Looks like no one added any tags here yet for you.
The Career Group is divided into 7 categories
1. Operations
2. Maintenance & Logistics
3. Support
4. Medical & Dental
5. Legal & Chaplain
6. Finance & Contracting
7. Special Investigation
Special duty assignment include:
Recruiter, First Sergeant, Military Training Instructors (MTI), and Embassy Duty
CAREER FIELD SUBDIVISION
A grouping of personnel with related work requirements and qualifications. (combination of 1st thru 3rd characters)
7-Skill Level
Craftsman skill level advancement will be accomplished upon achieving the rank of Staff Sergeant. At this time, Airmen will receive Craftsman training and 12 months OJT
9-Skill Level
Airmen are awarded Superintendent when promoted to Senior Master Sergeant.
WAPS
utilized for promotion eligibility an AF system for selecting Airman for rank promotion to Staff Sergeant (E-5) and Technical Sergeant (E-6). It was first implemented in 1969 and is still in use today.
WAPS Factors
Specialty Knowledge Test (SKT)
Promotion Fitness Examination (PFE)
Enlisted Performance Report (EPR)
Military Decorations and Awards
Specialty Knowledge Test (SKT)
Culminates with a 100 question test about individual jobs in the AF. Questions are taken from the Career Development Course (CDC). up to 100 points
Promotion Fitness Examination (PFE)
100 question test about AF general supervisory subjects such as enlisted military history, AF doctrine, Expeditionary Forces, Joint Forces, standards of conduct, legal issues, military customs, courtesies, protocols, leadership, training, education, dress and appearance, etc. The questions are taken from the AF Handbook 1 up to 100 points
Enlisted Performance Report (EPR)
up to 250 points - An evaluation of the performance of an enlisted member both on and off duty. It provides meaningful feedback to individuals on what is expected of them, advice on how well they are meeting those expectations and how to improve those expectations. You may be awarded up to 250 points over a total of your last three eligible reports
Military Decoration and Awards
AF members receive promotion points if they are awarded certain military decorations. The amount of points is based on the type of decoration awarded. up to 25 points
On-The-Job Training (OJT)
Provided to inexperienced employees supervised at the work site during the initial stages of employment.
Computer-Based Training (CBT)
Receiving instructions/knowledge through special training courses hosted on a computer system.
AFSC
is an alphanumeric code consisting of five characters describing the various jobs in the AF. This section is designed to identify each character within your AFSC and its relationship to the AF Mission
The 1st character is called the ___________. It identifies the AFSC in terms of its relationship to the AF Mission
Career Group
CAREER FIELD
The field indicates a functional grouping of personnel requiring basically the same knowledge and skills (combination of the AFSC's 1st and 2nd character)
SKILL LEVEL
Specifies the specific degree of experience an individual must obtains within the particular AFSC (The AFSC's 4th character)
1-Skill Level
Considered a Helper. This was received after the completion of Basic Military Training (BMT).
3-Skill Level
Airmen are awarded Apprentice upon completion of formal technical training
5-Skill Level
Technician . When this certification training is completed each individual will be consider "certified" to perform their job with minimal supervision. (12 Months OJT)
Learning Programs
Previously known as Career Development Course (CDC), are published instruction providing information to satisfy the career knowledge component of OJT. They are developed from references identified in the Career Field Education and Training Plan (CFETP)
Air Force Job Qualification Standard (AFJQS)
Comprehensive task list describing a particular job type or duty position. Supervisors use to document task qualification. The tasks are common to all persons serving in the described duty position.
Air Force Qualification Training Package (AFQTP)
Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment. It may be printed, computer- based or some other audiovisual media
CAREER FIELD EDUCATION AND TRAINING PLAN (CFETP)
A that plan standardizes the AFSC's skill level training requirements and establishes the framework for managing the career field education and training
The 8 core competencies of the 1D7X1B career field include
- Server operating systems
- System and User Accounts Services
- Contingency Operations
- Strategic and Budget Planning
- System/Database administration
- Project management
- Cloud Computing
- Network Security
1D7X1B RESPONSIBILITIES ARE:
System and User Accounts Services
Security
Contingency Operations
Strategic and Budget Planning
1D7X1B RESPONSIBILITIES
Provide core services at operating systems and server application levels Installing, supporting and maintaining servers and computer systems across networks
System and User Accounts Services
Managing system accounts
Group Policy and Remote Management
Account Management
Directory Services
Storage
Email
Secure Authentication
Fault Isolation
Restore Network Services
Manage Network Outages
Implement security policies - Manage Security Weaknesses on Network TCNOs, TCTOs, CTOs, NOTAMs/C4NOTAMs
Security
Vulnerability Management
Patching Systems
Antivirus Updates
Information Assurance Vulnerability Assessment (IAVAs)
Security
Classified Message Incidents (CMIs) response
Sanitize Systems
Security
Combat Information Transport System (CITS)
Standardize Network Infrastructure via COTS equipment
Maintains Compliance
Security
Information Warfare Operations Exploit an enemy's information systems and defend ours Develop Test, Tactics, Techniques and Procedures for missions
Contingency Operations
Operations identify, analyze, exploit adversary's network operations and systems based on rules of engagements (ROEs).
Contingency Operations
Restoral and Contingency operations plans
Develops and implement in case of emergency
Contingency Operations
Command, Control, Communication and Computer (C4) systems. System Lifecycle Management Collect Requirements and Supporting Documentation
Contingency Operations
Strategic and Budget Planning
Planning and Implementation Activities for Networks Equipment/Software purchases Project Installation Project Management Facility Design/Military Construction Planning
Mission Defense Teams
Is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems.
Directory Services
Provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates.
Boundary Protection
The main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe.
Infrastructure
Teams employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace.
Storage and Virtualization
Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery and archiving
Vulnerability Management
These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities.
Monitoring
Provides situational awareness to all components, systems and network devices, of that which it monitors.
Information Assurance
This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication
Standard/Evaluation Team
This team ensures operational training and operators meet all AF and unit standards. They accomplish standardizations and evaluations; identifying deficiencies in training, processes and procedures
Crew Operations
This team is responsible for the managing daily operations and directions.
1D7X1B DUTIES
Mission Defense Teams
Directory Services
Boundary Protection
Infrastructure
Storage and Virtualization
Vulnerability Management
Monitoring
Information Assurance
Standard/Evaluation Team
Crew Operations
Defense in Depth
an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system.
Proactive Defense
Conducts continuous monitoring of AF network traffic for response time, throughput and performance to ensure timely delivery of critical information.
Network Standardization
Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements
Situational Awareness
Maintaining proper ___________ assists you in preparing for and recognizing a threat
PROGRAM
A set of instructions designed and written to perform a specific task within a computer system.
PROGRAMMING LAUNGUAGES
the description, measurement or expression of processes or algorithms and includes digital as well as non-digital data performed by computing machines.
Syntax
The way symbols, words and characters are formed within each programming language
Semantics
The meaning each set of characters convey when arranged in a particular way
There are _____ basic categories of programming languages
Two.
Low-level and High-level
Low-level Languages
This code is easily and readily executed by the computer without any assistance from any other program.
High-level languages
Computer language that is more user-friendly and offer a larger portability across various platforms. They are not limited by the computer hardware
There are ___ primary types of high level languages
Two
Interpreted and Compiled
Interpreted Programming Language
Code is saved in the same format entered and does not need to be compiled before execution
Compiled Programming Languages
Will translate the program directly into machine code specific to the target computer's CPU (This allows programs to generally run faster than interpreted ones)
Service
A function that is well-defined, self-contained and does not depend on the state of
other services. It is the endpoint of a connection.
Service-oriented architecture (SOA)
a design blueprint or framework for applications within an enterprise
Benefits of Service Oriented Architecture
Reusability
Interoperability
Scalability and Flexibility
Cost Efficiency
DATABASE
an organized collection of structured information, or data, typically stored electronically in a computer system.
Flat File Database
___ databases are databases of just one table. It can be created in database software or in a spreadsheet and is often saved as a CSV file (highly compatible between databases and other applications)
Relational Database
A large set of data about many different entities, allow data to be separated and connected across several tables. Tables are connected through primary and foreign keys to increase efficiency
Normalization
the process of analyzing how to make databases more efficient by using separate tables to reduce redundant data.
tools you use when working with databases include:
- Forms
- Queries
- Reports
- Modules
Forms
used to enter data into a database. This is only required if the database needs a user to enter data
Queries
used to search and filter a database
Reports
used to export data and present it in a way that is easy to read
NoSQL
A database that are built for specific data models and have flexible schemas for building modern applications
There are _____ fundamental components of any database schema
2
Physical database schema
Logical database schema
Physical database schema
The _______ database schema describes how data will be stored physically on a storage system and the form of storage used (files, key-value pairs, indices, etc.)
Logical database schema
The ______ database schema describes the logical constraints applied to the data and defines fields, tables, relations, views, integrity constraints, etc.
Types of Database Schemas
-Flat model
-Hierarchical model
-Network model
-Relational Model
-Star Schema
-Snowflake Schema
Flat model
Organizes data in a single, two-dimensional array—think of a Microsoft Excel spreadsheet or a CSV file
Web Service
the technology or software system designed to support interoperable machine to-machine interaction over a network
Markup Languages
A modern system for annotating a document in a way syntactically distinguishable from the text.
HTML
is a markup language used for creating documents for webpages. It defines the structure and layout of a Web document by using a variety of tags and attributes.
Style Sheets
a form of separation of presentation and content for web design
Client Side Scripting Languages
________ Scripting languages refer to the class of computer programs on the web executed by the user's web browser.
Server Side Scripting Languages
________ Scripting Languages are executed by the Web Server when the user requests a
document. They produce an output in a format understandable by Web Browsers (usually
HTML) and which are then sent to the user's computer
Sandboxed Languages
provide for application creation running in an independent environment.
Python
is an object-oriented language and is considered open source
Hierarchical model
Type of model that has a "tree-like" structure, with child nodes branching out from a root data node. This schema is ideal for storing nested data—for example,
family trees or biological taxonomies.
Network model
like the hierarchical model, treats data as nodes connected to each other; however, it allows for more complex connections, such as many- to-many relationships and cycles
Relational model
this model organizes data in a series of tables, rows, and columns, with relationships between different entities
Star schema
An evolution of the relational model that organizes data into "facts" (numerical) and "dimensions." (descriptive)
Snowflake schema
a further abstraction on top of the star schema. Fact tables point to dimensional tables, which can also have their own dimensional tables, expanding the descriptiveness possible within the database
Structured Query Language (SQL)
a programming nomenclature used to do set operations (like union, intersect, and minus) to organize and retrieve information in relational databases, based on "set theory and relational algebra."
GRAPHICAL USER INTERFACE (GUI)
user interface is the software layer (sometimes called a shell) used by an operator to communicate with the operating system.
COMMAND-LINE
is a text-based interface allowing a user to type commands directly to the operating system and the system responds by carrying out those commands
CROSS DOMAIN DATA SOLUTIONS
offer information assurance while providing the ability to manually or automatically access or transfer information between two or more differing security domains (i.e., Unclassified, Secret, or Top Secret). It gives us the ability to share information between systems of different security levels.
CYBERSPACE VULNERABILITY ASSESSMENT/HUNTER (CVA/H)
MISSION: executes vulnerability, compliance, defense and non-technical assessments, best practice reviews,
penetration testing and Hunter missions on Air Force and Department of Defense networks and
systems
(CVA/H) features
Mobile platform
On-site/Remotely
Deployable sensor platform
Gather/Analyze Data
Garrison platform
Connectivity for Remote Operations
Hunter Mission Focus
Find, Fix, Track, Target, Engage, Assess the Persistent Threat
CYBERSPACE DEFENSE ANALYSIS (CDA)
MISSION: provides operational effects designed to protect and defend critical Air Force data at the nexus of adversarial threats, Air Force priorities and key missions and user behavior on Air Force networks
(CDA) Features
Two variants designed to monitor, collect, analyze, and report information transmitted via unsecure telecommunications systems
Cyberspace operational risk assessment
Web risk assessment