public.cyber.mil
Open in
urlscan Pro
2600:1f18:177b:3801:2809:b47b:46c6:fc74
Public Scan
Submitted URL: http://public.cyber.mil/
Effective URL: https://public.cyber.mil/
Submission: On September 12 via manual from DE — Scanned from DE
Effective URL: https://public.cyber.mil/
Submission: On September 12 via manual from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
U.S. GOVERNMENT NOTICE AND CONSENT You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: · The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. · At any time, the USG may inspect and seize data stored on this IS. · Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. · This IS includes security measures (e.g., authentication and access controls) to protect USG interests – not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. OK Loading... * Search * Login with CAC Menu * Topics * LIST OF TOPICS * * Cross Domain Enterprise Service (CDES) * Cyber Sam * Defense Collaboration Services (DCS) * * DevSecOps Operational Container Scanning * DoD Cloud Computing Security * DoD Cyber Scholarship Program (DoD CySP) * * DoD Workforce Innovation Directorate * Enterprise Connections * Identity and Access Management (IdAM) * National Centers of Academic Excellence in Cybersecurity (NCAE-C) Close * Training * CYBER EXCHANGE TRAINING * * Training Overview * Training Catalog * Cyber Awareness Challenge * Training Troubleshooting Guide Close * PKI/PKE * PUBLIC KEY INFRASTRUCTURE/ENABLING * * Public Key Infrastructure/Enabling (PKI/PKE) * External Certification Authorities (ECA) Close * SRGs/STIGs * Resources * LIST OF CYBER RESOURCES * * About the DoD Cyber Exchange * Approved Products List (APL) * Cybersecurity Acronyms * Cybersecurity Awareness Month Archives * * DoD Consent Banner with FAQ * External Resources * Policy and Guidance Close * Help * CYBER EXCHANGE HELP * * Email Directory * Frequently Asked Questions (FAQs) Close * THE 2023-2027 DOD CYBER WORKFORCE STRATEGY IMPLEMENTATION PLAN IS PUBLISHED! This Implementation Plan is strategically designed to be agile, flexible, and responsive, empowering the Department to effectively adapt and fulfill mission requirements within an ever-changing cyber domain. LEARN MORE * DOD CHIEF INFORMATION OFFICER RELEASES 2023-2027 CYBER WORKFORCE STRATEGY This strategy takes a proactive approach in setting unifying direction and guidance for the Department to foster a cyber workforce capable of adapting to the evolving needs, threats, and challenges of the cyber domain. It identifies the need for a cultural shift to reform the management of the Department’s most valuable asset: its people. Learn More * DOD 8140 MANUAL "CYBERSPACE WORKFORCE & QUALIFICATION MANAGEMENT PROGRAM" Publication of the long-awaited DoDM 8140.03 is here! The Manual completes the DoD 8140 policy series, which provides a targeted role-based approach to identify, develop, and qualify cyber workforce personnel by leveraging the DoD Cyber Workforce Framework. View 8140 Manual * CYBER AWARENESS CHALLENGE 2023 IS ONLINE! This annual refresh includes minor updates to the course technology for compatibility, 508 compliance and resources pages. Updates also include revised or new content covering areas such as customized scams, protecting government-furnished equipment at home, and indicators of a potential cyber incident. The pool of questions in the Knowledge Check option were also updated. Challenge 2023 Available Here PreviousNext 1234 ANNOUNCEMENTS View All Announcements DISA RELEASES THE APPLE IOS/IPADOS 16 BYOAD SECURITY TECHNICAL IMPLEMENTATION GUIDE The Defense Information Systems Agency recently approved the Apple iOS/iPadOS 16 BYOAD Security Technical Implementation… Available here 0 0 cyberx-sk cyberx-sk2023-09-08 17:29:382023-09-08 17:29:38DISA releases the Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide DISA RELEASES THE RED HAT OPENSHIFT CONTAINER PLATFORM 4.12 SECURITY TECHNICAL IMPLEMENTATION GUIDE The Defense Information Systems Agency recently approved the Red Hat OpenShift Container Platform 4.12 Security Technical… Available here 0 0 cyberx-sk cyberx-sk2023-09-08 16:52:122023-09-08 16:52:12DISA releases the Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide REQUEST FOR COMMENTS - DISA RELEASES THE DRAFT CLOUD COMPUTING SRG V2 FOR REVIEW The Defense Information Systems Agency recently released the draft Cloud Computing Security Requirements Guide (SRG) Version… Available here 0 0 Ciaran Salas Ciaran Salas2023-09-08 13:33:192023-09-08 13:33:19Request for comments - DISA releases the draft Cloud Computing SRG V2 for review EXTERNAL CERTIFICATION AUTHORITY PROGRAM (ECA) The ECA program supports the issuance of DoD-approved certificates to industry partners and other external entities and organizations. The ECA program is designed to provide the mechanism for these entities to securely communicate with the Read more DISA APPROVED PRODUCT LIST The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification. Use of the DODIN Read more /by cyberx-dv GET DOD CERTS These zip files contain all the Certification Authority (CA) certificates for the specified PKI in different formats. Read more /by cyberx-dv ABOUT THE DOD CYBER EXCHANGE The DoD Cyber Exchange provides one-stop access to cyber information, policy, guidance and training for cyber professionals throughout the DoD, and the general public. These resources are provided to enable the user to comply with rules, regulations, best practices and federal laws. DISA is mandated to support and sustain the DoD Cyber Exchange (formerly the Information Assurance Support Environment (IASE)) as directed by DoDI 8500.01 and DODD 8140.01. Learn More Public The DoD Cyber Exchange Public provides limited access to publicly releasable cyber training and guidance to all Internet users. NIPR The DoD Cyber Exchange NIPR provides exclusive access to cyber training and guidance to users with DoD Public Key Infrastructure (PKI) credentials (or equivalent). SIPR The DoD Cyber Exchange SIPR provides access to cyber training and guidance to users with a SIPRNet token. TRAINING CATALOG Explore our catalog of cyber security training developed by Cyber Security experts: enroll in classroom courses and take training online. Learn More ONLINE TRAINING TRAINING AIDS CYBER AWARENESS CHALLENGE The DoD Cyber Exchange is sponsored by Defense Information Systems Agency (DISA) * Training * SRGs/STIGs * PKI / PKE * External Resources * Privacy and Security * Section 508 * Site Map Login with CAC Help Scroll to top