Back to news

December 2, 2019 | International, C4ISR, Security

How the Defense Digital Service revamped Army cyber training

Earlier this year, the Defense Digital Service — the Pentagon's cadre of coders and hackers performing a short stint in government — finished the second phase of a pilot program to streamline cyber training for the Army.

The Army wanted to streamline two phases of cyber training: the Joint Cyber Analytics Course, or JCAC, which takes 27 weeks in Pensacola, Florida, and provides basic cyber training for joint forces that have no prior experience in cyber; and the more tactical training that happens at Fort Gordon in Georgia. Combined, the two phases take a minimum of 36 weeks.

To accomplish this, the Defense Digital Service, working with the Army Cyber Center of Excellence and a private vendor, built a course to conduct training in three months — everything a cyberwarrior needed to know from JCAC, said Clair Koroma, a bureaucracy hacker at DDS.

Phase two — which combines tactics involving hardware, offensive and defensive cyber, and networking — takes seven months. It excluded the classified course, Koroma added.

At this point, she said, DDS has transitioned all of its materials to the Cyber School, which will pick up the third phase of the pilot training, though DDS will still be available for assistance.

“The plan is that eventually the 17Cs, [who execute offensive and defensive cyberspace operations], will come to Fort Gordon on inception and do their entry and mid-level training at Gordon. They will run this as the course for those soldiers,” she said.

Koroma said success of the pilot will be measured from the operational world — evaluating the skill sets of the soldiers that graduate from the pilot program and comparing them to prior classes. Thus far, she added, no graduates from the pilot program have been overwhelmed in operations.

Students during the second pilot were also evaluated by senior leaders within the Army cyber community and commands where they might be assigned during their final project and presentation. Students needed to identify issues on the network and conduct an outbrief to these leaders.

“Senior leaders then got an opportunity to ask them questions,” Koroma said. “Every single person who was in that presentation said that they were impressed by the delivery of the students and the quality of the presentation that the students gave.”

In fact, Koroma said, there are two students she's aware of whose orders were changed at the conclusion of training because leaders who attended the presentation wanted them on their team.

https://www.fifthdomain.com/dod/army/2019/11/29/how-defense-digital-service-revamped-army-cyber-training/

On the same subject

  • Austal USA opens steel line ‘at a critical time,’ says Navy official

    April 14, 2022 | International, Naval

    Austal USA opens steel line ‘at a critical time,’ says Navy official

    Flexibility of cutting-edge facility leaves company poised for growth, leaders say

  • Airbus teste le système de combat aérien du futur

    October 4, 2018 | International, Aerospace

    Airbus teste le système de combat aérien du futur

    + VIDEO - Airbus Defense a fait voler pour la première fois une escadrille de cinq drones associés à un avion, qui préfigurent le système de combat aérien du futur. Le long chantier du futur système de combat aérien européen est bel et bien lancé. Alors que la France et l'Allemagne ont confié, en avril dernier, à Airbus et Dassault Aviation la conception du programme SCAF , combinant un nouvel avion de combat et tous ses appendices, Airbus DS, la branche militaire du groupe aéronautique, vient de franchir une étape importante. Pour la première fois, Airbus est parvenu à faire voler ensemble et de... Article complet: https://www.lesechos.fr/industrie-services/air-defense/0302346339244-airbus-teste-deja-des-briques-du-futur-systeme-de-combat-aerien-2210538.php

  • New Linux Variant of Play Ransomware Targeting VMware ESXi Systems

    July 22, 2024 | International, C4ISR, Security

    New Linux Variant of Play Ransomware Targeting VMware ESXi Systems

    Play ransomware's new Linux variant targets VMWare ESXi, expanding its reach. US leads in victims, with manufacturing and services most affected.

All news