Course curriculum

    1. Course Overview

    2. Course Objectives

    1. Lesson Overview

    2. Lesson Objectives

    3. Initial Definitions

    4. CNSI Information

    5. CUI Information

    6. Intent and Impact of UD

    7. Key Policies

    8. Executive Order Information

    9. Federal Regulations Information

    10. DOD Guidance

    11. UD Types

    12. UD Type Definitions

    13. Public Domain

    14. Spillage

    15. Espionage

    16. Improper Safeguarding

    17. Special Circumstances

    18. Types of Unauthorized Disclosure Activity

    19. Misconceptions

    20. Common Misconception Types

    21. Public Domain

    22. Journalist Privilege

    23. Publishing

    24. SF 312

    25. Messaging Apps

    26. Misconceptions Activity

    27. Whistleblowing

    28. Whistleblowing Definition

    29. Whistleblower Protection Statutes

    30. Whistleblower Activity

    31. Damage

    32. Consequences of UD of CUI

    33. Consequences of UD of CNSI

    34. Damage Activity

    35. Damage Case Study

    1. Lesson Overview

    2. Access to CNSI

    3. CNSI Access Requirements

    4. CNSI Access Activity

    5. Safeguarding CNSI Introduction

    6. Safeguarding CNSI

    7. Safeguarding CNSI Activity 1

    8. Safeguarding CNSI Activity 2

    9. Safeguarding CNSI Activity 3

    10. Improperly Marked CNSI

    11. Marking CNSI

    12. Marking CNSI Activity

    13. Classification

    14. Original Classification

    15. Derivative Classification

    16. Declassification

    17. Classification Activity

    18. Case Study: Bryan Martin

    19. CUI Access Introduction

    20. Requirements to Access CUI

    21. Access CUI Information

    22. CUI Policy Information

    23. CUI Access Activity

    24. Marking CUI Introduction

    25. Marking CUI

    26. Marking CUI Activity

    27. Safeguarding CUI Introduction

    28. Safeguarding CUI

    29. Protecting CUI Activity

    30. Transmitting CUI Activity

    31. Storing CUI Activity

    32. Case Study OPM Data Breach

    1. Introduction

    2. Security & Policy Review Introduction

    3. Prepublication Requirements

    4. Role of DOPSR

    5. DOPSR Reviews

    6. PAO Function

    7. PAO Role in Releasing Information

    8. Security & Policy Review Activity

    9. Security Review Activity

    1. Lesson Overview

    2. Social Media Introduction

    3. Posting on Social Media

    4. Guiding Publications

    5. DOD 5400.17

    6. DOD 5200.01

    7. DOD 5400.48

    8. DOD 8170.01

    9. Posting on Social Media Activity 1

    10. Posting on Social Media Activity 2

    11. Posting on Social Media Activity 3

    12. Posting on Social Media Activity 4

    13. Case Study: Henry Frese

    1. Lesson Introduction

    2. Responding to Unauthorized Disclosure

    3. Information in the Media

    4. Responding to UD Activity

    5. Reporting UD

    6. Reporting Steps 1 & 2

    7. Reporting Steps 3 & 4

    8. Reporting Steps 5 & 6

    9. Reporting Steps 7 & 8

    10. Reporting Steps Review

    11. Step 1

    12. Step 2

    13. Step 3

    14. Step 4

    15. Step 5

    16. Step 6

    17. Step 7

    18. Step 8

    19. Security Manager Reporting Requirements

    20. Security Manager CNSI UD

    21. Security Manager CUI UD

    22. Security Manager PII UD

    23. Reporting Activity

    24. Sanctions

    25. Case Study Recap

    26. Reporting Lesson Summary

    27. Reporting Lesson Objectives

About this course

  • Free
  • 120 lessons
  • 1 hour of video content

Discover your potential, starting today