-
bmanahan188
at November 19,2015
With the increase in importance, it makes sense that the Army has created such a training program for cyber defense. I found it very interesting that the framework was modeled after its air-force training school. I also enjoyed trying to see which computer programs were utilizing in the training and recognizing some of their books. Being open to civilian training, such as SANS, is a great and rewarding move by them.
-
tshafi
at November 20,2015
The USAF is often regarded as the most technological of the armed forces. This type of work is very necessary in today’s technological age. This video is more like a promotional video for the program and less of a video geared towards technological information. It is engaging and if I was younger, this recruitment tool would have hooked me.
-
busterhax
at December 10,2015
It's good to know there are professionals out there doing this stuff for the government.
-
fpazdzin
at January 26,2016
It’s good to see that the military is taking cyber threats seriously and that the students are excited to tackle the challenges that come with this field. This looks like a good training program. As long as it keeps up with the changing technologies and types of threats it should do well to help defend against cyber threats. I’m glad that they are partnering up with a civilian company to train their students. I think it’s a good idea to have a non-military presence to bring a different perspective to the classroom since they will not only be defending against threats from other militaries but also from civilian and private entities.
-
tcmahony
at February 05,2016
It's interesting to see how the USAF combines the discipline of their typical military training with the knowledge and expertise of a commercial training provider like SANS. While this was a enjoyable piece on training in the USAF I wonder if other branches of the US military have similar programs or if this is an USAF activity. It would have been nice for the piece to dive more into the "weapons" they kept referencing and the various fields that airmen could be placed in. Are these types of malware or just focus areas of different tactics taken?