jko-catalog-sep-2012
jko-catalog-sep-2012
jko-catalog-sep-2012
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
JKO Course Descriptions<br />
eleven courses (modules 00-10) in a target language; therefore, the Headstart2 courses have been organized into curriculums<br />
to ensure all lessons are complete. A user will only be able to obtain a completion certificate once the entire curriculum is complete.<br />
80 hour(s)<br />
Safe Home Computing - WNSF ARNJ7-US007 N<br />
This is a required course dealing with safe home computing. This course may require an additional login and password registration.<br />
In addition, your course manager may require you to present a copy of the actual hyperlinked course certificate of<br />
completion, so please retain a copy for your own records. 1 hour(s)<br />
Securing the Mobile Network Course J6SN-US386 N,S<br />
The purpose of this course is to provide an overview of the wireless environment, its elementary technical aspects, and generally<br />
accepted operational practices. The course provides an overview of the protection measures provided in the Security<br />
Technical Implementation Guides (STIGs) as a basis for minimizing the exposure of operational information to the enemy. The<br />
target audience for this course includes the end user, system administrators, network administrators, etc. 8 hour(s)<br />
Security in the Information Age Course J3OP-MN061 N,S, IP<br />
This course provides an introduction to the main risks and emerging insecurities of the information age, which is characterized<br />
by the rapid spread of information and communications technology (ICT) and new kinds of vulnerabilities as a consequence of<br />
the dependence on ICT in modern-day societies. The six learning objects include an overview of the information revolution and<br />
how it is changing the risk environment, a description of malicious actors and the tools that they can employ to cause damage<br />
in the world of information infrastructures, an introduction to the research field of security studies in connection with information-age<br />
risks, a discussion of the use of ICT in violent and non-violent conflict situations, an outline of critical information<br />
infrastructure protection (CIIP) policies, and a discussion of multilateral endeavors to protect cyberspace. 3 hour(s)<br />
Self Aid / Buddy Care Classroom Training NNC-J1-2003-I N<br />
SABC Training provides basic fundamentals for life and limb-saving first aid procedures for military personnel, making it possible<br />
for wounded or injured persons to survive until medical personnel arrive. To fulfill the training requirement, members must<br />
complete first the WBT and then the hands-on skills demonstration. This course examines various protective measures taken<br />
in extreme environmental conditions, as well as covering treatment during emergency medical situations. Patient evaluation,<br />
treatment, and transportation are also presented. USAF personnel: members should complete the hands-on training within<br />
60 days of WBT completion or WBT will be null and void (per AFI 36-2238). If you have been tasked via LMS to complete the<br />
SABC courses and have accomplished within the last 18 months, please contact Capt Matthew Ketchie, 554-9777. Please be<br />
prepared to offer supporting documentation. 1 hour(s)<br />
Senior Leader Course for Installation CBRN Defense Course J3OP-US232 N,S<br />
The CBRN Senior Leader Course for Installation Defense is intended for senior leaders who are directly responsible for the<br />
CBRN defense of an installation. CBRN installation defense is a part of an overarching Installation Protection Program (IPP)<br />
and involves planning, resourcing, and executing for potential CBRN threats. The course includes a post test. 4 hour(s)<br />
Sensitive Activities J3ST-US813 N,S<br />
The purpose of this course is to provide JIEDDO new employees with an overview of the JIEDDO Sensitive Activities Branch.<br />
1 hour(s)<br />
SERE 100.1 Level A Code of Conduct Training Course J3TA-US022 N,S<br />
The purpose of this course is to provide DoD personnel the fundamental knowledge necessary to uphold the spirit and intent<br />
of the Code of Conduct and address the challenges of isolation, captivity, and recovery. It provides the essential Personnel<br />
Recovery and Survival, Evasion, Resistance and Escape (SERE) knowledge necessary for personnel to execute their responsibilities<br />
when isolated. The new SERE 100.1 blends the latest immersive gaming technology and scenario-driven activities with<br />
instructional video and other multimedia that focuses the student to develop SERE knowledge and skills, and at times, places<br />
them under realistic duress. This course also has personal interviews with former Vietnam, Desert Storm, and Operation Iraqi<br />
Freedom Prisoners of War (POW), which assist putting the course in a "yes, it can happen to me" perspective. Students will be<br />
guided through the correct tactics, techniques, and procedures for outdoor survival and evasion, captivity resistance, captivity<br />
resolution through escape, and personnel recovery (PR). Ultimately, this course prepares the military member to return with<br />
honor, regardless of the circumstances of isolation. 8 hour(s)<br />
Sexism (EOA 4250) Course J1SN-US465-LB N<br />
This course demonstrates to learners the importance of recognizing sexism and sexist issues that negatively impact our military.<br />
Also covered in this course are historical and societal influences, sexism in the military, and strategies to combat sexism.<br />
All course content is based upon identified DOD training requisites and associated educational requirements recognized in<br />
* Indicates new courses added to the JKO LCMS after July 2011. The “*” is not a part of the actual course number.<br />
132