

  • Developing a Security Education & Training Program GS104.06
  • Special Access Programs (SAP) Overview SA001.06
  • OPSEC Awareness for Military Members, DoD Employees and Contractors Course GS130.16
  • Introduction to Risk Management Course GS150.06
  • Introduction to Risk Management Framework (RMF) CS124.06
  • Introduction to Industrial Security IS011.06
  • Introduction to Personnel Security PS113.06
  • Introduction to Information Security IF011.06
  • Original Classification IF102.06
  • Derivative Classification IF103.06
  • Marking Classified Information IF105.06
  • Transmission and Transportation for DoD IF107.06
  • Introduction to Physical Security PY011.06
  • Storage Containers and Facilities PY105.06
  • Physical Security Planning and Implementation PY106.06
  • Physical Security Measures PY103.06
  • Lock and Key Systems PY104.06

Credits Recommended/Earned:

  • ACE Credit Recommendation: (What's this?): Three (3) semester hours, upper division baccalaureate degree category
  • Professional Development Units per SPēD: 45

System Requirements: Check if your system is configured appropriately to use STEPP.

CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.