Information technology specialist
Encyclopedia
Information Technology Specialist or lnformation Systems Operator-Analyst is a Military Occupational Specialty (MOS) in the United States Army
United States Army
The United States Army is the main branch of the United States Armed Forces responsible for land-based military operations. It is the largest and oldest established branch of the U.S. military, and is one of seven U.S. uniformed services...

. Information Technology Specialists have the responsibility of maintaining, processing and troubleshooting military computer systems and operations.

Training

Soldiers training to perform the duties of an Information Technology Specialists will attend the IT Specialists course at Fort Gordon
Fort Gordon
Fort Gordon, formerly known as Camp Gordon, is a United States Army installation established in 1917. It is the current home of the United States Army Signal Corps and Signal Center and was once the home of "The Provost Marshal General School" . The fort is located in Richmond, Jefferson, McDuffie,...

, Georgia
Georgia (U.S. state)
Georgia is a state located in the southeastern United States. It was established in 1732, the last of the original Thirteen Colonies. The state is named after King George II of Great Britain. Georgia was the fourth state to ratify the United States Constitution, on January 2, 1788...

. Fort Gordon provides training for Initial Entry Training (IET) Soldiers, as well as Reclassifying Soldiers, from other Occupational Specialties, or Prior Service members. For training purposes, though all Soldiers in the course will receive the same training, they are separated as MOS-I for Initial Training, and MOS-T for re-class.

The Information Technology Specialists course is approximately 22 weeks long, and soldiers in training will be classed into one of several phases during training. This is a continuation of the phases started in Army basic training
Basic Training
Basic Training may refer to:* Basic Training, a 1971 American documentary directed by Frederick Wiseman* Basic Training , an American sex comedy* Recruit training...

, and all service members in training regardless of rank or time in service will participate.

Phase 4

Phase IV (weeks 1 - 4 of AIT) begins with the first week of AIT and ends when the Soldier demonstrates proficiency to move up in phase. The first opportunity to phase-up will be provided at 15 days with subsequent opportunities provided weekly thereafter. Use, possession or purchase of alcohol and tobacco products is prohibited during Phase IV, except as religious sacrament.

In order for an MOS-I Soldier to move from Phase IV to Phase V privileges the Soldier must pass Knowledge Exam, recite the Soldier’s Creed, sing their branch song, and pass Class A, Wall Locker, and Room Inspections. Additionally, Soldiers must demonstrate proper discipline, pass all academic requirements, and pass their APFT with 60 points in each event.

Phase 5

Phase V (no earlier than week 3 through 10 of AIT). Soldiers are authorized to wear civilian clothes, both on-post and off-post pass privileges, Company Commanders can authorize extended weekend off-post pass privileges to Phase V Soldiers, however members are subject to unit recall. Phase V Soldiers are allowed to use personal linen on their beds in accordance with policies established throughout each battalion.

For extended holiday weekends, Company Commanders may authorize Phase V MOS-I Soldiers extended overnight pass privileges, no further than 250 miles via POV.

Soldiers are authorized to ride in a POV or rental car without Company Commander approval, and alcohol consumption by MOS-I Soldiers 21 years of age or older is authorized on weekends and holidays.

Married Soldiers in Phase V with PCS orders to Fort Gordon or Fort Meade may be authorized to live off-post or in GMH managed post housing, if spouse and/or children are in the immediate area, and upon approval from their Battalion Commander.

Phase 5+

Phase V+ (weeks 11 through end of AIT). Company Commanders may authorize the use of rental cars. Company Commanders may authorize Soldiers to purchase, register, and/or possess a privately owned vehicle (POV) once Soldiers complete 21 weeks of training. Battalion Commanders may authorize Soldiers with Families to operate POVs prior to 21 weeks.

Course Information

The IT Specialist course at Fort Gordon is Advanced Individual Training (AIT) and is administered by the 15th Regimental Signal Brigade
15th Regimental Signal Brigade
The 15th Signal Brigade is an active duty unit of the United States Army, based at Fort Gordon. Its mission is to train soldiers who have completed basic training in their communications-related Military Occupational Speciality before they report to their first assignment.Units in the 15th Signal...

, 447th Signal Battalion. The course is designed to prepare soldiers by teaching them skills necessary to become proficient in identifying computer-user problems and resolution coordination, installing, configuring and monitoring local
Local area network
A local area network is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building...

 and wide-area networks
Wide area network
A wide area network is a telecommunication network that covers a broad area . Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations...

, hardware and software, compiling, entering and processing information. Soldiers will also will be taught to provide customer and network administration services such as passwords, electronic mail accounts, security and troubleshooting, conducting data system studies, preparing documentation and specifications for proposals and assisting in the design, preparation, editing and testing of computer programs. The course syllabus is as follows:
  • A+ Hardware and Software (56 Hrs)

Provides the student with the necessary skills and knowledge to identify, install, configure, administer, and perform Unit Level Maintenance (ULM) on a microcomputer. This includes the installation and configuration of operating systems (OS) and virus software.
  • N+ Networking Essentials (48 Hrs)

Provides the student with necessary skills and knowledge to define data communications terms and network terminology, perform basic Network administrator (NA) functions.
  • XP/OUTLOOK (24 Hrs)

Provides the student with the skills and knowledge to correctly install and configure Microsoft XP Professional, and establish user accounts. The skills to install, establish, and troubleshoot Outlook E-mail accounts.
  • AIS (IASO) (24 Hrs)

The Information Assurance (IA) brief presents information on IA as it applies to an Automated Information System (AIS) within the Department of Defense (DoD). Initial training is provided on recognizing vulnerabilities and potential threats within computer systems and networks.
  • Introduction to TCP/IP (24 Hrs)

Provides the student with skills and knowledge necessary to understand the capabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, correctly assign IP address according to host and network requirements, and create additional network addresses by subnetting IP addresses.
  • Introduction to Switches (24 Hrs)

Provides the student with skills and knowledge necessary to install, configure, and perform administrative functions on CISCO Catalyst Switch, and extend switched networks by utilizing Virtual Local Area Networks (VLANs).
  • Introduction to Routers (40 Hrs)

Provides the student with skills and knowledge necessary to install, configure, and perform administrative functions on CISCO Routers, and establish networks by utilizing IP addressing schemes, routing protocols, Inter-VLANs routing, and access-list.
  • Server/Exchange (56 Hrs)

Provides the student with skills and knowledge necessary to install and configure Microsoft Server 2003/Exchange Server, create a domain, join an existing domain, manage user and groups, establish user accounts, perform backup and restore, set permissions on files and folders, control assess, and configure Active Directory.
  • Introduction to UNIX (40 Hrs)

Provides the student with functional knowledge of the UNIX Operating System (OS) structure, and teaches UNIX commands to include syntax and optional parameters, and the use of the Screen Editor (VI). The students will acquire the basic skills and knowledge necessary to function as a UNIX System Administrator (SA).
  • Solaris System Administrator (40 Hrs)

Provides the student with skills and knowledge necessary to implement standard Solaris features to set file and directory permissions, add/delete user’s, groups, host, and printers, configure a Solaris Network, and manage multiple tasks on a Solaris based system.
  • NETCOM (32 HRS)

Provides the student with the skills and knowledge to perform basic systems scans with Simple Network Management Protocol (SNMP), introduced in 1988, is the most widely used network management tool that provides management capability for TCP/IP-based networks. Then we include Voice over IP (VOIP) with Call Manager Express (CME) to give them updated understanding of communications over the network they just setup and verified connectivity.
  • NET A/V (32 HRS)

Provides an introduction to RETINA and HERCULES, scanning network vulnerabilities for the student to better understand his role in network management. These scanners can look for security vulnerabilities within the system configuration policy on our CPUs. When all that is completed they now can monitor the network for any new devices added, or to maintain maximum capacity.
  • Advance Troubleshoot and Repair (32 Hrs)

Is an application of practical exercises in which the student will assemble, troubleshoot, and repair an automated information system (AIS), and demonstrate his/her knowledge on the basic procedures required to troubleshoot and repair basic networks and computers.
  • Introduction to FBCB2 (40 Hrs)

Provides an introduction to the Force XXI Battle Command Brigade and Below (FBCB2) battle command control system. The student is provided instruction on the functional operation of the FBCB2 system within the tactical network
  • Tactical Internet Management System (40 hrs)

Provides the student the ability to configure and monitor the network device and systems that comprise the Tactical Internet (TI) Network. Systems includes the Internet Controller (INC), various Cisco Networking Devices, Enhanced Position Locator Reporting System (EPLRS), and Precision Lightweight Global Positioning System Receiver (PLGR).
  • Introduction to MCS (40 Hrs)

Provides an introduction to the operation of the Maneuver Control System (MCS) Automated Information System (AIS), and its role and functions in the support command and control systems of a maneuver unit tactical operations center (TOC).
  • Digital Tactical Operation Center (40 Hrs)

The DTOC annex provides the student with an operational overview of the Digital Tactical Operation Center (DTOC) and the associated network connectivity within the Army Battle Command System (ABCS).
  • M3 (Matrix Management Module)

The M3 annex is a culmination of practical applications, which emphasizes the critical task taught during the training of all annexes. The students are required to design a network based on the scenarios presented and equipment provided. The students must create and connect network devices, install and configure Microsoft Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

 Operating Systems (Server, Exchange, and Client), install and configure Cisco
Cisco
Cisco may refer to:Companies:*Cisco Systems, a computer networking company* Certis CISCO, corporatised entity of the former Commercial and Industrial Security Corporation in Singapore...

 Routers and Switches, and install, configure, and administer a Solaris and UNIX Operating System.

In addition, Soldiers will receive training to enable them to meet the DOD
United States Department of Defense
The United States Department of Defense is the U.S...

's 8570 certification IAT level 2 requirement by earning the Security+ Certification offered by the Computing Technology Industry Association (CompTIA), as well as the CIO G-6/NETCOM Information Assurance Technical Level 1 Certification. The course includes the following modules:

CIO G-6/NETCOM Information Assurance Technical Level 1 Certification

  • Windows XP
    Windows XP
    Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base...

    : Fundamentals
  • Encryption
    Encryption
    In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

     Technologies
  • Planning and Implementing an Active Directory
    Active Directory
    Active Directory is a directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems. Server computers on which Active Directory is running are called domain controllers....

     Infrastructure
  • Microsoft Windows Server 2003: Network Infrastructure and Active Directory Physical Design
  • Implementing Active Directory Users and Groups
  • Planning and Implementing Group Policy
  • IP Addressing and Routing
  • Firewalls
    Firewall (computing)
    A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

     and VPNs
    Virtual private network
    A virtual private network is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network....

  • Intrusion Detection and Risk Management
  • TCP/IP

CIO/G-6 NETCOM Information Assurance Security+ 2008

  • CompTIA Security + 2008: Risk Analysis, Vulnerability Testing, IDS, and Forensics
  • CompTIA Security + 2008: Wi-Fi and Remote Access
  • CompTIA Security + 2008: Public Key Infrastructure
    Public key infrastructure
    Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...

     and Access Security
    Access control
    Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system...

  • CompTIA Security + 2008: Auditing, Security Policies, and Disaster Recovery
  • CompTIA Security + 2008: Messaging, User, and Role Security
  • CompTIA Security + 2008: Ports, Protocols, and Network Security
  • CompTIA Security + 2008: Threat Mitigation
  • CompTIA Security + 2008: Cryptography
    Cryptography
    Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

  • CompTIA Security + 2008: Authentication
    Authentication
    Authentication is the act of confirming the truth of an attribute of a datum or entity...

     Methods

See also

  • United States Army Signal Corps
    United States Army Signal Corps
    The United States Army Signal Corps develops, tests, provides, and manages communications and information systems support for the command and control of combined arms forces. It was established in 1860, the brainchild of United States Army Major Albert J. Myer, and has had an important role from...

  • Fort Gordon
    Fort Gordon
    Fort Gordon, formerly known as Camp Gordon, is a United States Army installation established in 1917. It is the current home of the United States Army Signal Corps and Signal Center and was once the home of "The Provost Marshal General School" . The fort is located in Richmond, Jefferson, McDuffie,...

    , Georgia
    Georgia (U.S. state)
    Georgia is a state located in the southeastern United States. It was established in 1732, the last of the original Thirteen Colonies. The state is named after King George II of Great Britain. Georgia was the fourth state to ratify the United States Constitution, on January 2, 1788...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK