public.cyber.mil Open in urlscan Pro
34.197.0.75  Public Scan

URL: https://public.cyber.mil/training/cyber-awareness-challenge/
Submission: On March 27 via api from LU — Scanned from IL

Form analysis 0 forms found in the DOM

Text Content

U.S. GOVERNMENT NOTICE AND CONSENT

You are accessing a U.S. Government (USG) Information System (IS) that is
provided for USG-authorized use only.

By using this IS (which includes any device attached to this IS), you consent to
the following conditions:

· The USG routinely intercepts and monitors communications on this IS for
purposes including, but not limited to, penetration testing, COMSEC monitoring,
network operations and defense, personnel misconduct (PM), law enforcement (LE),
and counterintelligence (CI) investigations.

· At any time, the USG may inspect and seize data stored on this IS.

· Communications using, or data stored on, this IS are not private, are subject
to routine monitoring, interception, and search, and may be disclosed or used
for any USG authorized purpose.

· This IS includes security measures (e.g., authentication and access controls)
to protect USG interests – not for your personal benefit or privacy.

Notwithstanding the above, using this IS does not constitute consent to PM, LE
or CI investigative searching or monitoring of the content of privileged
communications, or work product, related to personal representation or services
by attorneys, psychotherapists, or clergy, and their assistants. Such
communications and work product are private and confidential. See User Agreement
for details.

OK

Loading...
 * Search
 * Login with CAC


Menu
 * Topics
   
   
    * LIST OF TOPICS
   
    * * Cross Domain Enterprise Service (CDES)
      * Cyber Sam
      * Defense Collaboration Services (DCS)
      * Department of Defense Secure Access File Exchange (DoD SAFE)
    * * DevSecOps Operational Container Scanning
      * DoD Cloud Computing Security
      * DoD Cyber Scholarship Program (DoD CySP)
      * DoD Workforce Innovation Directorate
    * * Enterprise Connections
      * GenCyber
      * Identity and Access Management (IdAM)
      * National Centers of Academic Excellence in Cybersecurity (NCAE-C)
   
   Close
 * Training
   
   
    * CYBER EXCHANGE TRAINING
   
    * * Training Overview
      * Training Catalog
      * Cyber Awareness Challenge
      * Training Troubleshooting Guide
   
   Close
 * PKI/PKE
   
   
    * PUBLIC KEY INFRASTRUCTURE/ENABLING
   
    * * Public Key Infrastructure/Enabling (PKI/PKE)
      * External Certification Authorities (ECA)
   
   Close
 * SRGs/STIGs
 * Resources
   
   
    * LIST OF CYBER RESOURCES
   
    * * About the DoD Cyber Exchange
      * Approved Products List (APL)
      * Cybersecurity Acronyms
      * Cybersecurity Awareness Month Archives
    * * DoD Consent Banner with FAQ
      * External Resources
      * Policy and Guidance
   
   Close
 * Help
   
   
    * CYBER EXCHANGE HELP
   
    * * Email Directory
      * Frequently Asked Questions (FAQs)
   
   Close



CYBER AWARENESS CHALLENGE 2024

Version: 2024 Length: 1 Hour

DoD UsersAll Other Users
i Information
i Information

The purpose of the Cyber Awareness Challenge is to influence behavior, focusing
on actions that authorized users can engage to mitigate threats and
vulnerabilities to DoD Information Systems. This training is current, designed
to be engaging, and relevant to the user. The Cyber Awareness Challenge is the
DoD baseline standard for end user awareness training by providing awareness
content that addresses evolving requirements issued by Congress, the Office of
Management and Budget (OMB), the Office of the Secretary of Defense, and
Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG).
This course provides an overview of current cybersecurity threats and best
practices to keep information and information systems secure at home and at
work. The training also reinforces best practices to protect classified,
controlled unclassified information (CUI), and personally identifiable
information (PII). A Knowledge Check option is available for users who have
successfully completed the previous version of the course. After each selection
on the incident board, users are presented one or more questions derived from
the previous Cyber Awareness Challenge. If all questions are answered correctly,
users will skip to the end of the incident. If any questions are answered
incorrectly, users must review and complete all activities contained within the
incident.



The DoD Cyber Exchange is sponsored by
Defense Information Systems Agency (DISA)

 * Training
 * SRGs/STIGs
 * PKI / PKE
 * External Resources

 * Privacy and Security
 * Section 508
 * Site Map

Login with CAC

Help


Scroll to top