Training Troubleshooting Guide – DoD Cyber Exchange (2024)

What are the system requirements for Cyber Awareness Challenge?

The technologies listed below, including operating systems and browsers, represent what the current course was built to and tested against. Upward compatibility is assumed, however, not guaranteed. Courseware solutions integrate many technologies and software from different vendors over which we do not have control.

To meet technical functionality requirements, this awareness product was developed to function with the following Windows and Mac operating systems when configured properly:

    • Operating Systems: Windows 10
    • Operating Systems: macOS 13.3 Ventura

and using the following browsers:

    • Internet Browser: Edge 116
    • Internet Browser: Chrome 116
    • Internet Browser: Firefox 117
    • Internet Browser: Safari 16.5

Operating System: Red Hat Enterprise Linux 7.5 using the following browser:
Internet Browser: Firefox 117

Mobile environments: Samsung Galaxy Tab A7 running Android 11 using the following browser:
Internet Browser: Google Chrome 116 browser

Using another operating system or web browser is not recommended as users may not be able to complete the training or save the certificate of completion.

      • Security: JavaScript enabled
      • Accessibility Software: JAWS 2021
      • Display: Minimum 1024 x 768 resolution with 32-bit color
      • Audio: Speakers or headphones required
      • PDF Viewer: Adobe Acrobat Reader 10.0

What are my options for accessing and completing this course?

  • Online:Click Here

I have completed the Cyber Awareness Challenge training, but I am not able to print out a completion certificate.

  • Verify that you have completed the course. You will not be prompted to save your certificate until you successfully complete all modules available. Check your browser’s default download folder.
  • Cyber Awareness Challenge is enabled to allow the user to save their certificate on their local system or network. At the conclusion of the course, when presented with the Certificate of Completion, enter your name and click “Save Certificate”. You will then be able to save the certificate as a Portable Document Format (PDF). To do this, a PDF viewer is required to be installed on the user’s machine.
  • You MUST save your certificate when prompted. If you do not save the certificate on the screen when prompted to, you may need to re-take the course. The policy for being provided a certificate after unsuccessfully saving or printing a certificate vary based on the website you are taking the course from. For helpdesk assistance,click here.

I launched the Cyber Awareness Challenge training and it is taking forever to load.

There are many possible causes of this experience. Most commonly, the issue is being being experienced due to low bandwidth or a slow connection. Consider closing non-essential applications if problems are encountered, closing and restarting your browser, turning off your vpn connection or choosing a different browser to take the course.

One possible solution to consider is when launching the Cyber Awareness Challenge, it offers an option to select playing the course with high quality videos, where a high-speed Internet connection is available. Another option available is to choose videos optimized for low-bandwidth conditions. Choosing the low-bandwidth option may resolve the issue.

If this does not resolve your issue, it is recommended to contact your local helpdesk support to troubleshoot network related issues.

I am unable to continue my training from where I left off. What can I do?

When a user attempts Cyber Awareness Challenge for the first time, the launch page will offer a single option to “Start New Session”. The other option displayed, “Continue Existing Session”, will initially be grayed out and unavailable for selection. When a user starts the course with a supported and properly configured system and browser, a session cookie is placed on the user’s computer. This session cookie will track the individual’s progress through the course and allow pausing and returning to the course at the same location at a later time as long as the cookie is not deleted. When this option is chosen, the user will be able to select “Continue Existing Session”. Keep in mind some systems are configured to delete cookies when the browser is closed or for other reasons. If the cookie is deleted, the user will have to retake the course from the beginning.

What do I do if I have tried all of these steps, and I am still having issues with the training?

Verify the website address where you are taking the training from and then click the applicable website below:

  • cs.signal.army.mil
  • ia.signal.army.mil
  • twms.navy.mil
  • AF myLearning
  • cyber.mil
  • If you are taking training from a website not listed above, please contact your local helpdesk for assistance.

How does the Cyber Awareness Challenge training meet Section 508 accessibility requirements?

Section 508 of the Rehabilitation Act of 1973, as amended (29 U.S.C. § 794d) requires Federal departments and agencies to provide people with disabilities equal access to Federal electronic and information technology. The Information and Communications Technology (ICT) Final Standards and Guidelines (36 CFR Parts 1193 and 1194), effective as of 18 January 2018, addresses accessibility requirements covered by Section 508. The functional performance criteria (36 CFR Part 1194, Appendix C) require that information and communication technology provide

At least one mode of operation for individuals who have:

  • Sight impairment, including no vision, limited vision, and no perception of color (302.1-3)
  • Hearing impairment, including no hearing and limited hearing (302.4-5)
  • Speech impairment, including no speech (302.6)
  • Mobility impairment, including limited manipulation and limited reach and strength (302.7-8)
  • Features that make use simpler and easier for individuals with limited cognitive, language, and learning abilities (302.9)

DISA is proud to offer online training that is accessible to everyone, including individuals with disabilities. DISA tested this course for conformance with Level A and Level AA success criteria defined by the Web Content Accessibility Guidelines (WCAG) 2.0 (36 CFR Part 1194, Appendix A, E205.4), as well as compatibility with the popular screen reader JAWS. This course also offers several additional functions that offer alternative access to onscreen content.

All onscreen controls can be accessed without a mouse. To navigate the course without a mouse, use the Tab key on your keyboard to cycle through the interactive controls. If you are using a screen reader, you can read through all of the content, including interactive buttons, using the arrow keys. To activate a user control, use the space bar or the Enter key.

Audio descriptions of video and animated elements on screen are integrated into the main audio track where the narration is not otherwise sufficient to describe them. To access audio descriptions, select the AD button on the toolbar.

Audio can be read either through synchronized closed captioning or through a transcript of all the audio on a screen, contained within a pop-up browser window. To turn on closed captioning, select the CC button on the toolbar. To access a transcript of the current screen’s audio, select the Transcript button on the toolbar.

Speech is not required for this course.

This course offers flexibility to suit individual learning needs and styles. The course communicates information via auditory, visual, and written means. The course’s accessibility functions may also be used to transform auditory communication into written communication via closed captioning or the transcript, and to transform visual communication into auditory communication via the audio descriptions and/or a screen reader. In addition, the course is self-paced, allowing the opportunity to pause, review, and repeat information for as long as necessary to ensure understanding.

What system specifications are courses designed and tested to?

The technologies listed below, including operating systems and browsers, represent what the current course was built to and tested against. Using another operating system or web browser is not recommended as users may not be able to complete the training or save the certificate of completion. Upward compatibility is assumed, however, not guaranteed. Courseware solutions integrate many technologies and software from different vendors over which we do not have control.

  • Operating Systems: Red Hat Enterprise Linux 7.5, using Firefox 117
  • Operating Systems: Microsoft Windows 10
  • Operating Systems: macOS 13.3 Ventura

(when configured correctly) Using:

  • Internet Browsers: Mozilla Firefox 117
  • Internet Browsers: Google Chrome 116
  • Internet Browsers: Microsoft Edge 116
  • Internet Browsers: Safari 16.5
  • Mobile environments (Apple iPad (8th Generation): iOS 16.6 – Safari 16
  • Mobile environments (Samsung Galaxy Tab A7): Android 11 – Google Chrome 116
  • Security: JavaScript enabled
  • Accessibility Software: JAWS 2021
  • Display: Minimum 1024 x 768 resolution with 32-bit color
  • Audio: Speakers or headphones required
  • PDF Viewer: Adobe Acrobat Reader 10.0

What are my options for completing courses?

  • Online viaTraining Catalog – Click Launch Training after selecting an online training course.

I have completed the online training; but I cannot print out a completion certificate.

Some of the training products require you to review all the screen and pop-ups in order to receive the completion certificate. When the information on each screen is reviewed completely, you will have the arrow circled or flashing forward arrow indication to go to the next screen.

If you are still not able to print a completion certificate after reviewing all the screens and pop-ups, make sure your cookies settings is configured correctly by performing the following steps:

Microsoft Edge

  1. From your browser, open Settings
  2. Select Privacy, search, and services
  3. Expand the section Manage and delete cookies and site data
  4. Ensure Allow sites to save and read cookie data is enabled
  5. In the Allow section, add the DoD Cyber Exchange URL *.cyber.mil
  6. If you are not permitted to make these option changes, contact your local information technology (IT) support

Google Chrome

  1. From your browser, open Settings
  2. Select Privacy, search, and security
  3. Ensure Allow all cookies is selected
  4. In the Sites that can always use cookies section, add the DoD Cyber Exchange URL *.cyber.mil
  5. If you are not permitted to make these option changes, contact your local information technology (IT) support
Training Troubleshooting Guide – DoD Cyber Exchange (2024)

FAQs

What are the DoD guidelines for cyber security? ›

Safe desktop

Use separate computer accounts for each user. Use passwords and do not share. Create strong passwords – no names, birthdates, or personal information – and change every three to six months. Use screen locking, log on and off, and power down your system at the end of the day.

Can I do cyber awareness training without CAC? ›

The IA training course, DOD Information Assurance Awareness, is available on the Defense Information Systems Agency (DISA) website without the need of a Common Access Card (CAC). Validation of training completion is required in order for in-processing to proceed.

How do I train my employees for cyber security? ›

Cybersecurity training best practices for employees
  1. Make following protocol a priority. ...
  2. Have policies in place that keep sensitive data safe. ...
  3. Teach employees about cyber threats and accountability. ...
  4. Create strong passwords and change them regularly. ...
  5. Enforce policies around payment cards. ...
  6. Require backup of all important data.

How do I get my cyber awareness certificate from the army? ›

The “Verify Training” button must be clicked at the end of the training session to generate the Cyber Awareness Training completion certificate. Individuals will need to restart the Cyber Awareness training if the continue session is greyed out.

What are the 5 D's of cyber security? ›

The 5 Ds of perimeter security (Deter, Detect, Deny, Delay, Defend) work on the 'onion skin' principle, whereby multiple layers of security work together to prevent access to your site's assets, giving you the time and intelligence you need to respond effectively.

What is the DoD scorecard for cyber security? ›

The scorecard delivers instant visibility of critical cyber security policy violations. It encompasses vital security areas such as software patches, compliance, privileged users, and more as required by the DoD CIO.

How often is cyber awareness training required? ›

PCI-DSS12. 6 requires that organizations implement a formal security awareness training program to make all personnel aware of the importance of cardholder data security. Personnel must be trained upon hire and at least annually.

How do I become CMMC compliant? ›

CMMC draws from NIST standards, categorizes compliance into three maturity levels, and mandates third-party assessments. Compliance Checklist: Assess desired maturity level, conduct self-assessment, leverage existing frameworks, create a POA&M and SSP, select a C3PAO, and set a timeline and budget.

Is C necessary for cyber security? ›

It is commonly accepted that most malware is written in the C/C++ programming languages and they are, therefore, an essential skill for cybersecurity professionals to possess.

What type of training is required for cyber security? ›

A mid-level cybersecurity professional, for example, needs a bachelor's degree in cybersecurity. Advanced technical specialists and cybersecurity managers often possess master's degrees. Research and teaching careers may require a candidate to possess a doctorate.

How can I get cybersecurity training for free? ›

6 free online cybersecurity courses
  1. ISC2 Certified in Cybersecurity Online Self-Paced. ...
  2. Ethical Hacking Essentials (EHE) ...
  3. CompTIA Security+ (SYO-601) ...
  4. Introduction to CyberOps. ...
  5. Introduction to CISSP Security Assessment and Testing and Security Operations. ...
  6. Network And Computer Security.
Feb 15, 2024

How to create a cybersecurity awareness training program? ›

What should a successful cyber security awareness program address?
  1. Identify Risks. The first step in creating an effective cyber security awareness program is evaluating the threat landscape and identifying your top risks. ...
  2. Change Behaviour. ...
  3. Schedule Delivery of Training. ...
  4. Test Effectiveness of Training. ...
  5. Track Metrics.

Is a cyber defense certificate worth it? ›

* “They validate your skills and provide a standardized benchmark that employers can use to assess candidates … So, while not strictly required, cybersecurity certifications are highly beneficial and often essential for a successful and competitive career.”

What is DOD IA training? ›

Certification in Information Assurance (IA) is a mandatory requirement for security personnel with privileged access to monitoring, system control and administration functions. This aimed at providing effective security safeguards to data and user authentication mechanisms.

How long does cyber security awareness training take? ›

The cybersecurity awareness training may take up to 30 minutes. It is recommended that users complete the training in one sitting. The training will be available to be revisited by the user once completed.

What are guidelines in cyber security? ›

Using strong passwords, updating your software, thinking before you click on suspicious links, and turning on multi-factor authentication are the basics of what we call “cyber hygiene” and will drastically improve your online safety.

What is the ISO guidelines for cybersecurity? ›

ISO standards for cybersecurity, including ISO 27001, ISO 27002, and ISO 27005, provide comprehensive frameworks for safeguarding critical information assets and establishing robust security measures.

What are the three main federal cybersecurity regulations? ›

The three main cybersecurity regulations are the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act, which included the Federal Information Security Management Act (FISMA).

What is the DoD security classification guide? ›

The preferred method for communicating an original classification decision is through a security classification guide, or SCG. An SCG is a collection of precise decisions and comprehensive guidance regarding a specific system, plan, program, mission, or project.

References

Top Articles
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 6141

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.