jko-catalog-sep-2012
jko-catalog-sep-2012
jko-catalog-sep-2012
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
* Indicates new courses added to the JKO LCMS after July 2011. The “*” is not a part of the actual course number.<br />
95<br />
JKO Course Descriptions<br />
8570.01-M, Information Assurance Improvement Program as Information Assurance Technicians (IAT) Levels I and II, as well<br />
as Information Assurance Managers (IAM) Level II. The subjects are Transmission Control Protocol (TCP) reset, Distributed<br />
Denial of Service (DDoS) attacks on routers, spoofing attacks, remote access/remote control, physical security review, and<br />
Simple Network Management Protocol, or SNMP. 1.5 hour(s)<br />
IED Defeat Force Wide Training J3OP-US306 N<br />
The purpose of this course is to provide Joint EOD forces with a self-development training tool for Improvised Explosive Device<br />
Disposal (IEDD) operations, which includes advanced diagnostics of IED components and clandestine labs, battle staff skills to<br />
improve joint integration with maneuver, a refresher on some traditional EOD tools, and finally a refresher on basic demolition<br />
procedures. 12 hour(s)<br />
IED Incident Management Procedures J3OP-MN900-04-03 N,S<br />
This course is part of a larger ISAF Curriculum. This lesson explains the management procedures that International Security<br />
Assistance Force (ISAF) forces need to apply during Improvised Explosive Device (IED) incident management and exploitation.<br />
0.5 hour(s)<br />
IJC Communications Information Systems (CIS) J3OP-MN900-03-10 N,S<br />
This course is part of a larger ISAF Curriculum. This lesson presents an overview of the International Security Assistance Force<br />
Joint Command (IJC) Communication and Information Systems (CIS). It identifies the IJC Communications Branch (CJ6) organisational<br />
structure and its roles and responsibilities. It examines the software applications that are used within the IJC and how<br />
these applications are integrated into the work environment. It also identifies procedures for the effective management of<br />
documents. 0.5 hour(s)<br />
Improvised Explosive Device Awareness Course J3OP-MN088 N,S, IP<br />
This course provides an introduction to improvised explosive devices (IED), including their role in warfare. It also provides an<br />
introduction to the types of IEDs, the enemy's tactics for each, and counter techniques. Additionally, it provides an introduction<br />
to the Patrol Leader's and EOD's security and responsibilities, what to prepare for EOD's arrival, and steps to take after the<br />
area has been declared clear. This is a controlled course and requires course manager approval. 2 hour(s)<br />
Improvised Explosive Devices (IED) Basics J3OP-MN900-04-01 N,S<br />
This course is part of a larger ISAF Curriculum. This lesson offers an awareness-level introduction and identification of Improvised<br />
Explosive Device (IED) threat and enemy Tactics, Techniques and Procedures (TTPs) in the International Security Assistance<br />
Force (ISAF) Area of Operations. 0.5 hour(s)<br />
Individual Diversity (EOA 2150) Course J1SN-US459-LB N<br />
This course provides learners with the concept of individual diversity that will broaden their awareness of diversity, and enable<br />
them to recognize that each individual is a unique and valued asset in the improvement of mission effectiveness. All course<br />
content is based upon identified DOD training requisites and associated educational requirements recognized in DOD references<br />
and associated academic standards, books, journals, and articles. 1 hour(s)<br />
Information Assurance (IA) Awareness Course J3OP-US250 N,S<br />
The purpose of this course is to help meet the FISMA and DoD 8570.01-M requirement that all DoD Information Systems (IS)<br />
users be provided training on computer and network security. FISMA and 8570 also require that completion of the training be<br />
tracked electronically; thus, the requirement is to host the existing training on a LMS accessible to all DoD IS users. The<br />
course provides details on social engineering, internet security, threats and vulnerabilities, malicious code, user roles and responsibilities,<br />
and personally identifiable information. 1 hour(s)<br />
Information Operations (IO) Fundamentals NNC-J6-DISA-0022-L N<br />
A DISA course that provides an overview of IO fundamentals and the military's need for information, how information operations<br />
(IO) helps achieve information superiority, and the vital role IO plays in Joint Force operations. 2 hour(s)<br />
Information Security J3ST-US815 N,S<br />
The purpose of this course is to provide JIEDDO new employees with an understanding of some of the basic security procedures<br />
that they should be made aware of. The procedures described within the course are not all encompassing and more<br />
detailed information should be found by the unit security office. 1 hour(s)<br />
Information Security and Foreign Disclosure STR-USAS27* N,S<br />
The purpose of this course is to provide students information on Information Security such as derivative classification guidelines<br />
and the process to approve release of information to partner nations. This course meets the requirements of the United