28.11.2012 Views

jko-catalog-sep-2012

jko-catalog-sep-2012

jko-catalog-sep-2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

* Indicates new courses added to the JKO LCMS after July 2011. The “*” is not a part of the actual course number.<br />

95<br />

JKO Course Descriptions<br />

8570.01-M, Information Assurance Improvement Program as Information Assurance Technicians (IAT) Levels I and II, as well<br />

as Information Assurance Managers (IAM) Level II. The subjects are Transmission Control Protocol (TCP) reset, Distributed<br />

Denial of Service (DDoS) attacks on routers, spoofing attacks, remote access/remote control, physical security review, and<br />

Simple Network Management Protocol, or SNMP. 1.5 hour(s)<br />

IED Defeat Force Wide Training J3OP-US306 N<br />

The purpose of this course is to provide Joint EOD forces with a self-development training tool for Improvised Explosive Device<br />

Disposal (IEDD) operations, which includes advanced diagnostics of IED components and clandestine labs, battle staff skills to<br />

improve joint integration with maneuver, a refresher on some traditional EOD tools, and finally a refresher on basic demolition<br />

procedures. 12 hour(s)<br />

IED Incident Management Procedures J3OP-MN900-04-03 N,S<br />

This course is part of a larger ISAF Curriculum. This lesson explains the management procedures that International Security<br />

Assistance Force (ISAF) forces need to apply during Improvised Explosive Device (IED) incident management and exploitation.<br />

0.5 hour(s)<br />

IJC Communications Information Systems (CIS) J3OP-MN900-03-10 N,S<br />

This course is part of a larger ISAF Curriculum. This lesson presents an overview of the International Security Assistance Force<br />

Joint Command (IJC) Communication and Information Systems (CIS). It identifies the IJC Communications Branch (CJ6) organisational<br />

structure and its roles and responsibilities. It examines the software applications that are used within the IJC and how<br />

these applications are integrated into the work environment. It also identifies procedures for the effective management of<br />

documents. 0.5 hour(s)<br />

Improvised Explosive Device Awareness Course J3OP-MN088 N,S, IP<br />

This course provides an introduction to improvised explosive devices (IED), including their role in warfare. It also provides an<br />

introduction to the types of IEDs, the enemy's tactics for each, and counter techniques. Additionally, it provides an introduction<br />

to the Patrol Leader's and EOD's security and responsibilities, what to prepare for EOD's arrival, and steps to take after the<br />

area has been declared clear. This is a controlled course and requires course manager approval. 2 hour(s)<br />

Improvised Explosive Devices (IED) Basics J3OP-MN900-04-01 N,S<br />

This course is part of a larger ISAF Curriculum. This lesson offers an awareness-level introduction and identification of Improvised<br />

Explosive Device (IED) threat and enemy Tactics, Techniques and Procedures (TTPs) in the International Security Assistance<br />

Force (ISAF) Area of Operations. 0.5 hour(s)<br />

Individual Diversity (EOA 2150) Course J1SN-US459-LB N<br />

This course provides learners with the concept of individual diversity that will broaden their awareness of diversity, and enable<br />

them to recognize that each individual is a unique and valued asset in the improvement of mission effectiveness. All course<br />

content is based upon identified DOD training requisites and associated educational requirements recognized in DOD references<br />

and associated academic standards, books, journals, and articles. 1 hour(s)<br />

Information Assurance (IA) Awareness Course J3OP-US250 N,S<br />

The purpose of this course is to help meet the FISMA and DoD 8570.01-M requirement that all DoD Information Systems (IS)<br />

users be provided training on computer and network security. FISMA and 8570 also require that completion of the training be<br />

tracked electronically; thus, the requirement is to host the existing training on a LMS accessible to all DoD IS users. The<br />

course provides details on social engineering, internet security, threats and vulnerabilities, malicious code, user roles and responsibilities,<br />

and personally identifiable information. 1 hour(s)<br />

Information Operations (IO) Fundamentals NNC-J6-DISA-0022-L N<br />

A DISA course that provides an overview of IO fundamentals and the military's need for information, how information operations<br />

(IO) helps achieve information superiority, and the vital role IO plays in Joint Force operations. 2 hour(s)<br />

Information Security J3ST-US815 N,S<br />

The purpose of this course is to provide JIEDDO new employees with an understanding of some of the basic security procedures<br />

that they should be made aware of. The procedures described within the course are not all encompassing and more<br />

detailed information should be found by the unit security office. 1 hour(s)<br />

Information Security and Foreign Disclosure STR-USAS27* N,S<br />

The purpose of this course is to provide students information on Information Security such as derivative classification guidelines<br />

and the process to approve release of information to partner nations. This course meets the requirements of the United

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!