REMINDER: UNCLASS/FOUO AND CUI ARE NOT AUTHORIZED ON THIS SITE





Program Design

The design of a SETA program must be tied directly to existing security program directives and established security policy. It must also be designed with the Command's mission in mind and should be focused on the organization's entire security population.

Key questions in determining SETA needs are:
  • What awareness, training, and/or education are needed? What is required?
  • What is currently being done to meet these needs?
  • Where are the gaps between the needs and what is being done? What additional steps need to be taken to fill these gaps?
  • Which needs are most critical?
Once the needs are determined, a program can be molded to fit and suffice those needs. During the development of a SETA program, the following elements should also be referenced:

  • Existing authorities that regulate the establishment of a SETA program
  • Scope of the awareness and training program
  • Roles and responsibilities of agency personnel who should design, develop, implement, and maintain the SETA program, and who should ensure personnel participation
  • Target audiences
  • Mandatory courses or material for each target audience (optional)
  • Learning objectives for each aspect of the program
  • Deployment methods to be used
  • Documentation, feedback, and evidence of learning
  • Evaluation and update of training material
  • Frequency that each target audience should be exposed to material (i.e. in-processing, annually, etc.)
The SETA program should consist of three different parts; 1) education; 2) training; and 3) awareness. The difference between training and awareness is that training teaches skills that allow a person to perform a specific function, while awareness focuses an individual's attention on an issue or set of issues (i.e. reporting requirements). The skills acquired during training are built upon the foundation of security awareness and are taken to the next level through security education. Security education incorporates all of the security skills and competencies of the various functional specialties into a common body of knowledge .





















                                             Contact us with comments, questions & feedback
Accessibility/Section 508