Description: Designed to be used in conjunction with DoD`s annual cybersecurity awareness training, this course increases additional cybersecurity responsibilities for DoD information system users with access rights to those of an authorized user. The course identifies important terminology that describes the user`s increased privileges, the specific ethical and legal cybersecurity tasks of a privileged user, and the responsibilities of a preferred user`s DoD public key infrastructure (PKI). General tasks and restrictions on privileged users in the field of cybersecurity include reporting obligations, restricted and prohibited measures, protection of confidential information and the consequences of data non-compliance. The responsibilities of preferred PKI users examine the general rules governing the use of PKI login information by preferred users, as well as the general configuration rules for activating DoD information systems by public keys. The course focuses on the use of appropriate PKI tokens by preferred users for PKI identification and authentication and does not merely ensure that the system correctly assigns PKI certificates to an account with a certain number of permissions assigned. The training defines the seven levels of sensitivity defined by the DoD for unclassified and secret confidential information. These sensitivity levels are used, in combination with the environments from which users can access information, to determine acceptable types of authentication credentials based on the strengths of login information. You access a USG (USG) information system that is only provided for USG-authorized use. By using Daesh (including all IS-connected devices), you agree to the following conditions: -The USG regularly intercepts communications on this group and monitors them regularly for purposes, including, but not limited to, penetration testing, COMSEC surveillance, networked operations and defence, personnel misconduct (PM), prosecutions (LE) and counter-intelligence investigations (CI). -The USG can check and enter the data stored on Daesh at any time. -Messages that use this Islamic State or that are stored are not private, are routinely monitored, monitored and searched, and may be disclosed or used for USG-authorized purposes. The IS includes security measures (for example.
B, authentication and access control) to protect the interests of the USG, not for your personal well-being or privacy. -Regardless of the above, the use of the IS does not constitute consent to the examination or monitoring of the content of a privileged communication or work product related to the representation or personal services of lawyers, psychotherapists or clergy and their assistants. These communications and working products are private and confidential. Learning Objectives: This course should allow students: the appearance of hyperlinks does not constitute an endorsement of the U.S. Air Force or the information, products or services it contains. The U.S. Air Force has no editorial control over the information you find in these places for activities other than military exchanges and morality, well-being and recreational places. These links are provided in accordance with the specified purpose of this DoD website. Download a full version of AF Form 4394 by clicking on the link below or browsing other documents and templates provided by the U.S. Air Force. System Requirements: Make sure your system is configured to use STEPP accordingly.