HomeAcademic ProgramsEnlisted Professional Development and Enhancement InitiativeCybersecurity and Geospatial Intelligence Pilot Program (CGIPP)

Cybersecurity and Geospatial Intelligence Pilot Program

Situation. The Commandant of the Marine Corps (CMC) has tasked Training and Education Command (TECOM) and Marine and Family Programs (MF) with developing a series of programs which produce better trained, educated, and mature Marines to enhance the Corps capabilities to operate in a complex, distributed environment.  As part of the EPD&E WG, the Cybersecurity and Geospatial Intelligence Pilot Program (CGIPP) is the first program aimed at meeting the CMC’s intent to establish a Marine Corps that is better trained, better educated, physically and mentally fit, and ready to prevail in the uncertain and volatile environments that will characterize future battlefields and contingencies.  This message solicits applications from Marines within the cyber and intelligence communities to participate in a pilot program that aligns professional development with civilian education to achieve academic and professional credentialing (certifications and undergraduate degrees) in Cybersecurity or Geospatial Intelligence.

Marines interested in participating in this pilot program must submit an application package to C4, HQMC for screening and selection.  Packages must be submitted no later than 28 November 2016.  Program selectees will be assigned to one of two tracks based on their academic standing.

Track 1:  Requires a minimum of 12 credit hours.  Marines selected for the first track in cybersecurity will participate in online and on-site courses facilitated by the Community College of Northern Virginia (NOVA) and C4 Department to count towards an Associate of Applied Science Degree in Cybersecurity awarded by NOVA.  Those Marines selected for Geospatial Intelligence will participate in online courses facilitated by Delta State University (DSU) and Intel Department to count towards an Associate of Arts Degree awarded by Mississippi Delta Community College (MDCC).

Track 2:  Requires a minimum of 45 credit hours.  Marines selected for the second track in cybersecurity will participate in online and on-site courses facilitated by NOVA and C4 Department to count towards a Bachelor of Science in Information Technology (Cybersecurity Concentration) Degree from Excelsior University or a Bachelor of Science in Computer Networks and Security Degree from University of Maryland University College (UMUC). Those Marines selected for Geospatial Intelligence will participate in online courses facilitated by DSU and Intel Department to count towards a Bachelor of Science in Geospatial Analysis and Intelligence (BSGAI) awarded by DSU. 

Cybersecurity MOS-to-Degree Roadmap

 

The next Surge Course is scheduled for 24 July through 04 August 2017.  It will be held at the MCB Quantico Education Center on Roan Rd (Bldg 3088) from 0730 to 1600 during the work week.  The Course in ITN 263: Internet/Intranet Firewalls and E-Commerce Security. For more information on this course please contact an MCU Education Officer at MCU_EPDE@usmcu.edu.   

 

OUTCOMES

By the end of the pilot program Marines should be able to: 

  1. Apply standard statistical inference procedures to draw conclusions from data.

  2. Demonstrate their proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks).

  3. Write simple and compound conditions within a programming language or similar environment (e.g., scripts, macros, SQL).

  4. Write simple linear and looping scripts

  5. Describe potential system attacks and the actors that might perform them.

  6. Describe cyber defense tools, methods, and components.

  7. Apply cyber defense methods to prepare a system to repel attacks.

  8. Describe appropriate measures to be taken should a system compromise occur.  

  9. Identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, aversion to risk.

  10. Describe different types of attacks and their characteristics.

  11. List the first principles of security.

  12. Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.  

  13. Analyze common security failures and identify specific design principles that have been violated.

  14. Identify the needed design principle given a specific scenario.

  15. Describe why good human machine interfaces are important to system use.

  16. Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms.  

  17. List the fundamental concepts of the Information Assurance/Cyber Defense discipline.

  18. Describe how the fundamental concepts of cyber defense can be used to provide system security.

  19. Examine the architecture of a typical, complex system and identify significant vulnerabilities, risks, points at which specific security technologies/methods should be employed.

  20. Identify the elements of a cryptographic system.

  21. Describe the difference between symmetric and asymmetric algorithms.

  22. Describe which cryptographic protocols, tools, and techniques are appropriate for a given situation.

  23. Describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g., key management), etc.

  24. Describe the hardware components of modern computing environments and their individual functions.

  25. Describe the fundamental concepts, technologies, components and issues related to communications and data networks.  

  26. Describe a basic network architecture given a specific need and set of hosts/clients.  

  27. Track and identify the packets involved in a simple TCP connections (or a trace of such a connection).

  28. Use a network monitoring tools (e.g., Wireshark).

  29. Use a network mapping tool (e.g., Nmap).

  30. List the applicable laws and policies related to cyber defense and describe the major components or each pertaining to the storage and transmission of data.

  31. Describe their responsibilities related to the handling of information about vulnerabilities.

  32. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

  33. Apply the knowledge gained to successfully install and securely configure, operate and maintain a commodity OS, to include: setting up user accounts, configuring appropriate authentication policies, configuring audit capabilities, performing back-ups, installing patches and updates, reviewing security logs, and restoring the system from a backup.

     

Geospatial Intelligence MOS-to-Degree Roadmap 

 

 

ELIGIBILITY REQUIREMENTS

Marine interested in participating in the program must:

  • Hold the primary military occupational specialty (PMOS) of 2611, 2651, 0651, 0659, or 0689 for the cybersecurity program and a PMOS of 0241 or 0261 for geospatial intelligence program. 
  • Be a volunteer in the rank of Corporal through Gunnery Sergeant.
  • Have a minimum of 12 college credit hours other than those provided by the Joint Service Transcript (JST).
  • Have at least 18 months remaining on station.
  • Be eligible for Tuition Assistance in accordance with reference b.
  • Have between 2 and 22 years of service.
  • Not have been passed over for selection to the next higher grade.
  • Meet reenlistment requirements established by Deputy Commandant of Manpower and Reserve Affairs (DC MRA).
  • Must not reach service limitations within 5 years of beginning the program of instruction.
  • Must be Professional Military Education (PME) complete for current grade.  
  • For the cybersecurity program only: Must be stationed or reside in the state of Virginia or the District of Columbia. 

 

HOW TO APPLY 

Marines interested in participating in this pilot program must submit an application package to C4, HQMC for screening and selection NLT 01 July 2017.  Submit packages in pdf form to the C4 Training Coordinator, Rene Agosto at rene.agosto@usmc.mil

Application packages must include the following: 

Statement of Purpose. Describe in two pages your reasons for wanting to participate in the program and how it will benefit your professional development. For tips on writing an effective application essay, see College Essay Tips

Transcripts. PDF or scanned copies of unofficial transcripts from all post-secondary academic institutions attended.

Letter of Recommendation from Commanding Officer.  This letter must include the following statement: “I understand that as a participant of CGIPP, this Marine will be on a permissive temporary additional duty or PTAD status for 2 weeks in the Summer of 2017, the Fall of 2017, and the Summer of 2018.”

Proof of Tuition Assistance (TA) eligibility

If for any reasons, you are unable to provide an element of the application package, please indicate why, how you plan to provide the information (if applicable), and when it can be expected to arrive in a separate cover letter to the selection panel.