News RoomPublicationsEventsBlogAbout UsDonate

Guide to the Evaluation of Educational Experiences in the Armed Services

Occupation Exhibit



Exhibit Dates: 7/15–Present.

Career Pattern
Warrant Officers transition from 255A and 255S.

Information Protection Technicians are the Army’s premier defenders of the Army’s portion of the Cyberspace domain; they perform information assurance/computer network defense (IA/CND) measures to include the protection, detection, and reaction functions at all levels in support of combat information superiority. They supervise and manage information assurance efforts, associated sub-elements (e.g., computer network defense), non-lethal electronic protection efforts and associated personnel within the standards, transport, services, and applications layers of the network in order to achieve confidentiality, integrity and availability of information, as well as the authentication and non-repudiation of users. They plan, install, administer, manage, maintain, integrate, operate, service, secure, optimize, and troubleshoot information protection efforts to include passive and active network defense measures. They supervise and/or oversee subordinate sections required to support information protection and network defense. They supervise and/or oversee communications security (COMSEC) sections, cryptographic network (cryptonet) planning, electromagnetic spectrum operations to achieve electronic protection and the implementation and use of electronic keys required to support communications networks and networked-systems. They manage the training of personnel on the planning, installation, administration, management, maintenance, integration, operation, servicing, securing, optimization and troubleshooting of information protection to include passive and active network defense measures. They develop policy recommendations and provide technical guidance and advice to commanders and staffs on the management and operation of Army, joint, intergovernmental, interagency and multinational information protection to include passive and active network defense measures.

Related Competencies
Information security management topics include authentication, digital signatures, physical security, risk management, security policies and compliance, software configuration, and system security accreditation. Information assurance topics include encryption, intrusion detection systems (IDS), intrusion prevention systems (IPS), malware, packet analysis, system security planning and policy, and threats and vulnerabilities. Digital forensics topics include chain of custody, ethics, incident handling and analysis, malware analysis, meta-data analysis, and threat analytics. Cyber security topics include cyber security policy, ethical hacking, intrusion detection systems, intrusion protection systems, monitoring and auditing, regulations and ethics, and threats and defense. Strategic operations topics include adaptive and deliberate planning, change management, complexity, contextual awareness, decision-making, problem solving, risk management, and strategic communication. Collaborative leadership topics include community building, conflict resolution, delegation, engagement, ethical behavior, social intelligence, and stakeholder perspectives. Applied leadership topics include coaching, creativity and innovation, critical thinking, ethical leadership, group dynamics, leadership development, and mentoring. Crisis communication topics include audience awareness, contextual awareness, contingency planning, message construction, persuasive communication, theme and messages, and threat awareness. Critical thinking and analysis topics include approaches to problem solving, conceptual thinking, creative thinking, critical thinking, data analysis, decision-making techniques, and deductive reasoning.

In the lower-division baccalaureate/associate degree category, 3 semester hours in information security management, 3 in information assurance, 3 in digital forensics, and 3 in cyber security. In the upper-division baccalaureate degree category, 3 semester hours in strategic operations, 3 in collaborative leadership, 3 in applied leadership, 3 in crisis communication, and 3 in critical thinking and analysis (7/15)(7/15).

ACE occupation reviews are conducted by faculty currently teaching at appropriately accredited colleges and universities. Faculty teams analyze the official occupation standards and validate the duties and requirements through service member interviews to determine if the content, scope, and rigor of the experiential learning align to current postsecondary curricula. A minimum of 3 faculty evaluators must achieve consensus on credit recommendations. Please see Faculty Evaluators - Home Page for more information.