28.11.2012 Views

jko-catalog-sep-2012

jko-catalog-sep-2012

jko-catalog-sep-2012

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

JKO Course Descriptions<br />

eleven courses (modules 00-10) in a target language; therefore, the Headstart2 courses have been organized into curriculums<br />

to ensure all lessons are complete. A user will only be able to obtain a completion certificate once the entire curriculum is complete.<br />

80 hour(s)<br />

Safe Home Computing - WNSF ARNJ7-US007 N<br />

This is a required course dealing with safe home computing. This course may require an additional login and password registration.<br />

In addition, your course manager may require you to present a copy of the actual hyperlinked course certificate of<br />

completion, so please retain a copy for your own records. 1 hour(s)<br />

Securing the Mobile Network Course J6SN-US386 N,S<br />

The purpose of this course is to provide an overview of the wireless environment, its elementary technical aspects, and generally<br />

accepted operational practices. The course provides an overview of the protection measures provided in the Security<br />

Technical Implementation Guides (STIGs) as a basis for minimizing the exposure of operational information to the enemy. The<br />

target audience for this course includes the end user, system administrators, network administrators, etc. 8 hour(s)<br />

Security in the Information Age Course J3OP-MN061 N,S, IP<br />

This course provides an introduction to the main risks and emerging insecurities of the information age, which is characterized<br />

by the rapid spread of information and communications technology (ICT) and new kinds of vulnerabilities as a consequence of<br />

the dependence on ICT in modern-day societies. The six learning objects include an overview of the information revolution and<br />

how it is changing the risk environment, a description of malicious actors and the tools that they can employ to cause damage<br />

in the world of information infrastructures, an introduction to the research field of security studies in connection with information-age<br />

risks, a discussion of the use of ICT in violent and non-violent conflict situations, an outline of critical information<br />

infrastructure protection (CIIP) policies, and a discussion of multilateral endeavors to protect cyberspace. 3 hour(s)<br />

Self Aid / Buddy Care Classroom Training NNC-J1-2003-I N<br />

SABC Training provides basic fundamentals for life and limb-saving first aid procedures for military personnel, making it possible<br />

for wounded or injured persons to survive until medical personnel arrive. To fulfill the training requirement, members must<br />

complete first the WBT and then the hands-on skills demonstration. This course examines various protective measures taken<br />

in extreme environmental conditions, as well as covering treatment during emergency medical situations. Patient evaluation,<br />

treatment, and transportation are also presented. USAF personnel: members should complete the hands-on training within<br />

60 days of WBT completion or WBT will be null and void (per AFI 36-2238). If you have been tasked via LMS to complete the<br />

SABC courses and have accomplished within the last 18 months, please contact Capt Matthew Ketchie, 554-9777. Please be<br />

prepared to offer supporting documentation. 1 hour(s)<br />

Senior Leader Course for Installation CBRN Defense Course J3OP-US232 N,S<br />

The CBRN Senior Leader Course for Installation Defense is intended for senior leaders who are directly responsible for the<br />

CBRN defense of an installation. CBRN installation defense is a part of an overarching Installation Protection Program (IPP)<br />

and involves planning, resourcing, and executing for potential CBRN threats. The course includes a post test. 4 hour(s)<br />

Sensitive Activities J3ST-US813 N,S<br />

The purpose of this course is to provide JIEDDO new employees with an overview of the JIEDDO Sensitive Activities Branch.<br />

1 hour(s)<br />

SERE 100.1 Level A Code of Conduct Training Course J3TA-US022 N,S<br />

The purpose of this course is to provide DoD personnel the fundamental knowledge necessary to uphold the spirit and intent<br />

of the Code of Conduct and address the challenges of isolation, captivity, and recovery. It provides the essential Personnel<br />

Recovery and Survival, Evasion, Resistance and Escape (SERE) knowledge necessary for personnel to execute their responsibilities<br />

when isolated. The new SERE 100.1 blends the latest immersive gaming technology and scenario-driven activities with<br />

instructional video and other multimedia that focuses the student to develop SERE knowledge and skills, and at times, places<br />

them under realistic duress. This course also has personal interviews with former Vietnam, Desert Storm, and Operation Iraqi<br />

Freedom Prisoners of War (POW), which assist putting the course in a "yes, it can happen to me" perspective. Students will be<br />

guided through the correct tactics, techniques, and procedures for outdoor survival and evasion, captivity resistance, captivity<br />

resolution through escape, and personnel recovery (PR). Ultimately, this course prepares the military member to return with<br />

honor, regardless of the circumstances of isolation. 8 hour(s)<br />

Sexism (EOA 4250) Course J1SN-US465-LB N<br />

This course demonstrates to learners the importance of recognizing sexism and sexist issues that negatively impact our military.<br />

Also covered in this course are historical and societal influences, sexism in the military, and strategies to combat sexism.<br />

All course content is based upon identified DOD training requisites and associated educational requirements recognized in<br />

* Indicates new courses added to the JKO LCMS after July 2011. The “*” is not a part of the actual course number.<br />

132

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!