World Library  
Flag as Inappropriate
Email this Article

Information technology specialist

Article Id: WHEBN0023938855
Reproduction Date:

Title: Information technology specialist  
Author: World Heritage Encyclopedia
Language: English
Subject: Fort Gordon, Signal Corps (United States Army), List of United States Army careers
Publisher: World Heritage Encyclopedia

Information technology specialist

Coat of Arms for the 447th Signal Battalion, training unit for Information Technology Specialists

Information Technology Specialist or lnformation Systems Operator-Analyst is a Military Occupational Specialty (MOS) in the United States Army. Information Technology Specialists have the responsibility of maintaining, processing and troubleshooting military computer systems and operations.[1][2]


Soldiers training to perform the duties of an Information Technology Specialists will attend the IT Specialists course at Fort Gordon, Georgia. Fort Gordon provides training for Initial Entry Training (IET) Soldiers, as well as Reclassifying Soldiers, from other Occupational Specialties, or Prior Service members. For training purposes, though all Soldiers in the course will receive the same training, they are separated as MOS-I for Initial Training, and MOS-T for re-class.

The Information Technology Specialists course is approximately 22 weeks long, and soldiers in training will be classed into one of several phases during training. This is a continuation of the phases started in Army basic training, and all service members in training regardless of rank or time in service will participate.[3]

Phase 4

Phase IV (weeks 1 - 4 of AIT) begins with the first week of AIT and ends when the Soldier demonstrates proficiency to move up in phase. The first opportunity to phase-up will be provided at 15 days with subsequent opportunities provided weekly thereafter. Use, possession or purchase of alcohol and tobacco products is prohibited during Phase IV, except as religious sacrament.

In order for an MOS-I Soldier to move from Phase IV to Phase V privileges the Soldier must pass Knowledge Exam, recite the Soldier’s Creed, sing their branch song, and pass Class A, Wall Locker, and Room Inspections. Additionally, Soldiers must demonstrate proper discipline, pass all academic requirements, and pass their APFT with 60 points in each event.

Phase 5

Phase V (no earlier than week 3 through 10 of AIT). Soldiers are authorized to wear civilian clothes, both on-post and off-post pass privileges, Company Commanders can authorize extended weekend off-post pass privileges to Phase V Soldiers, however members are subject to unit recall. Phase V Soldiers are allowed to use personal linen on their beds in accordance with policies established throughout each battalion.

For extended holiday weekends, Company Commanders may authorize Phase V MOS-I Soldiers extended overnight pass privileges, no further than 250 miles via POV.

Soldiers are not authorized to ride in a POV or rental car without Company Commander approval, and alcohol consumption by MOS-I Soldiers is prohibited

Married Soldiers in Phase V with PCS orders to Fort Gordon or Fort Meade may be authorized to live off-post or in GMH managed post housing, if spouse and/or children are in the immediate area, and upon approval from their Battalion Commander.

Phase 5+

Phase V+ (weeks 11 through end of AIT). Company Commanders may authorize the use of rental cars. Company Commanders may authorize Soldiers to purchase, register, and/or possess a privately owned vehicle (POV) once Soldiers complete 21 weeks of training. Battalion Commanders may authorize Soldiers with Families to operate POVs prior to 21 weeks. since the training is no longer 22 weeks we are not authorized to have privately owned vehicles unless on a holiday block leave such as Christmas. They also have other privileges

Course Information

The IT Specialist course at Fort Gordon is Advanced Individual Training (AIT) and is administered by the 15th Regimental Signal Brigade, 447th Signal Battalion. The course is designed to prepare soldiers by teaching them skills necessary to become proficient in identifying computer-user problems and resolution coordination, installing, configuring and monitoring local and wide-area networks, hardware and software, compiling, entering and processing information. Soldiers will also will be taught to provide customer and network administration services such as passwords, electronic mail accounts, security and troubleshooting, conducting data system studies, preparing documentation and specifications for proposals and assisting in the design, preparation, editing and testing of computer programs.[4] The course syllabus is as follows:

  • A+ Hardware and Software (56 Hrs)

Provides the student with the necessary skills and knowledge to identify, install, configure, administer, and perform Unit Level Maintenance (ULM) on a microcomputer. This includes the installation and configuration of operating systems (OS) and virus software.

  • N+ Networking Essentials (48 Hrs)

Provides the student with necessary skills and knowledge to define data communications terms and network terminology, perform basic Network administrator (NA) functions.

  • XP/OUTLOOK (24 Hrs)

Provides the student with the skills and knowledge to correctly install and configure Microsoft XP Professional, and establish user accounts. The skills to install, establish, and troubleshoot Outlook E-mail accounts.

  • AIS (IASO) (24 Hrs)

The Information Assurance (IA) brief presents information on IA as it applies to an Automated Information System (AIS) within the Department of Defense (DoD). Initial training is provided on recognizing vulnerabilities and potential threats within computer systems and networks.

  • Introduction to TCP/IP (24 Hrs)

Provides the student with skills and knowledge necessary to understand the capabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, correctly assign IP address according to host and network requirements, and create additional network addresses by subnetting IP addresses.

  • Introduction to Switches (24 Hrs)

Provides the student with skills and knowledge necessary to install, configure, and perform administrative functions on CISCO Catalyst Switch, and extend switched networks by utilizing Virtual Local Area Networks (VLANs).

  • Introduction to Routers (40 Hrs)

Provides the student with skills and knowledge necessary to install, configure, and perform administrative functions on CISCO Routers, and establish networks by utilizing IP addressing schemes, routing protocols, Inter-VLANs routing, and access-list.

  • Server/Exchange (56 Hrs)

Provides the student with skills and knowledge necessary to install and configure Microsoft Server 2003/Exchange Server, create a domain, join an existing domain, manage user and groups, establish user accounts, perform backup and restore, set permissions on files and folders, control assess, and configure Active Directory.

  • Introduction to UNIX (40 Hrs)

Provides the student with functional knowledge of the UNIX Operating System (OS) structure, and teaches UNIX commands to include syntax and optional parameters, and the use of the Screen Editor (VI). The students will acquire the basic skills and knowledge necessary to function as a UNIX System Administrator (SA).

  • Solaris System Administrator (40 Hrs)

Provides the student with skills and knowledge necessary to implement standard Solaris features to set file and directory permissions, add/delete user’s, groups, host, and printers, configure a Solaris Network, and manage multiple tasks on a Solaris based system.

  • NETCOM (32 HRS)

Provides the student with the skills and knowledge to perform basic systems scans with Simple Network Management Protocol (SNMP), introduced in 1988, is the most widely used network management tool that provides management capability for TCP/IP-based networks. Then we include Voice over IP (VOIP) with Call Manager Express (CME) to give them updated understanding of communications over the network they just setup and verified connectivity.

  • NET A/V (32 HRS)

Provides an introduction to RETINA and HERCULES, scanning network vulnerabilities for the student to better understand his role in network management. These scanners can look for security vulnerabilities within the system configuration policy on our CPUs. When all that is completed they now can monitor the network for any new devices added, or to maintain maximum capacity.

  • Advance Troubleshoot and Repair (32 Hrs)

Is an application of practical exercises in which the student will assemble, troubleshoot, and repair an automated information system (AIS), and demonstrate his/her knowledge on the basic procedures required to troubleshoot and repair basic networks and computers.

  • Introduction to FBCB2 (40 Hrs)

Provides an introduction to the Force XXI Battle Command Brigade and Below (FBCB2) battle command control system. The student is provided instruction on the functional operation of the FBCB2 system within the tactical network

  • Tactical Internet Management System (40 hrs)

Provides the student the ability to configure and monitor the network device and systems that comprise the Tactical Internet (TI) Network. Systems includes the Internet Controller (INC), various Cisco Networking Devices, Enhanced Position Locator Reporting System (EPLRS), and Precision Lightweight Global Positioning System Receiver (PLGR).

  • Introduction to MCS (40 Hrs)

Provides an introduction to the operation of the Maneuver Control System (MCS) Automated Information System (AIS), and its role and functions in the support command and control systems of a maneuver unit tactical operations center (TOC).

  • Digital Tactical Operation Center (40 Hrs)

The DTOC annex provides the student with an operational overview of the Digital Tactical Operation Center (DTOC) and the associated network connectivity within the Army Battle Command System (ABCS).

  • M3 (Matrix Management Module)

The M3 annex is a culmination of practical applications, which emphasizes the critical task taught during the training of all annexes. The students are required to design a network based on the scenarios presented and equipment provided. The students must create and connect network devices, install and configure Microsoft Windows Operating Systems (Server, Exchange, and Client), install and configure Cisco Routers and Switches, and install, configure, and administer a Solaris and UNIX Operating System.

In addition, Soldiers will receive training to enable them to meet the DOD's 8570 certification IAT level 2 requirement by earning the Security+ Certification offered by the Computing Technology Industry Association (CompTIA), as well as the CIO G-6/NETCOM Information Assurance Technical Level 1 Certification.[5] The course includes the following modules:

CIO G-6/NETCOM Information Assurance Technical Level 1 Certification

CIO/G-6 NETCOM Information Assurance Security+ 2008

  • CompTIA Security + 2008: Risk Analysis, Vulnerability Testing, IDS, and Forensics
  • CompTIA Security + 2008: Wi-Fi and Remote Access
  • CompTIA Security + 2008: Public Key Infrastructure and Access Security
  • CompTIA Security + 2008: Auditing, Security Policies, and Disaster Recovery
  • CompTIA Security + 2008: Messaging, User, and Role Security
  • CompTIA Security + 2008: Ports, Protocols, and Network Security
  • CompTIA Security + 2008: Threat Mitigation
  • CompTIA Security + 2008: Cryptography
  • CompTIA Security + 2008: Authentication Methods

See also


  1. ^ [1]
  2. ^ "25B - Information Technology Specialist". 2014-05-28. Retrieved 2014-07-15. 
  3. ^ [2]
  4. ^ [3]
  5. ^ [4]
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.