<Links>
	<Link linkType="CourseMap">
		<DisplayName>Course Introduction</DisplayName>
		<URL>../introduction/module.htm</URL>
		<Name>introduction</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Course Overview</Topic>
			<Topic firstPageIdx="2">Course Objectives</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Importance of Information Assurance</DisplayName>
		<URL>../importance/module.htm</URL>
		<Name>importance</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">IA Overview</Topic>
			<Topic firstPageIdx="3">Evolution of IA</Topic>
			<Topic firstPageIdx="4">DISN</Topic>
			<Topic firstPageIdx="5">Policy and Law</Topic>
			<Topic firstPageIdx="7">Critical Infrastructure Protection (CIP)</Topic>
			<Topic firstPageIdx="9">Summary and Review</Topic>
			<Topic firstPageIdx="10">Check Your Understanding</Topic>
			<Topic firstPageIdx="12">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Threats to Information Assurance</DisplayName>
		<URL>../threats/module.htm</URL>
		<Name>threats</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">Threats and Vulnerabilities</Topic>
			<Topic firstPageIdx="4">Social Engineering</Topic>
			<Topic firstPageIdx="7">Internet Security</Topic>
			<Topic firstPageIdx="11">Summary and Review</Topic>
			<Topic firstPageIdx="12">Check Your Understanding</Topic>
			<Topic firstPageIdx="14">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Malicious Code</DisplayName>
		<URL>../malicious_code/module.htm</URL>
		<Name>malicious_code</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">Malicious Code Overview</Topic>
			<Topic firstPageIdx="3">Protecting Your System</Topic>
			<Topic firstPageIdx="5">Understanding Internet Hoaxes</Topic>
			<Topic firstPageIdx="7">Summary and Review</Topic>
			<Topic firstPageIdx="8">Check Your Understanding</Topic>
			<Topic firstPageIdx="10">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>User Roles</DisplayName>
		<URL>../user_roles/module.htm</URL>
		<Name>user_roles</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">Protecting DoD Systems</Topic>
			<Topic firstPageIdx="6">Protecting DoD Information</Topic>
			<Topic firstPageIdx="15">Summary and Review</Topic>
			<Topic firstPageIdx="16">Check Your Understanding</Topic>
			<Topic firstPageIdx="19">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Personal and Home Computer Security</DisplayName>
		<URL>../pers_computer_sec/module.htm</URL>
		<Name>pers_computer_sec</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">Online Transactions</Topic>
			<Topic firstPageIdx="4">Security Tips</Topic>
			<Topic firstPageIdx="6">Summary and Review</Topic>
			<Topic firstPageIdx="7">Check Your Understanding</Topic>
			<Topic firstPageIdx="9">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Publications</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Joint Doctrine</DisplayName>
		<URL>http://www.dtic.mil/doctrine/index.html</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Joint Publications</DisplayName>
		<URL>http://www.dtic.mil/doctrine/jel/jointpub.htm</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>The Committee on National Security Systems (CNSS), formerly the National Security Telecommunications and Information Systems Security Committee (NSTISSC), Issuances:</DisplayName>
<!--		<URL>http://www.nstissc.gov/html/library.html</URL> -->
	<URL>http://www.google.com</URL>

		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DISA Information Assurance (IA) Training Products:</DisplayName>
		<URL>http://iase.disa.mil</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>GSA Information Technology Policy Documents:</DisplayName>
		<URL>http://www.gsa.gov/Portal/gsa/ep/home.do?tabld=0</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>National Security Agency/Central Security Service (NSA/CSS) INFOSEC:</DisplayName>
		<URL>http://www.nsa.gov/isso/index.html</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>National Institute of Standards and Technology (NIST) Publications:</DisplayName>
		<URL>http://www.nist.gov/public_affairs/pubs.htm</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>NIST Computer Security Resource Center (CSRC):</DisplayName>
		<URL>http://csrc.nist.gov/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>National Information Assurance Partnership (NIAP):</DisplayName>
		<URL>http://niap.nist.gov/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Common Criteria (CC):</DisplayName>
		<URL>http://www.commoncriteria.org/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Presidential Decision Directive (PDD) 63:</DisplayName>
		<URL>http://www.fas.org/irp/offdocs/pdd-63.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>PDD 63 White Paper:</DisplayName>
		<URL>http://www.fas.org/irp/offdocs/paper598.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>OMB Circular No. A-130:</DisplayName>
		<URL>http://www.whitehouse.gov/omb/circulars/a130/a130.html </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Public Law 100-235 (Computer Security Act of 1987):</DisplayName>
		<URL>http://csrc.nist.gov/secplcy/csa_87.txt </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Clinger-Cohen Act:</DisplayName>
		<URL>http://wwwoirm.nih.gov/policy/itmra.html </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Federal Information Security Management Act (FISMA):</DisplayName>
		<URL>http://www.fedcirc.gov/library/legislation/FISMA.html </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Joint Publication 3-13, Joint Doctrine for Information Operations, 9 October 1998:</DisplayName>
		<URL>http://www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Directive 5000.1, The Defense Acquisition System, 12 May 2003:</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/html/50001.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Instruction 5000.2, Operation of the Defense Acquisition System, 12 May 2003:</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/html/50002.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Directive 8500.1, Information Assurance (IA), 24 October 2002:</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/html/85001.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Directive 8500.2, Information Assurance (IA) Implementation, 6 February 2003:</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/html/85002.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Instruction 5200.40, DoD Information Technology Security Certification and Accreditation Process (DITSCAP), 30 December 1997:</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/html/520040.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Manual 8510.1-M, DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Application Manual, 31 July 2000:</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/html/85101m.htm </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>NSTISSI No. 1000, National Information Assurance Certification and Accreditation Process (NIACAP), April 2000:</DisplayName>
		<URL>http://www.nstissc.gov/Assets/pdf/nstissi_1000.pdf </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>NSTISSI No. 4015, National Training Standard for System Certifiers, December 2000:</DisplayName>
		<URL>http://www.nstissc.gov/Assets/pdf/nstissi_4015.pdf </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms, 12 April 2001 (As Amended Through 5 September 2003):</DisplayName>
		<URL>http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>CNSS Instruction No. 4009, National Information Assurance (IA) Glossary, May 2003:</DisplayName>
		<URL>http://www.nstissc.gov/Assets/pdf/4009.pdf </URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	<Link linkType="ExtResp">
		<DisplayName>DoD Directive 8100.2, Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG):</DisplayName>
		<URL>http://www.dtic.mil/whs/directives/corres/pdf/d81002_041404/d81002p.pdf</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
</Links>

