Training the Next Generation of Information Technology Specialists and Cyber Warriors

By Capt. Arinze NwachukwuSeptember 11, 2025

ASCII
ASCII (Photo Credit: US ARMY) VIEW ORIGINAL

Modernizing the Army to meet the challenges of multi-domain warfare (MDW) involves key strategies across technology, doctrine, training, and organizational structure. The approach to MDW focuses on integrating capabilities across the air, land, sea, space, and cyber domains. Recent analyses of multi-domain operations note the Army’s doctrine is evolving from linear campaigns to an integrated approach that synchronizes capabilities across all domains, including the electromagnetic spectrum and the information environment (Marler, 2023; Nettis, 2020).

In practical terms, this means future information technology (IT) and cyberspace warriors must be trained not only in traditional warfare techniques but also in coordinating kinetic and non-kinetic effects, cyber operations, and electronic warfare. RAND researchers observe that preparing for MDW requires balancing centralized coordination with decentralized execution, and that training curricula must reflect this complexity (Marler, 2023). Air University scholars similarly observe that new technologies, such as artificial intelligence, compress decision-making timelines and that multi-domain operations present adversaries with complementary threats across domains (Nettis, 2020). Consequently, joint training exercises and simulations integrating cyber, space, and traditional capabilities are essential to prepare Soldiers for real-world operations.

Collaboration and interoperability are also fundamental to MDW. Multi-domain concepts emphasize presenting adversaries with dilemmas from multiple directions and require seamless cooperation across services and with coalition partners (Nettis, 2020). This interdisciplinary nature extends beyond kinetic operations; the Army’s Intelligence, Information, Cyber, Electronic Warfare, and Space (I2CEWS) units, for example, combine intelligence, cyber, electronic warfare, and space capabilities to enable commanders to understand and shape the battlefield (Nettis, 2020). This organizational model demonstrates why training IT and cyber warriors cannot occur in isolation from other specialties.

Finally, the rapidly evolving cyber landscape has implications for workforce development. A National Academies report notes that cybersecurity threats and technologies change faster than most training programs can adapt, and that federal organizations struggle to recruit and retain skilled cyber professionals due to competition with the private sector (National Academies of Sciences, Engineering, and Medicine, 2021). These realities provide context for assessing the quality and effectiveness of training within the Signal and Information Dominance (cyber and electromagnetic warfare) branches and for updating programs of instruction.

PME Challenges in the Information Technology and Cyber Operations Domains

Effective training is crucial for developing capable force multipliers and meeting the demands of the Army’s multi-domain warfare. Training IT and cyber operations (CO) Soldiers presents several significant challenges: the rapid pace of technological change, insufficient hands-on training, resource constraints, and difficulties with recruitment and retention. These obstacles can hinder the effectiveness of training programs, challenging the preparation of Soldiers for modern cyber warfare.

Rapid Technological Evolution. The cybersecurity landscape constantly evolves as adversaries develop new tools and techniques. According to the National Academies of Sciences, Engineering, and Medicine (2021), federal agencies must continually update their training programs because technological developments quickly outpace existing curricula. If training content does not keep pace, Soldiers may practice on outdated systems that do not represent current threats or tools.

Insufficient Real-World Training. While theoretical knowledge is foundational, cyber warriors need realistic, high-pressure training to develop practical skills. During Cyber Flag 2022, participants used the Persistent Cyber Training Environment (PCTE)—a virtual platform that allows cyber mission forces to train as they fight by emulating operational networks. The platform creates realistic training environments with live opponents, providing hands-on experience and improving readiness (Ryan, 2022). Such environments are essential for preparing Soldiers for complex cyber threats.

Resource Constraints and Expertise. The National Academies report points out that federal agencies face difficulties attracting and retaining cyber talent because private-sector salaries and working conditions are often more attractive (National Academies of Sciences, Engineering, and Medicine, 2021). A high turnover rate and limited funding reduce access to cutting-edge tools and expert instructors. If the Army cannot compete for skilled personnel, training continuity suffers.

Cyber Education Gaps. Beyond technical prowess, cyber operators must understand ethical, legal, and strategic considerations. The Cyber Law Toolkit explains that cyber operations causing injury, death, or damage, or even disabling the functionality of an object, can constitute attacks under international humanitarian law, and that some states interpret loss of functionality alone as an attack (Cyber Law Toolkit, 2024). This implies that training should embed an understanding of international legal frameworks and ethical decision-making into the curriculum.

Recommendations for Developing Lethal IT and Cyber Warriors

To revamp its curriculum and program of instruction effectively, the Army’s Training and Doctrine Command (TRADOC) must focus on strategies that ensure IT and CO Soldiers graduate with the skills required to safeguard the Department of Defense Information Networks (DODIN) and counter cyber threats. These strategies involve updating the curriculum to reflect modern challenges, enhancing practical training, fostering continuous education, and integrating ethical and legal principles.

Revise the Curriculum. Given the rapid evolution of the cyber environment, TRADOC should update course content frequently and partner with academia and industry to incorporate state-of-the-art knowledge. RAND researchers stress that training for multi-domain operations must balance centralized coordination with decentralized objectives and integrate capabilities across domains (Marler, 2023). Air University’s Wild Blue Yonder article emphasizes that artificial intelligence and other emerging technologies compress decision-making timelines and create new dilemmas for adversaries (Nettis, 2020). Regular curriculum reviews can introduce real-time intelligence on emerging threats and prepare Soldiers to use advanced tools and techniques.

Increase Emphasis on Realistic, Hands-On Training. The Army should make greater use of simulated environments like the PCTE to replicate real-world cyber conflicts. The PCTE allows cyber teams to engage live opponents and emulate operational networks, providing experience that pure classroom instruction cannot (Ryan, 2022). TRADOC should partner with defense industry and allied cyber organizations to expand access to such environments and incorporate multinational exercises, strengthening partnerships and exposing Soldiers to diverse tactics (Ryan, 2022).

Foster Collaboration. Multi-domain operations require coordination across services and coalition partners. Air University authors describe multi-domain operations as presenting complementary threats across domains and note that current situational awareness systems are not designed to provide integrated understanding (Nettis, 2020). TRADOC should develop joint training exercises that bring together intelligence, electronic warfare, space, and cyber specialists, mirroring the I2CEWS model (Nettis, 2020).

Encourage Lifelong Learning. Given the pace of technological change, Soldiers must continue learning throughout their careers. The National Academies report highlights that cyber workforces need flexibility and ongoing training to adapt to rapidly evolving threats (National Academies of Sciences, Engineering, and Medicine, 2021). TRADOC can offer advanced certifications, continuous professional development programs, and participation in cyber competitions to ensure Soldiers remain current.

Integrate Cybersecurity Ethics, Law, and Strategic Thinking. Cyber operations have legal and ethical implications. The Cyber Law Toolkit explains that causing loss of functionality can constitute an attack under international humanitarian law (Cyber Law Toolkit, 2024). Thus, training programs should include modules on the laws of armed conflict, ethical conduct in cyberspace, and strategic decision-making to prepare Soldiers to navigate the complex legal landscape of cyber operations.

Address Recruitment and Retention. The Army must compete with the private sector for skilled cyber professionals. Providing competitive incentives, clear career paths, and opportunities for collaboration with industry partners can help retain talent. The National Academies note that federal agencies struggle to recruit and retain cyber talent due to the attractive compensation and flexibility offered by private industry (National Academies of Sciences, Engineering, and Medicine, 2021). Strategies such as flexible assignments, partnerships with industry and academic institutions, and recognition of cyber expertise can improve retention and attract qualified personnel.

Conclusion

Addressing the challenges of training IT and cyber warriors for multi-domain operations requires a multifaceted approach. The Army must develop adaptive curricula, provide realistic hands-on training, encourage interdisciplinary collaboration, foster continuous education, and integrate ethical and legal considerations. By adopting these recommendations, TRADOC can ensure that IT and cyber Soldiers are prepared to defend DODIN and deter adversaries in cyberspace.

About the author

Arinze is a U.S. Army Cyber Officer (17A) and certified Senior Host Analyst with extensive experience in Tactical Cyber/CEMA and Defensive Cyberspace Operations (DCO). Currently serving as the Commander of HQ&A Company, 551 Signal Battalion, he leads and develops teams while focusing on the improvement of processes and strategic priorities. Arinze’s background includes leading mission planning and execution, developing intelligence products, and collaborating with high-level command staff at ARCYBER. He holds certifications including PMP, CISSP, CCNA, and SAP.

Arinze’s academic credentials include a Bachelor of Science in Accounting, a Post-Baccalaureate degree in Enterprise Resource Planning, and a Master of Business Administration with a concentration in Accounting. He is currently a doctoral candidate, pursuing a PhD in Digital Forensics, with research interests in threat hunting, incident response, and computer forensics – areas he also actively pursues as a personal hobby.