return home
Purpose:
Train Department of Defense personnel for the IA management level two and three, and technical level two CISSP certification.
The Information Assurance Branch (IAB), School of Information Technology provides a 9-day Common Body of Knowledge (CBK) review seminar for CISSP. Though highly encouraged, attending the review seminar is not required to be eligible to take the exam. Registration for the review course and the exam are both required in advance. The CISSP certification meets the DoD 8570.1-Mv12, requirement for Information Assurance Level 3 Management and Level 3 Technical training. The knowledge that goes with completing the CISSP review is a requirement for military, civilians and contractors throughout DoD in certain IA positions.
Prerequisites and Documentation
The following is a list of prerequisite certifications required to attend class:
IAM level II
IAT III
In addition, other documentation is required:
- Military personnel require a DD Form 1610.
- Ft. Gordon military personnel require a DA Form 4187 (in lieu of DD Form 1610).
- DA civilians require a DD Form 1610 or SF Form 182 (in lieu of DD Form 1556 per SF 182 memorandum).
- Any personal without TDY orders are required to have a signed memorandum. (example)
Information Assurance Management Level 2: | Installation/Major Subordinate Commands (MSC)/posts, Major Command (MACOM)/ Tactical Units/PEOs Level Information Assurance Manager (IAM) and Certification Agent (CA) |
Information Assurance Management Level 3: | Regional Chief Information Officer Director and Information Assurance Program Manager (IAPM)/CA |
Information Assurance Technical Level 3: | Regional Chief Information Officer System Administrator (SA)/Network Manager (NM) Network Officer (NO) |
NOTE: Both training completion certificates and additional documentation must be presented to instructor on the first day of class.
Enrollment
Students must communicate with their training coordinators to register for the CISSP course in ATRRS. Training coordinators have enrollment access to ATRRS to register students for classes. Please NOTE: Instructors and staff of Information Assurance at Ft. Gordon and other training locations DO NOT have enrollment access to ATRRS and do not have the ability to enroll students.
Other important information about enrolling through ATRRS
- The CISSP course has a specific course number in ATRRS: 7E-F103/531-F56 (CT)
- The school code for Ft. Gordon in ATRRS is 113 (see below for additional Mirror Site school codes)
- Courses are mapped on a fiscal year. Fiscal Year runs from October - September.
(For example, if a student wishes to attend a class in October 2020, the course would be listed under Fiscal Year 2021.)
Schedule
To view the schedule for the CISSP course:
- Go to the ATRRS Course Catalog.
- Enter the following data into the search fields:
- Course Number
CISSP Course Number: 7E-F103/531-F56 (CT) - Fiscal Year
Fiscal Year runs from October - September.
(For example, if a student wishes to attend a class in October 2007, the course would be listed under Fiscal Year 2008.) - School Code
The school code for Ft. Gordon in ATRRS is 113 (see below for additional Mirror Site school codes)
Course Information
CISSP Student Files |
CISSP Training Slides: See Also At-Home Laser Hair Removal Devices That Really Work, According to Dermatologists10 Safest Cities in Brazil (2022 Updated)Le migliori serie TV Netflix in Italia | Settembre 202210 brow gels so good they could pass for brow lamination
| Books | See the Course Preparation Document for book informationClass begins on the first Monday at 0830 hours (8:30 A.M.) and ends at 1630 hours (4:30 P.M.) on the second Thursday. The CISSP exam will be held on the second Friday. Make your travel arrangements accordingly. |
Class Location |
|
CISSP Certification Exam
In conjunction with the CBK, IAB also hosts the Certified Information Systems Security Professional (CISSP) Exam provided by the International Information Systems Security Certification Consortium, Inc., (ISC)² at the conclusion of the class. Registration must be done online at http://www.isc2.org. The cost associated with the exam may be covered by units/agencies/organizations funding for certification completion. If individuals are eligible for coverage under the GI Bill, reimbursement is available.
Exam Date: Last Day of Course (MTT Exempt)
Exam Cost: The standard fee is $699 USD. For more information, see (ISC)² pricing document.
This course is offered AT NO COST to military, government civilians and government contractors. For more information on CISSP certification, and to register for the exam, visit https://www.isc2.org/cissp/default.aspx.
Vehicle Registration
Students driving onto the Fort Gordon installation are required to have a valid CAC to enter the installation. If the student does not have valid CAC, a temporary pass can be obtained from the Visitor center at Gate 1. For more information on vehicle registration, call the military police at DSN 780-3132 or commercial 706-791-3132.
Delays
Students should anticipate moderate to long delays at all Ft. Gordon gates. Leaving lodging location early enough to allow time for gate delays is highly recommended.
Driving directions:
- From I-20: Take Belair Road / Jimmie Dyess Parkway Exit. If traveling East on I-20, take a right off of the exit. If traveling West, take a left off of the exit. Travel approximately 3 miles until you reach Ft. Gordon Gate 1. Map
- From Bobby Jones Expressway (I-520): Take Ft. Gordon exit. Merge onto Gordon Hwy and travel approximately 2.5 miles until you reach Chamberlain Avenue (3rd traffic light). Take a left into Ft. Gordon Gate 1. Map
- From Augusta Regional / Bush Field Airport: Travel out of main airport entrance onto Tobacco Road (straight). Continue on Tobacco Road for approximately 10 miles until you reach Ft. Gordon Gate 5. Map
Lodging
IAW Institutional Training Directed Lodging Meal (ITDLM) Policy Memo and Handbook Document 2 dated 2 June 08; all Soldiers (Army, ARNG, & USAR) on TDY status have to check in at IHG, Griffith Hall, Bldg 250. IHG will either house the student or send them to a specific hotel at no cost of the TDY student.
There are many off-post hotels in the Ft. Gordon vicinity as well. Military-Hotels.us offers information about hotels in the area. Sites such as Expedia.com, Travelocity.com, Orbitz.com, Hotels.com, and Hotwire.com can offer lodging information for the Ft. Gordon surrounding area as well.
Dining
Fort Gordon has a number of restaurants on post. To find more information, including menus, please visit the Fort Gordon Dining page. You can also find great food in the surrounding Augusta area. Take a look at the Augusta Vistor's Bureau website for some listings.
Fort Gordon MapClick here for a full map of Ft. Gordon
Fort Gordon WebsitesFort Gordon (.com)| Fort Gordon (.mil)
FAQs
Where can I do army cyber awareness training? ›
CS Signal Training Site, Fort Gordon.
Where do I find my Army Cyber Awareness certificate? ›To obtain your certificate, click on the “Open My Training History” link in the “My Training” window. 10. A list of completed courses will appear. Click on the view certificate icon in the “Certificate” column to view your certificate for a training course.
Is signal Fort Gordon? ›Fort Gordon, formerly known as Camp Gordon, is a United States Army installation established in October 1941. It is the current home of the United States Army Signal Corps, United States Army Cyber Command, and the Cyber Center of Excellence.
What is IA training army? ›Certification in Information Assurance (IA) is a mandatory requirement for security personnel with privileged access to monitoring, system control and administration functions. This aimed at providing effective security safeguards to data and user authentication mechanisms.
How long is cyber awareness training? ›How long is the training? The cybersecurity awareness training may take up to 30 minutes. It is recommended that users complete the training in one sitting. The training will be available to be revisited by the user once completed.
Where is the cyber awareness challenge? ›To access the Cyber Awareness Challenge, go to https://public.cyber.mil/training/cyber-awareness-challenge. Click on the “Launch Training” icon and then click “Start New Session”.
Is ia the same as cyber awareness? ›What is it? Army's Information Assurance (IA)/Cybersecurity Awareness is an opportunity to heighten individual and collective knowledge about cybersecurity threats, and individuals' roles and responsibilities in protecting the force against them.
What is Army cyber awareness training? ›This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII).
Is CUI training an annual requirement? ›The Center for Development and Security Excellence (CDSE) provides CUI training that is available to Industry. Per DoDI 5200.48 and pursuant to contractual requirements, DOD contractors require initial training and annual refresher training on CUI.
Where do signal officers get stationed? ›United States Army Signal Corps | |
---|---|
Garrison/HQ | Fort Gordon, Georgia, U.S. |
Motto(s) | Pro Patria Vigilans (English: Watchful for the Country) |
Corps colors | Orange and white |
Anniversaries | 21 June 1860 |
How long is Army Signal Officer School? ›
About U.S. Army Signal School
Time to complete this education training ranges from 32 hours to 4 months depending on the qualification, with a median time to complete of 6 weeks.
“The Fort Gordon/Augusta area is great place to be stationed. There is no shortage of things to keep you busy locally. The area is very military friendly, probably more military friendly than a lot of other places we have been.
What is Navy IA training? ›Information Assurance Training
Information Assurance (IA) awareness training is now mandated for all users of Department of Defense (DOD) information systems. This requirement applies to all Department of Navy (DON) personnel who have or will require access to DOD or DON computers.
A Cyber Awareness Challenge is a type of training and security certification that helps authorized users understand the actions required to avoid and reduce threats and vulnerabilities in an organization's system.
What is information Awareness training? ›To recap from above, DoD information assurance awareness training is a critical program that is designed to ensure uniform and optimal cybersecurity awareness across all DoD personnel and stakeholders.
Does Amazon have a cyber security Department? ›As a part of the Amazon Security organization, the Consumer Security team works to safeguard all customer and employee data, applications, services, and assets across Amazon's critical business functions including Customer Service, People and Technology Experience (PXT), Consumer Payments, Physical Stores, and ...
How often should I train employees on cybersecurity? ›According to the Advanced Computing Systems Association (USENIX), companies should hold cybersecurity training every four to six months. They carried out a study in which they observed employees who had undergone security awareness training on identifying phishing attacks.
How often should you do cyber security training? ›So, how often is often enough to improve your team's cybersecurity awareness? It turns out that training every four months is the “sweet spot.” This is when you see more consistent results in your IT security.
Which of the following is a best practice for securing your home computer Cyber Awareness 2022? ›Which of the following is a best practice for securing your home computer? -Create separate accounts for each user.
What certificates are contained on the Common Access Card? ›- Public Key Infrastructure (PKI) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.
- Two digital fingerprints.
- Digital photo.
- Personal Identity Verification (PIV) certificate.
- Organizational affiliation.
- Agency.
Which of the following is not an example of CUI cyber awareness? ›
1 Answer. 'Press release data' is NOT an example of CUI.
What are the 4 objectives of planning for security? ›The Four Objectives of Security: Confidentiality, Integrity, Availability, and Nonrepudiation.
Is Information Assurance part of cyber security? ›“Cybersecurity is a sub-set of information security, which itself is a sub-discipline of information assurance, which encompasses higher-level concepts such as strategy, law, policy, risk management, training, and other disciplines that transcend a particular medium or domain.”
What is Information Assurance in the military? ›Information Assurance (IA)/Cybersecurity is the Army unified approach to protect the confidentiality, integrity and availability of our information and operations. IA/ Cybersecurity is critical to your mission success and there- fore must be part of your risk management processes.
How many cyber protection conditions are there? ›INFOCON has five levels (see below) ranging from normal conditions all the way to responding to a general attack.
How can we protect CUI cyber awareness? ›CUI must be stored or handled in controlled environments that prevent or detect unauthorized access. Limit and control access to CUI within the workforce by establishing electronic barriers. When Reproducing or Faxing CUI, you may use agency-approved equipment. Look for signs on approved equipment.
What is the best way to protect your CAC? ›To protect the information on your CAC, you should never tell anyone your PIN or write it down where it can be easily found. Your PIN should be kept secure at all times, just like your Social Security Number.
What are the 2 types of CUI? ›Sensitive but Unclassified (SBU) For Official Use Only (FOUO)
What are the 6 categories of CUI? ›- Ammonium Nitrate.
- Chemical-terrorism Vulnerability Information.
- Critical Energy Infrastructure Information.
- Emergency Management.
- General Critical Infrastructure Information.
- Information Systems Vulnerability Information.
- Physical Security.
- Protected Critical Infrastructure Information.
DoD Mandatory Controlled Unclassified Information (CUI) Training. This course is mandatory training for all DoD personnel with access to controlled unclassified information.
What is a 26B in the Army? ›
AOC 26B are IT services and applications engineers that support military operations. 26B officers implement and manage the integration and security of enterprise services such as active directory, database management, e-mail, web-based applications, and many others.
Do signal officers get top secret clearance? ›(2) Special qualifications. All Field Grade Signal officers should qualify for and maintain a top secret clearance with special compartmented information access as soon as possible.
Is Signal Corps combat arms? ›The combat arms (branches) are Infantry, Armor, Artillery, Air Defense Artillery, Aviation, and Special Forces. The combat support branches include the Corps of Engineers, the Military Intelligence Corps, the Chemical Corps, and the Signal Corps.
How much does a signal officer make in the Army? ›How much does a Signals Officer make at U.S. Army in the United States? Average U.S. Army Signals Officer yearly pay in the United States is approximately $77,565, which is 8% above the national average.
Where is the U.S. Army Signal School? ›Army Signal Center and School, Fort Monmouth, N.J.
What happens if I fail Army OCS? ›If you fail Army OCS you have one of two choices: You get discharged from the Army. You complete the remainder of your service agreement as an enlisted soldier.
How much is bah at Fort Gordon? ›Cost of Living and BAH
Fort Gordon BAH ranges from $1,155 to $1,740 for enlisted. BAH at Fort Gordon begins at $1,407 for O1 without dependents and goes up to $2,100 for O7 with dependents.
Grade | With Dependents | Without Dependents |
---|---|---|
E03 | $1,452 | $1,155 |
E04 | $1,452 | $1,155 |
E05 | $1,494 | $1,317 |
E06 | $1,665 | $1,410 |
The installation supports Army, Air Force, Navy, Marines, and Department of Defense personnel performing regional and world-wide missions that include communications training and operations, military intelligence, cyber operations, medical and dental care, force integration and mobilization.
Does the Navy still do IA? ›Welcome to the U.S. Navy's Individual Augmentee (IA) website. Mobilizing as an IA is a challenging and rewarding experience. Getting there and back again can be an involved and complicated process.
Is signal Fort Gordon? ›
Fort Gordon, formerly known as Camp Gordon, is a United States Army installation established in October 1941. It is the current home of the United States Army Signal Corps, United States Army Cyber Command, and the Cyber Center of Excellence.
What is augment in military? ›: a member of the U.S. military (such as a military reservist or a member of the Navy or Air Force) who is assigned to special duty in a military unit (such as an Army battalion) in order to fill a shortage or to provide particular skills Shortly after the September 11th attacks, hundreds of these augmentees were ...
How long is the cyber awareness training? ›How long is the training? The cybersecurity awareness training may take up to 30 minutes. It is recommended that users complete the training in one sitting. The training will be available to be revisited by the user once completed.
Where can I do army cyber awareness training? ›CS Signal Training Site, Fort Gordon.
Which month is cyber security Month? ›Held every October, we celebrate National Cybersecurity Awareness Month (NCSAM) by highlighting the importance of cybersecurity. In conjuction with the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), this year's theme is Do Your Part.
What is IA training for Army? ›Certification in Information Assurance (IA) is a mandatory requirement for security personnel with privileged access to monitoring, system control and administration functions. This aimed at providing effective security safeguards to data and user authentication mechanisms.
What is the difference between security awareness and security training? ›Awareness sessions aren't training but are intended to enable individuals to recognize security problems and act accordingly. Training, on the other hand, is designed to make sure individuals have appropriate security skills and competencies.
What is the main purpose of security awareness training? ›Security awareness training is a strategy used by IT and security professionals to prevent and mitigate user risk. These programs are designed to help users and employees understand the role they play in helping to combat information security breaches.
What is Army cyber awareness training? ›This course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII).
What certificates are contained on the CAC? ›Each CAC contains a client-side security certificate from the DoD certificate authority (DoD Root CA). This client-side certificate allows the CAC to authenticate with web servers that include the server-side security certificate from the DoD certificate authority.
Is ia the same as cyber awareness? ›
What is it? Army's Information Assurance (IA)/Cybersecurity Awareness is an opportunity to heighten individual and collective knowledge about cybersecurity threats, and individuals' roles and responsibilities in protecting the force against them.
What is SCI cyber awareness? ›Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.
What is DoD cyber awareness? ›The DOD Cyber Awareness Challenge 2022 is currently available on JKO, as well as Cyber Awareness Challenges of past years. Now is a good time to refresh your understanding of the social engineering scams targeting all of us and cyber hygiene best practices to protect against being hacked.
What are the 4 objectives of planning for security? ›The Four Objectives of Security: Confidentiality, Integrity, Availability, and Nonrepudiation.
Which of the following is not an example of CUI cyber awareness? ›1 Answer. 'Press release data' is NOT an example of CUI.
How does CAC work? ›In addition to its use as an ID card, a CAC is required for access to government buildings and computer networks. A CAC is about the size of a standard debit card and has an embedded microchip that enables the encryption and cryptographic signing of email and use of public key infrastructure (PKI) authentication tools.
Where are CAC certificates stored? ›Under file:\\%APPDATA%\Microsoft\SystemCertificates\My\Certificates you will find all your personal certificates.
What is the purpose of a CAC card? ›The CAC, a "smart" card about the size of a credit card, is the standard identification for active duty uniformed Service personnel, Selected Reserve, DoD civilian employees, and eligible contractor personnel.
What is an IA certificate? ›An inspection authorization, or IA, certification is a professional certification that authorizes a person to perform yearly aircraft inspections. The Federal Aviation Administration requires commercial and private aircraft to pass these yearly inspections to ensure that a particular aircraft is safe to fly.
Is CUI training an annual requirement? ›The Center for Development and Security Excellence (CDSE) provides CUI training that is available to Industry. Per DoDI 5200.48 and pursuant to contractual requirements, DOD contractors require initial training and annual refresher training on CUI.
Is Information Assurance part of cyber security? ›
“Cybersecurity is a sub-set of information security, which itself is a sub-discipline of information assurance, which encompasses higher-level concepts such as strategy, law, policy, risk management, training, and other disciplines that transcend a particular medium or domain.”
What is SCI eligibility? ›What Does Security Clearance Eligibility Mean? It is a determination that a person is able and willing to safeguard classified national security information and/or occupy a national security sensitive position. The national security clearance eligibility levels are: Confidential, Secret, and Top Secret.
How is SCI marked? ›They should be listed by alphabet and a forward slash to separate them. A double forward slash separates the classification level and control markings.
What classification is SCI? ›Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes.