This training is required for all personnel who work with or around Controlled Unclassified Information (CUI) on defense contracts. You will learn what CUI is, who is targeting it, and exactly what you must do — and not do — to protect it.
Each module ends with a 5-question quiz. You need 80% or higher to pass and unlock the next module. You may retry failed quizzes. A completion certificate is generated when all 8 modules are passed.
Before you can protect sensitive defense information, you need to understand what it is, what makes it valuable to adversaries, and why your role — regardless of job title — puts you in the middle of a national security equation.
Abstract threats do not change behavior. Specific, documented cases do. This module covers three confirmed breaches and one enforcement action that collectively demonstrate what happens when cybersecurity is treated as an IT department problem rather than everyone's responsibility.
The single most common initial access technique used against defense contractors is not a sophisticated technical exploit. It is an email. This module covers exactly how phishing and spearphishing attacks work, what APT5 — China's primary telecom and defense targeting unit — does specifically, and how you recognize and respond to an attack.
The F-35 program was compromised because a subcontractor never changed the default password "admin." The Stryker attack succeeded because a single administrator credential lacked multi-factor authentication. Credential security is not a technical topic — it is a daily behavior. This module covers what you need to do, and why each practice directly prevents a documented attack.
Knowing what CUI is matters less than knowing how to handle it correctly every day. This module covers the specific behaviors required for storing, transmitting, printing, and disposing of CUI — and the common mistakes that turn a routine workday into a security incident.
Not every threat to defense information comes from an outside attacker. Insiders — current or former employees, contractors, and business partners with authorized access — are responsible for a significant portion of defense data breaches. This module covers the indicators, the types, and the required reporting behaviors.
This module is required for all employees but is especially critical for senior officials, managers, and anyone who participates in or supports the company's CMMC compliance process. The False Claims Act creates personal liability that does not end when you leave the building.
A breach does not end when the attacker leaves your network. What happens in the hours and days after a breach — specifically whether you report it, how quickly, and to whom — determines the legal consequences for your organization and the ability of the government to protect other contractors from the same attack.
Laptop at a coffee shop. Phone syncing work email on the train. Home office connecting to the company network over residential Wi-Fi. Remote work is now the norm — and every one of those scenarios creates a potential gap in your organization's CMMC compliance boundary. This module covers the specific behaviors required when you work outside the office perimeter.
A single LinkedIn post, a photo from the shop floor, a tweet about a business trip — any of these can expose program information, reveal your employer's defense contracts, or hand adversaries intelligence they could not obtain any other way. This module covers exactly where the line is.
Cybersecurity controls protect your network. Physical security controls protect the space where that network lives — and where CUI is printed, discussed, and worked on every day. A determined adversary who can walk into your facility has bypassed every technical control you have implemented.
Unauthorized software, missed patches, and misconfigured systems are among the most common entry points for attackers into defense contractor networks. This module covers what you can and cannot install, why updates are mandatory not optional, and what shadow IT costs your organization.
Generative AI tools have become standard professional tools in months. Most defense contractors have no policy on them yet. The risk is real, it is happening today at organizations like yours, and it is the fastest-growing unaddressed CUI exposure in the defense supply chain. This module covers what you need to know right now.
This module satisfies your annual recertification requirement under NIST SP 800-171 Control 3.2. It covers the highest-risk topics from the full curriculum — the behaviors most commonly involved in defense contractor security incidents — refreshed with the latest documented cases and emerging threats.
Your name will appear on the completion certificate