An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Education for the Future of Cyber

By SSG Brett Clements | November 02, 2016


Over the course of the last century, warfare has made giant leaps in terms of battle ground in which war is fought. No longer are wars fought solely on ground, air, or sea, but in space, and now cyberspace. Due to this change in terrain, Soldiers must be smarter than they have ever been, and eager to not only train physically, but mentally. The need to educate Soldiers has become crucial to future military success, and that need reaches beyond the services to grade school, in order to develop the fighting force the US requires. The question becomes, what is the US doing to better prepare young people to inherit the cyberspace battlefield? To answer this question, the military is making changes to its current structure as well as looking to other agencies and organizations to fill military requirements.


            “We know that the nation that out-educates today will out-compete us tomorrow. And I don’t intend to have us out-educated.”[1]

Barack Obama, President of the United States of America.

In the aftermath of 9/11, the US government identified a need for cybersecurity. The National Security Agency (NSA) and the Department of Homeland Security (DHS) laid ground work to develop more cybersecurity professionals. Many educational institutions are now following the National Initiative for Cybersecurity Education (NICE) framework, which aligns education with the security standards set by the government and industry. NICE provides teachers the tools necessary to prepare grade level student for the future cybersecurity work force.[2] The intent of NICE, and similar programs, is to encourage young people into cybersecurity industries.

Additional tools are being used to increase interest in IT fields. Schools have incorporated online educational game play, such as the online gaming website Cool Math, into homework for students to not only learn basic math skills, but to expose younger generations to the Internet. Programming languages such as the MIT developed language, Scratch, is used in classrooms to introduce programming to grade school students.[3] Educators are trying to incorporate technology into the classroom and doing so with the use of micro-computers, such as the Raspberry Pi, and sandbox games like Minecraft; in both instances, students learn basics of programming while engaged is game play. Robotics clubs and after school hacking programs have begun to spring up in recent years to better prepare students for future technical careers.

Cyber safety is also becoming a necessity to educate young people about the dangers of the Internet and how to protect themselves as more things are incorporated into their networked lives. Programs such as Digital Citizenship, which teach “the norms of appropriate, responsible technology use,” have become common place among educational institutions teaching the dangers of cyberspace.[4]

In an effort to remain competitive with other countries in cyberwarfare, the US military has initiated programs to spark interest in teenagers. The Air Forces’ CyberPatriot program encourages teenagers to come together and compete in cyberspace. The competition “puts teams of high school and middle school students in the position of newly hired IT professionals tasked with managing the network of a small company.”[5] The teams are tasked with identifying vulnerabilities in their network and maintaining critical services for periods up to a six hours.


The need for cyberspace is apparent throughout today’s modern battlefield. Cyberspace does not just encompass the security of information and networks, but it is used as a primary means of communication, and used to maintain command and control of units on the ground. However, most commanders do not understand how to effectively use cyberspace operations in their battlespace. In order to maintain overall cyber superiority, “Officers, regardless of their rank or position, must be able to assess their operational environment from a cyber perspective and be aware of the basic platforms and cyber capabilities.”[6] The lack of prior systematic cybersecurity and defense education for senior level officials do not meet today’s need for cyberwarfare and will require an estimated five to six weeks of intensive study to meet needed standards;[7] however, because of the ever increasing technological threats, there will be a constant need to further educate all officers, regardless of rank, on cyber dangers as skills and knowledge atrophy. Commanders must understand and assume risks in a domain where they cannot always see the maneuver while in the field when it involves cyber operations. Additionally, leaders will need a more understanding of their own network security, insuring that information is not compromised.

The military is currently pushing for officers and enlisted to understand their role in cyberspace operations, and their effect on the cyber battle space. Furthermore, civilians who possess sophisticated knowledge of computer security and computer code are being recruited into the military.[8] The need for cyber professionals are in high demand, and the military is taking action to insure the best possible cyber warriors fill its need. The US military is doing whatever possible, such as recruiting from current personnel, hiring personnel who possess IT certification, and recruiting individuals who pass new requirement placed on basic entry exams, such as the Armed Service Vocational Aptitude Battery, to ensure the US maintains superiority in cyberspace.

On May 25th, 2016, the first lieutenants graduated from Cyber School, historically marking the Army’s move towards a cyber force.[9] Prior to this date, the Army recruited from within its ranks to build its cyber force, committing large amounts of resources to stand up its cyber capabilities. The Army continues to build its ranks with the 170A for Warrant Officers, and new Advanced Individual Training (AIT) for enlisted ranks, both coming online at the end of 2016 and early 2017. The Army has shown it is fully committed towards establishing Cyberspace dominance with other branches following in the Army’s footsteps.

Other Organizations

There are numerous organizations that have made the shift to incorporate cyber into learning outside the classroom. The Boy Scouts of America and Girl Scouts of the United States of America, for example, have always helped mold future Soldiers since their inceptions in the early 1900s. Currently, scouting parallels the military in many aspects, to include utilization of a rank structure, survival skills, drill and ceremony, and leadership skills and statistics have shown that a majority of Boy Scouts and Girl Scouts have a higher likelihood to enter into the service over those in other after school activities.[10] With the military focusing on cyber, the Boy Scouts and Girl Scouts have added many new merit badges (badges that signify skills learned and demonstrated) in the computer sciences fields. Scouts may now earn badges in programming, robotics, electronics, and digital technologies, and although the US military’s involvement in scouting programs are minimal, many Soldiers volunteer their time to mentor Scouts.[11] The shift in Scouts and other organizations towards implementing cyber and IT into their curriculum demonstrates the direction that our society is making towards better preparing future generations to handle the upcoming battlefield.


In order to maintain superiority in all battlespaces of the US military, a shift in requirements has begun to occur in the armed forces. The US is pushing for future generations to for conflict in virtual space, not necessarily physical space. The US military has a need for highly educated Soldiers in its forces, and the best way to achieve this is to educate young people in cybersecurity. Educators and other organizations have already seen the need for better IT personnel, and have begun making changes to further educate young people on the dangers and needs of the cyber community. The continuance of the freedoms the American people enjoy will depend on furthering education in cyberspace so that future generations can maintain that freedom.



[1] “Remarks by the President at the National Academy of Sciences Annual Meeting.” The White House. April 27, 2009. Accessed June 26, 2016.

[2] “National Initiative for Cybersecurity Careers and Studies (NICCS).” Curriculum Resources. Accessed June 24, 2016.

[3] “Scratch – About.” Scratch – About. Accessed June 26, 2016.

[4] “Digital Citizenship.” Digitalcitizenship. Accessed June 26, 2016.

[5] “AFA CyberPatriot Website.” AFA CyberPatriot Website. Accessed June 24, 2016.

[6] Tikk-Ringas, Eneken, Mika Kerttunen, and Christopher Spirito, 2014. “Cyber Security as a Field of Military Education and Study.” JFQ: Joint Force Quarterly no. 75: 57-60. Academic Search Complete, EBSCOhost (accessed June 24, 2016).

[7] Eneken Tikk-Ringas, Mika Kerttunen, and Christopher Spirito, 2014. “Cyber Security as a Field of Military Education and Study.” JFQ: Joint Force Quarterly no. 75: 57-60. Academic Search Complete, EBSCOhost (accessed June 24, 2016).

[8] Sue Talley, EdD, “In Cyber Warfare, Education Is Our Most Powerful Weapon.” The Huffington Post. Accessed June 24, 2016.

[9] Wilson A. Rivera, “Cyber School Bids Farewell to First-ever Commandant.” Cyber School Bids Farewell to First-ever Commandant. Accessed June 25, 2016.

[10] “Statistic Brain.” Statistic Brain. Accessed June 24, 2016.

[11] “Merit Badges.” Merit Badges. Accessed Jun 21, 2016.

US Army Comments Policy
If you wish to comment, use the text box below. Army reserves the right to modify this policy at any time.

This is a moderated forum. That means all comments will be reviewed before posting. In addition, we expect that participants will treat each other, as well as our agency and our employees, with respect. We will not post comments that contain abusive or vulgar language, spam, hate speech, personal attacks, violate EEO policy, are offensive to other or similar content. We will not post comments that are spam, are clearly "off topic", promote services or products, infringe copyright protected material, or contain any links that don't contribute to the discussion. Comments that make unsupported accusations will also not be posted. The Army and the Army alone will make a determination as to which comments will be posted. Any references to commercial entities, products, services, or other non-governmental organizations or individuals that remain on the site are provided solely for the information of individuals using this page. These references are not intended to reflect the opinion of the Army, DoD, the United States, or its officers or employees concerning the significance, priority, or importance to be given the referenced entity, product, service, or organization. Such references are not an official or personal endorsement of any product, person, or service, and may not be quoted or reproduced for the purpose of stating or implying Army endorsement or approval of any product, person, or service.

Any comments that report criminal activity including: suicidal behaviour or sexual assault will be reported to appropriate authorities including OSI. This forum is not:

  • This forum is not to be used to report criminal activity. If you have information for law enforcement, please contact OSI or your local police agency.
  • Do not submit unsolicited proposals, or other business ideas or inquiries to this forum. This site is not to be used for contracting or commercial business.
  • This forum may not be used for the submission of any claim, demand, informal or formal complaint, or any other form of legal and/or administrative notice or process, or for the exhaustion of any legal and/or administrative remedy.

Army does not guarantee or warrant that any information posted by individuals on this forum is correct, and disclaims any liability for any loss or damage resulting from reliance on any such information. Army may not be able to verify, does not warrant or guarantee, and assumes no liability for anything posted on this website by any other person. Army does not endorse, support or otherwise promote any private or commercial entity or the information, products or services contained on those websites that may be reached through links on our website.

Members of the media are asked to send questions to the public affairs through their normal channels and to refrain from submitting questions here as comments. Reporter questions will not be posted. We recognize that the Web is a 24/7 medium, and your comments are welcome at any time. However, given the need to manage federal resources, moderating and posting of comments will occur during regular business hours Monday through Friday. Comments submitted after hours or on weekends will be read and posted as early as possible; in most cases, this means the next business day.

For the benefit of robust discussion, we ask that comments remain "on-topic." This means that comments will be posted only as it relates to the topic that is being discussed within the blog post. The views expressed on the site by non-federal commentators do not necessarily reflect the official views of the Army or the Federal Government.

To protect your own privacy and the privacy of others, please do not include personally identifiable information, such as name, Social Security number, DoD ID number, OSI Case number, phone numbers or email addresses in the body of your comment. If you do voluntarily include personally identifiable information in your comment, such as your name, that comment may or may not be posted on the page. If your comment is posted, your name will not be redacted or removed. In no circumstances will comments be posted that contain Social Security numbers, DoD ID numbers, OSI case numbers, addresses, email address or phone numbers. The default for the posting of comments is "anonymous", but if you opt not to, any information, including your login name, may be displayed on our site.

Thank you for taking the time to read this comment policy. We encourage your participation in our discussion and look forward to an active exchange of ideas.