Description: Designed to be used in conjunction with DoD`s annual cybersecurity awareness training, this course increases additional cybersecurity responsibilities for DoD information system users with access rights to those of an authorized user. The course identifies important terminology that describes the user`s increased privileges, the specific ethical and legal cybersecurity tasks of a privileged user, and the responsibilities of a preferred user`s DoD public key infrastructure (PKI). General tasks and restrictions on privileged users in the field of cybersecurity include reporting obligations, restricted and prohibited measures, protection of confidential information and the consequences of data non-compliance. The responsibilities of preferred PKI users examine the general rules governing the use of PKI login information by preferred users, as well as the general configuration rules for activating DoD information systems by public keys. The course focuses on the use of appropriate PKI tokens by preferred users for PKI identification and authentication and does not merely ensure that the system correctly assigns PKI certificates to an account with a certain number of permissions assigned. The training defines the seven levels of sensitivity defined by the DoD for unclassified and secret confidential information. These sensitivity levels are used, in combination with the environments from which users can access information, to determine acceptable types of authentication credentials based on the strengths of login information. Learning Goals: This course should enable students: it is a military form published by the U.S. Department of the U.S. Army (DA) on March 1, 2020.
The form, often falsely referred to as DD 7789, is a military form used by and within the U.S. military. To date, the DA has not provided separate instructions for the form. Download an updated DA 7789 PDF form or browse hundreds of other DA forms stored in our online database. System Requirements: Check if your system for using STEPP.