About 6,340 results
Open links in new tab
  1. JKO LMS

    -Condition 1: The USG routinely intercepts and monitors communications on this ISInformation System for purposes including, but not limited to, penetration testing, COMSEC monitoring, network …

  2. Joint Staff JKO Training

    Online training products and services offered to DoD organizations for military and civilian individual and staff training.

  3. About Joint Knowledge Online JKO Training Education

    JKO primary mission is to provide the joint force with access to world-class joint training and education. This includes ensuring our partners get the right content, in the right format, delivered in the right …

  4. Joint Knowledge Online - JKO LCMS

    Joint Knowledge Online (JKO) LCMS provides military and government personnel with online training and resources for professional development.

  5. DS Logon - DMDC

    Identity Management is DS Logon's secure, self-service logon ID created by the Defense Manpower Data Center (DMDC) as an enterprise identity credential that allows individuals affiliated with the …

  6. The Joint Knowledge Online (JKO) Learning Management System (LMS) requires Users have a JKO account to take advantage of the capabilities in the LMS. Once you have a JKO account, you may …

  7. Joint Knowledge Online - JKO LCMS

    JKO LCMS provides online training resources for military and civilian personnel, supporting individual and staff training needs within the Department of Defense.

  8. Joint Knowledge Online

    The intended audience for this course is a new JKO user, and users requiring a refresher on the LCMS. Expected course duration is 10 minutes. This course is UNCLASSIFIED.

  9. Joint Knowledge Online - JKO LCMS

    SEJPME-US001 Senior Enlisted Joint Professional Military Education (SEJPME) I Course - (40 hrs) The SEJPME Course is a stand-alone, 100% online, web-based course that uses multi-media instruction. …

  10. Joint Knowledge Online - JKO LCMS

    Students will be provided with a basic understanding of the legal and regulatory basis for the program, how the program is implemented throughout the DoD and an introduction to the Information Security …