public.cyber.mil Open in urlscan Pro
2600:1f18:177b:3801:2809:b47b:46c6:fc74  Public Scan

Submitted URL: http://public.cyber.mil/
Effective URL: https://public.cyber.mil/
Submission: On September 12 via manual from DE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

U.S. GOVERNMENT NOTICE AND CONSENT

You are accessing a U.S. Government (USG) Information System (IS) that is
provided for USG-authorized use only.

By using this IS (which includes any device attached to this IS), you consent to
the following conditions:

· The USG routinely intercepts and monitors communications on this IS for
purposes including, but not limited to, penetration testing, COMSEC monitoring,
network operations and defense, personnel misconduct (PM), law enforcement (LE),
and counterintelligence (CI) investigations.

· At any time, the USG may inspect and seize data stored on this IS.

· Communications using, or data stored on, this IS are not private, are subject
to routine monitoring, interception, and search, and may be disclosed or used
for any USG authorized purpose.

· This IS includes security measures (e.g., authentication and access controls)
to protect USG interests – not for your personal benefit or privacy.

Notwithstanding the above, using this IS does not constitute consent to PM, LE
or CI investigative searching or monitoring of the content of privileged
communications, or work product, related to personal representation or services
by attorneys, psychotherapists, or clergy, and their assistants. Such
communications and work product are private and confidential. See User Agreement
for details.

OK

Loading...
 * Search
 * Login with CAC


Menu
 * Topics
   
   
    * LIST OF TOPICS
   
    * * Cross Domain Enterprise Service (CDES)
      * Cyber Sam
      * Defense Collaboration Services (DCS)
    * * DevSecOps Operational Container Scanning
      * DoD Cloud Computing Security
      * DoD Cyber Scholarship Program (DoD CySP)
    * * DoD Workforce Innovation Directorate
      * Enterprise Connections
      * Identity and Access Management (IdAM)
      * National Centers of Academic Excellence in Cybersecurity (NCAE-C)
   
   Close
 * Training
   
   
    * CYBER EXCHANGE TRAINING
   
    * * Training Overview
      * Training Catalog
      * Cyber Awareness Challenge
      * Training Troubleshooting Guide
   
   Close
 * PKI/PKE
   
   
    * PUBLIC KEY INFRASTRUCTURE/ENABLING
   
    * * Public Key Infrastructure/Enabling (PKI/PKE)
      * External Certification Authorities (ECA)
   
   Close
 * SRGs/STIGs
 * Resources
   
   
    * LIST OF CYBER RESOURCES
   
    * * About the DoD Cyber Exchange
      * Approved Products List (APL)
      * Cybersecurity Acronyms
      * Cybersecurity Awareness Month Archives
    * * DoD Consent Banner with FAQ
      * External Resources
      * Policy and Guidance
   
   Close
 * Help
   
   
    * CYBER EXCHANGE HELP
   
    * * Email Directory
      * Frequently Asked Questions (FAQs)
   
   Close




 * THE 2023-2027 DOD CYBER WORKFORCE STRATEGY IMPLEMENTATION PLAN IS PUBLISHED!
   
   This Implementation Plan is strategically designed to be agile, flexible, and
   responsive, empowering the Department to effectively adapt and fulfill
   mission requirements within an ever-changing cyber domain.
   
   LEARN MORE


 * DOD CHIEF INFORMATION OFFICER RELEASES 2023-2027 CYBER WORKFORCE STRATEGY
   
   This strategy takes a proactive approach in setting unifying direction and
   guidance for the Department to foster a cyber workforce capable of adapting
   to the evolving needs, threats, and challenges of the cyber domain. It
   identifies the need for a cultural shift to reform the management of the
   Department’s most valuable asset: its people.
   
   Learn More


 * DOD 8140 MANUAL "CYBERSPACE WORKFORCE & QUALIFICATION MANAGEMENT PROGRAM"
   
   Publication of the long-awaited DoDM 8140.03 is here!
   The Manual completes the DoD 8140 policy series, which provides a targeted
   role-based approach to identify, develop, and qualify cyber workforce
   personnel by leveraging the DoD Cyber Workforce Framework.
   
   View 8140 Manual


 * CYBER AWARENESS CHALLENGE 2023 IS ONLINE!
   
   This annual refresh includes minor updates to the course technology for
   compatibility, 508 compliance and resources pages. Updates also include
   revised or new content covering areas such as customized scams, protecting
   government-furnished equipment at home, and indicators of a potential cyber
   incident. The pool of questions in the Knowledge Check option were also
   updated.
   
   Challenge 2023 Available Here

PreviousNext
1234


ANNOUNCEMENTS


View All Announcements


DISA RELEASES THE APPLE IOS/IPADOS 16 BYOAD SECURITY TECHNICAL IMPLEMENTATION
GUIDE

The Defense Information Systems Agency recently approved the Apple iOS/iPadOS 16
BYOAD Security Technical Implementation…
Available here

0 0 cyberx-sk cyberx-sk2023-09-08 17:29:382023-09-08 17:29:38DISA releases the
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide


DISA RELEASES THE RED HAT OPENSHIFT CONTAINER PLATFORM 4.12 SECURITY TECHNICAL
IMPLEMENTATION GUIDE

The Defense Information Systems Agency recently approved the Red Hat OpenShift
Container Platform 4.12 Security Technical…
Available here

0 0 cyberx-sk cyberx-sk2023-09-08 16:52:122023-09-08 16:52:12DISA releases the
Red Hat OpenShift Container Platform 4.12 Security Technical Implementation
Guide


REQUEST FOR COMMENTS - DISA RELEASES THE DRAFT CLOUD COMPUTING SRG V2 FOR REVIEW

The Defense Information Systems Agency recently released the draft Cloud
Computing Security Requirements Guide (SRG) Version…
Available here

0 0 Ciaran Salas Ciaran Salas2023-09-08 13:33:192023-09-08 13:33:19Request for
comments - DISA releases the draft Cloud Computing SRG V2 for review


EXTERNAL CERTIFICATION AUTHORITY PROGRAM (ECA)

The ECA program supports the issuance of DoD-approved certificates to industry
partners and other external entities and organizations. The ECA program is
designed to provide the mechanism for these entities to securely communicate
with the

Read more


DISA APPROVED PRODUCT LIST

The purpose of Department of Defense Information Network Approved Products List
(DODIN APL) is to maintain a single consolidated list of products that have
completed Interoperability (IO) and Cybersecurity certification. Use of the
DODIN

Read more
/by cyberx-dv


GET DOD CERTS

These zip files contain all the Certification Authority (CA) certificates for
the specified PKI in different formats.

Read more
/by cyberx-dv


ABOUT THE DOD CYBER EXCHANGE



The DoD Cyber Exchange provides one-stop access to cyber information, policy,
guidance and training for cyber professionals throughout the DoD, and the
general public. These resources are provided to enable the user to comply with
rules, regulations, best practices and federal laws. DISA is mandated to support
and sustain the DoD Cyber Exchange (formerly the Information Assurance Support
Environment (IASE)) as directed by DoDI 8500.01 and DODD 8140.01.

Learn More

Public

The DoD Cyber Exchange Public provides limited access to publicly releasable
cyber training and guidance to all Internet users.

NIPR

The DoD Cyber Exchange NIPR provides exclusive access to cyber training and
guidance to users with DoD Public Key Infrastructure (PKI) credentials (or
equivalent).

SIPR

The DoD Cyber Exchange SIPR provides access to cyber training and guidance to
users with a SIPRNet token.


TRAINING CATALOG



Explore our catalog of cyber security training developed by Cyber Security
experts: enroll in classroom courses and take training online.

Learn More


ONLINE
TRAINING




TRAINING
AIDS




CYBER AWARENESS
CHALLENGE




The DoD Cyber Exchange is sponsored by
Defense Information Systems Agency (DISA)

 * Training
 * SRGs/STIGs
 * PKI / PKE
 * External Resources

 * Privacy and Security
 * Section 508
 * Site Map

Login with CAC

Help


Scroll to top