Archive

Cryptologic Technician (Networks) (CTN) Archive 

This archive contains all of the topics that have been rotated through the Cryptologic Technician (Networks) (CTN) Navy Wide Advancement Exam since 2015. We are only including the most current versions that we have of the references. The exam writers typically pull questions out of the same pool of questions that are mostly from the same references each cycle. They may pull questions from different chapters, versions, or newer versions of references but the topics don’t change that much. If you spend time mastering everything on this page year round you will always be ready to ace the advancement exam rather than trying to cram four months before the exam. Study this page all year and then specifically focus on the bib once it comes out and watch your scores improve.

This archive can also be used to study from when you are waiting for us to upload the new bibs, to get ahead of the curve for the next test cycle before the bibs are released, if there are any changes to your bib that we don’t have, or if you just want to study anything pertaining to your rating that isn’t on your most recent bib.

Advancement Exam bibliographies always come out in April, July, and October for the Active Duty exams. First time exam takers always have a huge advantage over other people because they are not waiting to start studying until after the advancement exam results are released two months after the bibs come out. Do yourself a favor and study a little bit each day and take advantage of the full six months of prep time you are given. Prepare today to succeed tomorrow!

Note: Some references can not be posted due to classifications, copyrights, or distribution statements.

Occupational References

AGILITY HOMEPAGE, NSANET

ARCHITECTURE OF COMPUTER HARDWARE AND SYSTEMS SOFTWARE

Reference |

BLINDDATE HOMEPAGE, NSANET

C HOW TO PROGRAM

Reference |

C10F NAVY DEFENSIVE CYBERSPACE OPERATIONS (DCO) CONCEPT; NSANET

CADENCE HOMEPAGE; CADENCE 8.7 USER’S MANUAL

CADENCE USER GUIDE 8.7, NSANET

CJCSI 3121.01B ENCLOSURE (L), STANDING RULES OF ENGAGEMENT/STANDING RULES OF THE USE OF FORCE FOR U. S. FORCES

Reference | Reviews | Sample Quiz | Randomized Quiz | Comprehensive Exam | Speed Quiz | Flashcards | Enclosure A: Quiz 1 | Enclosure J : Quiz 1 | Enclosure L: Quiz 1

CJCSI 6510.01E, INFORMATION ASSURANCE (IA) AND COMPUTER NETWORK DEFENSE (CND)

Reference |

CJCSM 6510.01B, DEFENSE-IN-DEPTH: INFORMATION ASSURANCE (IA) AND COMPUTER NETWORK DEFENSE (CND)

Reference | Quiz Reviews | Sample Quiz | Randomized Quiz | Enclosure A: Quiz 1 | Enclosure B: Quiz 1 | Enclosure B: Quiz 2 | Enclosure C: Quiz 1 | Enclosure D: Quiz 1 | Enclosure E: Quiz 1 | Enclosure F: Quiz 1 | Enclosure G: Quiz 1

Audio Study Guide: Comprehensive | Enclosure A | Enclosure B | Enclosure C | Enclosure D | Enclosure E | Enclosure F | Enclosure G

CISCO IOS IN A NUTSHELL, A DESKTOP QUICK REFERENCE FOR IOS ON IP NETWORKS

Reference |

COMFLTFORCOMINST 4790.3, VOL VI, JFMM – MAINTENANCE PROGRAMS

COMPTIA A+ COMPLETE STUDY GUIDE

COMPTIA NETWORK+ CERTIFICATION GUIDE

Reference |

COMPTIA SECURITY+ CERTIFICATION STUDY GUIDE

Reference |

DEFENSIVE CYBERSPACE OPERATIONS (DCO) TASK FORCE, P 131422Z JAN 11

DEPLOYABLE SECURITY TRAINER, OCTOBER 2012

Reference |

DIGITAL ARCHAEOLOGY: THE ART AND SCIENCE OF DIGITAL FORENSICS

Reference |

DISCRETE MATHEMATICS

Reference |

DJSIG, DOD JOINT SECURITY IMPLEMENTATION GUIDE

DOD 5105.21 VOL 1, SENSITIVE COMPARTMENTED INFORMATION ADMINISTRATIVE SECURITY MANUAL: ADMINISTRATION OF INFORMATION AND INFORMATION SYSTEMS SECURITY

Reference |

DOD 5105.21 VOL 2, SENSITIVE COMPARTMENTED INFORMATION ADMINISTRATIVE SECURITY MANUAL: ADMINISTRATION OF PHYSICAL SECURITY, VISITOR CONTROL, AND TECHNICAL SECURITY

Reference |

DOD 5105.21 VOL 3, SENSITIVE COMPARTMENTED INFORMATION ADMINISTRATIVE SECURITY MANUAL: ADMINISTRATION OF PERSONNEL SECURITY, INDUSTRIAL SECURITY, AND SPECIAL ACTIVITIES

Reference |

DOD 5205.02-M, DOD OPERATIONS SECURITY (OPSEC) PROGRAM MANUAL

Reference |

DOD DIRECTIVE 3600.1, INFORMATION OPERATIONS

Reference |

DOD INSTRUCTION O-8530.2, SUPPORT TO COMPUTER NETWORK DEFENSE (CND)-(controlled document)

DOD INSTRUCTION S-3600.2, INFORMATION OPERATIONS SECURITY CLASSIFICATION GUIDANCE-(controlled document)

DODM 5200.1 VOL 1, DOD INFORMATION SECURITY PROGRAM: OVERVIEW, CLASSIFICATION, AND DECLASSIFICATION

Reference |

DODM 5200.1 VOL 2, DOD INFORMATION SECURITY PROGRAM: MARKING OF CLASSIFIED INFORMATION

Reference |

DODM 5200.1 VOL 3, DOD INFORMATION SECURITY PROGRAM: PROTECTION OF CLASSIFIED INFORMATION

Reference |

EKMS 1B, EKMS POLICY AND PROCEDURES FOR NAVY ELECTRONIC KEY MANAGEMENT SYSTEM TIERS 2 & 3

ESSENTIAL LINUX ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS

Reference |

EXECUTIVE ORDER (EO) 12333, UNITED STATES INTELLIGENCE ACTIVITIES

Reference |

FILE SYSTEM FORENSIC ANALYSIS

Reference |

FOXTRAIL USER’S GUIDE; NSANET

FROM GSM TO LTE

GATEKEEPER HOMEPAGE, NSANET

GOOGLE HACKING FOR PENETRATION TESTERS

Reference |

GRAY HAT HACKING, THE ETHICAL HACKER`S HANDBOOK

Reference |

IC TECH SPEC FOR ICD/ICS 705, TECHNICAL SPECIFICATIONS FOR CONSTRUCTION AND MANAGEMENT OF SENSITIVE COMPARTMENTED INFORMATION FACILITIES, VERSION 1.2

IMPLEMENTING CISCO IOS NETWORK SECURITY FOUNDATION LEARNING GUIDE, SECOND EDITION

Reference |

INTRUSION SIGNATURES AND ANALYSIS

Reference |

IP ADDRESSING FUNDAMENTALS

ISS 103-11, POLICY FOR INCLUSION OF SPECIFIC COMMUNICATIONS AND TECHNICAL INFORMATION IN REPORTS AND RESPONSES TO CUSTOMERS

JOINT PUB 2-01, JOINT AND NATIONAL INTELLIGENCE SUPPORT TO MILITARY OPERATIONS

Reference |

JOINT PUB 3-0, JOINT OPERATIONS

Reference |

JOINT PUB 3-09, JOINT FIRE SUPPORT

Reference |

JOINT PUB 3-12(R), CYBERSPACE OPERATIONS

Reference |

JOINT PUB 3-13, JOINT DOCTRINE FOR INFORMATION OPERATIONS

Reference |

JOINT PUB 3-13.1, ELECTRONIC WARFARE

Reference |

JOINT PUB 3-13.2, MILITARY INFORMATION SUPPORT OPERATIONS

Reference |

JOINT PUB 3-60, JOINT TARGETING

Reference |

JOINT PUB 5-0, JOINT OPERATION PLANNING

Reference |

LEARNING PERL

Reference |

LINUX IN A NUTSHELL, 6TH EDITION

Reference |

LINUX POCKET GUIDE, 2ND EDITION

Reference |

MARKING CLASSIFIED NATIONAL SECURITY INFORMATION

METASPLOIT PENETRATION TESTING

Reference |

MICROSOFT WINDOWS INTERNALS, 5TH EDITION

Reference |

MIL-STD 2042, FIBER OPTIC CABLE TOPOLOGY INSTALLATION STANDARD METHODS FOR NAVAL SHIPS

MIL-STD-1310H(NAVY), SHIPBOARD BONDING, GROUNDING, AND OTHER TECHNIQUES FOR ELECTROMAGNETIC COMPATIBILITY, EMP MITIGATION, AND SAFETY

MISSION DATA REPOSITORIES, NSANET

NATIONAL SIGINT REQUIREMENTS PROCESS (NSRP) HOMEPAGE, NSANET

NETWORK INTRUSION DETECTION, THIRD EDITION

Reference |

NETWORK SECURITY THROUGH DATA ANALYSIS

Reference |

NETWORKING BIBLE

Reference |

NTTP 2-02.1, STRIKE GROUP AND UNIT LEVEL CRYPTOLOGIC OPERATIONS

NTTP 3-13.1, THEATER AND CAMPAIGN INFORMATION OPERATIONS PLANNING

NTTP 3-13.2, NAVY INFORMATION OPERATION WARFARE COMMANDER`S MANUAL

NTTP 3-13.10, SUBMARINE ELECTRONIC WARFARE

NTTP 3-58.1, NAVY MILITARY DECEPTION

NWP 3-12, CYBERSPACE OPERATIONS

NWP 3-63, COMPUTER NETWORK OPERATIONS VOL. I

NWP 5-01, NAVY PLANNING

Reference |

OPERATING SYSTEM CONCEPTS, 9TH EDITION

Reference |

OPNAVINST 3432.1A, OPERATIONS SECURITY

Reference |

PENETRATION TESTING AND NETWORK DEFENSE

Reference |

PINWALE QUICK REFERENCE CARD, NSANET

ROUTERS AND ROUTING BASICS

ROUTING AND SWITCHING ESSENTIALS COMPANION GUIDE

Reference |

SECNAV M-5510.30, DEPARTMENT OF THE NAVY PERSONNEL SECURITY PROGRAM

Reference | Quiz Reviews | Sample Quiz | Randomized Quiz | Comprehensive Exam | Flashcards | Chapter 1: Quiz 1 | Chapter 1: Quiz 2 | Chapter 2: Quiz 1 | Chapter 3: Quiz 1 | Chapter 4: Quiz 1 | Chapter 5: Quiz 1 | Chapter 6: Quiz 1 | Chapter 6: Quiz 2 | Chapter 7: Quiz 1 | Chapter 8: Quiz 1 | Chapter 9: Quiz 1 | Chapter 10: Quiz 1 | Chapter 11: Quiz 1

Audio Study Guide: Comprehensive | Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 | Chapter 9 | Chapter 10 | Chapter 11

SECNAV M-5510.36, DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM

Reference | Quiz Reviews | Sample Quiz | Randomized Quiz | Comprehensive Exam | Flashcards | Chapter 1: Quiz 1 | Chapter 1: Quiz 2 | Chapter 2: Quiz 1 | Chapter 3: Quiz 1 | Chapter 4: Quiz 1 | Chapter 4: Quiz 2 | Chapter 5: Quiz 1 | Chapter 6: Quiz 1 | Chapter 6: Quiz 2 | Chapter 7: Quiz 1 | Chapter 7: Quiz 2 | Chapter 8: Quiz 1 | Chapter 9: Quiz 1 | Chapter 10: Quiz 1 | Chapter 10: Quiz 2 | Chapter 11: Quiz 1 | Chapter 12: Quiz 1

Audio Study Guide: Comprehensive | Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | Chapter 5 | Chapter 6 | Chapter 7 | Chapter 8 | Chapter 9 | Chapter 10 | Chapter 11 | Chapter 12

SECNAVINST 5239.3B, DEPARTMENT OF THE NAVY INFORMATION ASSURANCE (IA) POLICY

Reference |

SECURITY+ CERTIFICATION (SYO-401) (JULY 2015)

Reference |

SNORT COOKBOOK

Reference |

SWITCHING BASICS AND INTERMEDIATE ROUTING

Reference |

THE BOOK OF WIRELESS, A PAINLESS GUIDE TO WI-FI AND BROADBAND WIRELESS

Reference |

THE TCP/IP GUIDE, A COMPREHENSIVE, ILLUSTRATED INTERNET PROTOCOLS REFERENCE

TOOL 2009, INTRODUCTION TO PINWALE STUDENT GUIDE

TREASUREMAP HOMEPAGE, NSANET

U.S. TENTH FLEET OPERATIONS ORDER 12-001 GLOBAL NETWORK HARDENING

UNDERSTANDING IP ADDRESSING

UNIX/LINUX SURVIVAL GUIDE

UNIX AND LINUX SYSTEM ADMINISTRATION HANDBOOK

UNIX QUICK GUIDE

Reference |

UNTANGLING THE WEB

U.S. TENTH FLEET OPERATIONS ORDER 12-001 GLOBAL NETWORK HARDENING

USSID CR1400

USSID CR1501

USSID DA3110

USSID DA3655

USSID SE2000

USSID SE4000

USSID SG5000

USSID SP0002

USSID SP0003

USSID SP0018

USSID SP0019

UTT REALMS USER MANUAL VER. 4.2

UTT – UNIFIED TARGETING USER’S MANUAL VER. 4.4, NSANET

WI-FOO THE SECRETS OF WIRELESS HACKING

WINDOWS 2000 COMMANDS POCKET REFERENCE

Reference |

WINDOWS INTERNALS, SIXTH EDITION, PART 1

Reference |

WINDOWS INTERNALS, SIXTH EDITION, PART 2

Reference |

XKEYSCORE HOMEPAGE, NSANET

YOUR UNIX, THE ULTIMATE GUIDE