Document 11781081

advertisement
For Navy enlisted personnel with
Cryptologic Technician Networks
(CTN) and Information Systems
Technician (IT) ratings, as well as
the equivalent enlisted personnel in
other U.S. military services. The
Applied
Cyber
Operations
curriculum provides deep study of
the implementation of national and
military application of integrated
lines of operation, including
operation of the DoD Global
Information
Grid,
Defensive
Cyberspace Operations (DCO),
Offensive Cyberspace Operations
(OCO), cyber security fundamentals,
and
the
technical
operations
underpinning these. Students learn to
seize and sustain an information
advantage through all stages of
operations, from compliance and
early warning through detection,
planning, targeting, cyber fires,
effects assessment and reset for
follow-on.
Navy Sponsor
Deputy Chief of Naval Operations
for Information Dominance (N2N6)
Q&A
Academics
Cyber Battle Lab
Who can attend?
• A limited number of enlisted personnel
of the U.S. Armed Forces.
What are the entrance qualifications?
• A baccalaureate degree, or the
equivalent, with grades resulting in an
APC of at least 344. The degree must
be in a technical field such as computer
science, electrical engineering or
information sciences.
• Training: A and C Schools for the CTN
and IT respectively, namely, Joint
Cyber Analysis Course (JCAC) or IT A
School and IT System Administrator C
School or equivalent enlisted service
schools for USA, USAF and USMC.
• A TOP SECRET clearance is required
with SPECIAL INTELLIGENCE
clearance obtainable for all students.
How long is the program?
• Four quarters
What are the entry dates?
• March and September
Is it a resident program? Where?
• Yes. At NPS in Monterey, California.
What are the degree requirements?
• All course requirements must be
satisfied through either course work or
validation prior to graduation.
• A minimum of 40 quarter-hours of
graduate-level courses. At least 12
quarter-hours at the 4000 level.
• Completion of a capstone project on a
subject previously approved by the
Chair of the Cyber Academic Group.
Download