Slicer

From Vast Empire Wiki
Jump to: navigation, search

Requirement[edit]

Completion of Communications Technician course. Trooper must also have 6 months or greater active service, plus approval or recommendation from the Specialty Coordinator.

Description[edit]

Blasters and overwhelming force of numbers does not always do the job in battle. Indeed, as the Civil War progresses, it is obvious that our forces need to fight more intelligently – using every tool available. The slicer, once known as a behind-the-scenes entity, has made it to the front lines. Starships, hovertanks, military emplacements, even secured homes all use technology to control, assist and protect beings and assets. The trooper who can gain easy access to an objective is one who helps his team avoid unnecessary firefights. From a basis of communications technician, a slicer is trained in the finer elements of electronics and computers. Much like a jedi, the final test is the creation of a personally designed slicing computer and a moniker under which to operate.

Possible MOS Paths[edit]

  • 74Z Information Warfare Chief
  • 74S Combat Slicer
  • 74E Network Security Expert
  • 74D Cipheranalyst
  • 74C Cryptographer
  • 74B Information Warfare Specialist

Story Listing (In Order)[edit]

Level 0: Certified Communications Technician

Upon entry into the field of slicer, trooper must have already completed the Communications Technician course, and be fully-trained in all the skills. Troopers will be expected to have mastery over all of these skills, and be ready to not only use; but improve upon those skills.

Level 1: Advanced Computer Skills

Having learned the basics as a comm. tech, trooper will learn how to make better use of their computer. To a slicer, the computer can not only be an invaluable asset; it can be a weapon. These next few exercises will not only demonstrate proper usage, but how to find things out behind enemy lines.

Skills Earned:

Computer Repair
Computer Restoration
Computer Assembly

Story 1: Advanced Computer Operation
Story 2: Computer Repair

Level 2: Database and Holonet Usage

As a slicer, you must be able to navigate your way around both databases and the Holonet/Infonet. These skills will be handy at when you get to do basic slicing of enemy computers for data-retrieval.

Skills Earned:

Database Navigation
Database Information Retrieval
Holonet/Infonet Navigation
Holonet/Infonet Information Retrieval

Story 1: Database Access/Search Routines
Story 2: Holonet/Infonet Investigation, Search, & Research

Level 3: Network Security Skills

Slicers must know how to get around even the toughest form of security, but at the same time: they must be able to set up security to protect themselves and others. These next few exercises will allow the trooper to practice doing just that.

Skills Earned:

Message Decryption
Security Bypass
Encryption Decoding
Message Interception (requires level 4)

Story 1: Decoding Techniques
Story 2: Security Encryption/Evasion Enabling

Level 4: Advanced Security Skills

Having touched the surface of security in the previous exercises, you will now delve deeper into the field of security. This next pair of excercises will expose you to more complicated Cryptographic techniques, as well as other such exercises.

Skills Earned:

Code Knowledge
Breaking Coded Messages
Creating Coded Messages
Receiving Coded Messages

Story 1: Mnemonic Drug Therapy
Story 2: Improved Cryptographic Techniques

Level 5: Computational Understanding I

In order to be a proper slicer, a trooper must delve themselves deep into Computational understanding. This will require you to have a good understanding of formulas and how to arrive at them for what purpose. The next two exercises will re-enforce this.

Skills Earned:

Advanced Code Understanding
Code Making
Code Language

Story 1: Cipher analysis Techniques
Story 2: Stenographic Techniques

Level 6: Computational Understanding II; Computational Maths

In these next exercises, you will learn how to write a program called an Algorithm. It can help in many of the formulas that may be presented to you.

Skills Earned:

Code Cipher Programming
File Compression
Code (Cipher) Programming

Story 1: Cryptographic Algorithm
Story 2: Compression Algorithm

Level 7: Computational Understanding III; Systems Specifics

By now you should pretty-well know how to use and operate your computer. You still have much to learn though. You should also know how to take care of the insides of your computer. These next few courses will give you a basic run-through of what type of electronic equipment you’re dealing with, and how to detect irregular patterns in your system.

Skills Earned:

Advanced Hardware Knowledge
Pattern Recognition

Story 1: Advanced Electronics
Story 2: Pattern Recognition

Level 8: Computer Upkeep

By this point in time, the amount of training you’ve done is starting to wear on your computer from so much runtime and so much abuse. In this course and the next you will now be taught how to design and add onto your computer, as well as repair its’ physical components and the system code, should your slicing practice damage it.

Skills Earned:

Hardware Maintainance
Software Maintainance
Advanced Hardware and Software Design

Story 1: Computer Engineering
Story 2: Computer Systems Design

Level 9: Computer Languages
By now you should be able to do basic upkeep of your computer, but you need to be able to understand the language in which the computer speaks. Not only should you be able to recognize basic computer errors, but you should be able to program the computer to fix the errors and write programs to help you out in your study.

Skills Earned:

Language Knowledge (Binary, Hexadecimal, etc) Language Recognition

Story 1: Computer Programming/Repair
Story 2: Programming languages

Level 10: Electronic Maintenance

Most Combat Engineers know this skill, and it really isn’t that hard: but it is important for you to learn how to maintain your computer along the lines of electronics.

Story 1: Electronics Design/Craft
Story 2: Electronics Repair

Level 11: Enhanced Security Skills

Security is a big risk when working off a computer. The last thing you want is for someone to compromise the security on your computer. Your entire attack plan as well as other information can be used against you.

Story 1: Security Devices
Story 2: Digital Forgery

Level 12: Basic Attack Skills

Now that you’ve learned how to keep your PC safe from other attacks, it’s now time to show you how to do some damage. Granted, it won’t be enough to cripple your enemy’s computer just yet; but you will be able to do a fair amount of damage to the enemy’s computer.

Story 1: Slicing Techniques
Story 2: Voral Construction and Defense


Certification Exam