Digital crime by an anonymous hacker

Research Security Training

The U.S. National Science Foundation, in partnership with the National Institutes of Health, the Department of Energy and the Department of Defense, is sharing online research security training for the research community. 

This training provides recipients of federal research funding with information on risks and threats to the global research ecosystem — and the knowledge and tools necessary to protect against these risks.

Take the research security training

Take the training directly from your browser. Visit the four training modules at the links below.

  • Each module should take about 60 minutes to complete.
  • You can leave a module and return without losing progress from this browser.
  • When you complete the module, you can download or print a completion certificate, but the module will not save a record of your training.

Module 1: What is Research Security?

Learn key concepts of research security and how to recognize situations that may indicate undue foreign influence. Understand the regulatory landscape that shapes research security and discover what you can do to safeguard the core values that underpin U.S. academic research.

Module 2: Disclosure

Learn about federal funding agency disclosure requirements, including types of information that must be disclosed, how that information is used, and why such disclosures are fundamental to safeguarding the U.S. research enterprise from foreign government interference and exploitation. 

Module 3: Manage and Mitigate Risk

Learn to identify types of international collaborative research and professional activities, associated potential risks, and strategies and best practices for managing and mitigating such risk. Learner experience will be customized based on their role as either a researcher or administrator.

Module 4: International Collaboration

Learn about the role of principled international collaboration in U.S. science, innovation and economic competitiveness. Discover how to balance principled international collaboration with research security concerns, as well as how to foster an open, welcoming research environment that fulfills research security needs.

Deploy your own instance of the training

If you would like to download these modules for your organization to use, you have two options:

  1. LMS/SCORM: Download the LMS/SCORM file for use in your organization's learning management system. The files are compiled as SCORM 1.2. 
  2. Storyline Source File: Most of our online lessons are built in Articulate 360. Download the .story file if you would like to edit or modify the lessons in Storyline.
TitleSource files
Module 1:
What is Research Security?
  1. LMS/SCORM
  2. Storyline Source File
  3. Transcript (DOC, 102.5 KB)
Module 2:
Disclosure
  1. LMS/SCORM
  2. Storyline Source File
  3. Transcript (DOCX, 52.13 KB)
Module 3:
Manage and Mitigate Risk
  1. LMS/SCORM
  2. Storyline Source File
  3. Transcript (DOC, 62 KB)
Module 4:
International Collaboration
  1. LMS/SCORM
  2. Storyline Source File
  3. Transcript (DOC, 206 KB)

About the training module design

The design of the training modules reflects research-based best practices in multimedia instructional design and adult learning. Design teams drew on a number of resources and frameworks in considering how to foster long-term, meaningful learning in a short-duration training module. These resources and frameworks include:

Frequently asked questions

Contact us

If you need assistance or have any inquiries, please submit a request through our support portal (link is external) .

These materials were developed with support from NSF cooperative agreements OIA-2230557 (The University of Alabama in Huntsville), OIA-2230530 (The Texas A&M University System), OIA-2230535 (University of Pennsylvania), and OIA-2230538 (Associated Universities, Inc. and AUI Labs). Cooperative agreements were supported by funding from NSF, the National Institutes of Health, the Department of Energy and the Department of Defense.