Information technology specialist (military)

Information Technology Specialist or Information Systems Operator-Analyst is a Military Occupational Specialty (MOS) in the United States Army. Information Technology Specialists have the responsibility of maintaining, processing and troubleshooting military computer systems and operations.[1][2]

Coat of Arms for the 447th Signal Battalion, training unit for Information Technology Specialists

Training

Soldiers training to perform the duties of an Information Technology Specialists will attend the IT Specialists course at Fort Gordon, Georgia. Fort Gordon provides training for Initial Entry Training (IET) Soldiers, as well as Reclassifying Soldiers, from other Occupational Specialties, or Prior Service members. For training purposes, though all Soldiers in the course will receive the same training, they are separated as MOS-I for Initial Training, and MOS-T for re-class.

The Information Technology Specialists course is approximately 20 weeks long, and soldiers in training will be classed into one of the several phases during training. This is a continuation of the phases started in Army basic training, and all service members in training regardless of rank or time in service will participate.[3]

Required ASVAB Score(s)

Soldiers are required to have a minimum skilled technical (ST) score of 95 to attend the course.[4]

Phase 4

Phase IV (weeks 1 - 3 of AIT) begins with the first week of AIT and ends when the Soldier demonstrates proficiency to move up in phase. The first opportunity to phase-up will be provided at 15 days with subsequent opportunities provided weekly thereafter. Use, possession or purchase of alcohol is prohibited during all Phases except as religious sacrament.

In order for an MOS-I Soldier to move from Phase IV to Phase V privileges, the Soldier must pass Knowledge Exam, recite the Soldier’s Creed, sing their branch song and army song, and pass Class A, Wall Locker, and Room Inspections. Additionally, Soldiers must demonstrate proper discipline, pass all academic requirements, and pass their APFT with 60 points in each event.

Phase 5

Phase V (weeks 3-10 of AIT). Soldiers are authorized to wear civilian clothes, on-post pass privileges, Company Commanders can authorize extended weekend off-post pass privileges to Phase V Soldiers, however, members are subject to unit recall. Phase V Soldiers are allowed to use personal linen on their beds in accordance with policies established throughout each battalion.

Soldiers are not authorized to ride in a POV or rental car without Company Commander approval, and alcohol consumption by MOS-I Soldiers is prohibited

Married Soldiers in Phase V with PCS orders to Fort Gordon or Fort Meade may be authorized to live off-post or in GMH managed post housing, if the spouse and/or children are in the immediate area, and upon approval from their Battalion Commander.

In order for an MOS-I Soldier to move from Phase V to Phase V+ privileges the Soldier must recite the Soldier’s Creed, sing their branch song and the army song, and pass Class A, Wall Locker, and Room Inspections, complete the first level of the Structured Self Development course (SSD1)

Phase 5+

Phase V+ (weeks 11 through the end of AIT). Company Commanders may authorize the use of rental cars. Company Commanders may authorize Soldiers to purchase, register, and/or possess a privately owned vehicle (POV) once Soldiers complete 21 weeks of training. Since the training is no longer 22 weeks we are not authorized to have privately owned vehicles unless on a holiday block leaves such as Christmas. They also have other privileges

Course Information

The IT Specialist course at Fort Gordon is Advanced Individual Training (AIT) and is administered by the 15th Regimental Signal Brigade, 551st Signal Battalion. The course is designed to prepare soldiers by teaching them skills necessary to become proficient in identifying computer-user problems and resolution coordination, installing, configuring and monitoring local and wide-area networks, hardware and software, compiling, entering and processing information. Soldiers will also will be taught to provide customer and network administration services such as passwords, electronic mail accounts, security and troubleshooting, conducting data system studies, preparing documentation and specifications for proposals and assisting in the design, preparation, editing and testing of computer programs. The course syllabus is as follows:

  • A+ Hardware and Software (56 Hrs)

Provides the student with the necessary skills and knowledge to identify, install, configure, administer, and perform Unit Level Maintenance (ULM) on a microcomputer. This includes the installation and configuration of operating systems (OS) and virus software.

  • N+ Networking Essentials (48 Hrs)

Provides the student with necessary skills and knowledge to define data communications terms and network terminology, perform basic Network Administrator (NA) functions.

  • XP/OUTLOOK (24 Hrs)

Provides the student with the skills and knowledge to correctly install and configure Microsoft XP Professional, and establish user accounts. The skills to install, establish, and troubleshoot Outlook E-mail accounts.

  • AIS (IASO) (24 Hrs)

The Information Assurance (IA) brief presents information on IA as it applies to an Automated Information System (AIS) within the Department of Defense (DoD). Initial training is provided on recognizing vulnerabilities and potential threats within computer systems and networks.

  • Introduction to TCP/IP (24 Hrs)

Provides the student with skills and knowledge necessary to understand the capabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, correctly assign IP address according to host and network requirements, and create additional network addresses by subnetting IP addresses.

  • Introduction to Switches (24 Hrs)

Provides the student with skills and knowledge necessary to install, configure, and perform administrative functions on CISCO Catalyst Switch, and extend switched networks by utilizing Virtual Local Area Networks (VLANs).

  • Introduction to Routers (40 Hrs)

Provides the student with skills and knowledge necessary to install, configure, and perform administrative functions on CISCO Routers, and establish networks by utilizing IP addressing schemes, routing protocols, Inter-VLANs routing, and access-list.

  • Server/Exchange (56 Hrs)

Provides the student with skills and knowledge necessary to install and configure Microsoft Server 2003/Exchange Server, create a domain, join an existing domain, manage user and groups, establish user accounts, perform backup and restore, set permissions on files and folders, control assets, and configure Active Directory.

  • Introduction to UNIX (40 Hrs)

Provides the student with functional knowledge of the UNIX Operating System (OS) structure, and teaches UNIX commands to include syntax and optional parameters, and the use of the Screen Editor (VI). The students will acquire the basic skills and knowledge necessary to function as a UNIX System Administrator (SA).

  • Solaris System Administrator (40 Hrs)

Provides the student with skills and knowledge necessary to implement standard Solaris features to set file and directory permissions, add/delete user’s, groups, host, and printers, configure a Solaris Network, and manage multiple tasks on a Solaris-based system.

  • NETCOM (32 HRS)

Provides the student with the skills and knowledge to perform basic systems scans with Simple Network Management Protocol (SNMP), introduced in 1988, is the most widely used network management tool that provides management capability for TCP/IP-based networks. Then we include Voice over IP (VOIP) with Call Manager Express (CME) to give them an updated understanding of communications over the network they just set up and verified connectivity.

  • NET A/V (32 HRS)

Provides an introduction to RETINA and HERCULES, scanning network vulnerabilities for the student to better understand his role in network management. These scanners can look for security vulnerabilities within the system configuration policy on our CPUs. When all that is completed they now can monitor the network for any new devices added, or to maintain maximum capacity.

  • Advance Troubleshoot and Repair (32 Hrs)

Is an application of practical exercises in which the student will assemble, troubleshoot, and repair an automated information system (AIS), and demonstrate his/her knowledge on the basic procedures required to troubleshoot and repair basic networks and computers.

  • Introduction to FBCB2 (40 Hrs)

Provides an introduction to the Force XXI Battle Command Brigade and Below (FBCB2) battle command control system. The student is provided instruction on the functional operation of the FBCB2 system within the tactical network

  • Tactical Internet Management System (40 hrs)

Provides the student the ability to configure and monitor the network device and systems that comprise the Tactical Internet (TI) Network. Systems include the Internet Controller (INC), various Cisco Networking Devices, Enhanced Position Locator Reporting System (EPLRS), and Precision Lightweight Global Positioning System Receiver (PLGR).

  • Introduction to MCS (40 Hrs)

Provides an introduction to the operation of the Maneuver Control System (MCS) Automated Information System (AIS), and its role and functions in the support command and control systems of a maneuver unit tactical operations center (TOC).

  • Digital Tactical Operation Center (40 Hrs)

The DTOC annex provides the student with an operational overview of the Digital Tactical Operation Center (DTOC) and the associated network connectivity within the Army Battle Command System (ABCS).

  • M3 (Matrix Management Module)

The M3 annex is a culmination of practical applications, which emphasizes the critical task taught during the training of all annexes. The students are required to design a network based on the scenarios presented and equipment provided. The students must create and connect network devices, install and configure Microsoft Windows Operating Systems (Server, Exchange, and Client), install and configure Cisco Routers and Switches, and install, configure, and administer a Solaris and UNIX Operating System.

In addition, Soldiers will receive training to enable them to meet the DOD's 8570 certification IAT level 2 requirement by earning the Security+ Certification offered by the Computing Technology Industry Association (CompTIA), as well as the CIO G-6/NETCOM Information Assurance Technical Level 1 Certification.[5] The course includes the following modules:

CIO G-6/NETCOM Information Assurance Technical Level 1 Certification

  • Windows XP: Fundamentals
  • Encryption Technologies
  • Planning and Implementing an Active Directory Infrastructure
  • Microsoft Windows Server 2003: Network Infrastructure and Active Directory Physical Design
  • Implementing Active Directory Users and Groups
  • Planning and Implementing Group Policy
  • IP Addressing and Routing
  • Firewalls and VPNs
  • Intrusion Detection and Risk Management
  • TCP/IP

CIO/G-6 NETCOM Information Assurance Security+ 2008

  • CompTIA Security + 2008: Risk Analysis, Vulnerability Testing, IDS, and Forensics
  • CompTIA Security + 2008: Wi-Fi and Remote Access
  • CompTIA Security + 2008: Public Key Infrastructure and Access Security
  • CompTIA Security + 2008: Auditing, Security Policies, and Disaster Recovery
  • CompTIA Security + 2008: Messaging, User, and Role Security
  • CompTIA Security + 2008: Ports, Protocols, and Network Security
  • CompTIA Security + 2008: Threat Mitigation
  • CompTIA Security + 2008: Cryptography
  • CompTIA Security + 2008: Authentication Methods

See also

References

  1. Archived August 30, 2009, at the Wayback Machine
  2. "25B - Information Technology Specialist". Usmilitary.about.com. 2014-05-28. Retrieved 2014-07-15.
  3. Archived August 3, 2009, at the Wayback Machine
  4. "Information Technology Specialist Jobs (25B)". goarmy.com. Retrieved 2020-03-01.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.