Current courses I'm working on
“Understanding by Design is a book written by Grant Wiggins and Jay McTighe that offers a framework for designing courses and content units called “Backward Design.” Instructors typically approach course design in a “forward design” manner, meaning they consider the learning activities (how to teach the content), develop assessments around their learning activities, then attempt to draw connections to the learning goals of the course. In contrast, the backward design approach has instructors consider the learning goals of the course first. These learning goals embody the knowledge and skills instructors want their students to have learned when they leave the course. Once the learning goals have been established, the second stage involves consideration of assessment. The backward design framework suggests that instructors should consider these overarching learning goals and how students will be assessed prior to consideration of how to teach the content. For this reason, backward design is considered a much more intentional approach to course design than traditional methods of design.”-- https://cft.vanderbilt.edu/guides-sub-pages/understanding-by-design/
Below is an example of how I used
backward design to plan a cybersecurity learning activity for a cybersecurity nonprofit organization.
Stage
1—Environmental Scan (Rich Picture)/To illustrate the main elements &
relationships to be considered in creating the situation we desire.
“We are
interested in a situation that: (1) produces skilled, diverse cybersecurity
candidates, (2) diversifies the cybersecurity talent pipeline and (3) narrows
the cybersecurity skills gap.”
·
Enhanced
digital citizens
·
We
are collaborators
·
Learners
have a choice to self-imposed constraints
Stage 1—Stakeholders
Stakeholder Role |
Influence and/or have an impact on |
Stake (material and non-material
interests) |
|
Chief Information Security Officer |
Cyber-L design and outcomes; organization’s decision-making
environment |
Skilled candidates |
|
Cyber-L Participant |
Cyber-L design and outcomes; learning artifacts; marketing |
Diverse candidates |
|
Chief Risk Officer |
Cyber-L design |
Diversified talent pipeline |
|
Cyber team (staff) |
Learning transfer environment;
|
Narrowed skills gap |
|
Organizational Leaders (CEO) |
Choice of development programs; organization’s decision-making
environment; absorptive capacity |
Business continuity; Organization’s reputation; Access to quality information for
decision-making |
|
|
|||
Enablers 1.
Demonstrate expert awareness of core
cybersecurity theory that encompass standards related to NICE 2.
Gain access to quality information
for decision-making 3.
Gain employment in a cybersecurity
decision-making position 4.
Produce a portfolio of work
as evidence of learning and proficiency |
|||
ESSENTIAL
BELIEFS AND AWARENESS Learners
will believe… ·
They are cybersecurity professionals ·
They are needed to protect valued assets ·
They are worth the time, effort and
compensation ·
They are part of an elite group of
professionals Learners
will understand… ·
The global cybersecurity landscapes ·
Pain points of those will valued assets ·
The pros and cons of cyberspace ·
Their function in the system ·
The knowledge and skills (technical and soft)
they need to make a significant impact on keeping the landscape safe |
ESSENTIAL
QUESTION (S) Together
we will consider… As a civilian… What was your
role in the system? What were
your decision-making functions in the system? What were
your valued information assets? What does
security feel like? What happens
in uncertainty? As a Cyber Professional… What is your
role in the system? What is your
decision-making function in the system? What are your
valued information assets? What does
security feel like? What is the
role of the NICE framework in the system? Who needs
your advanced/expert awareness? |
||
Learners Proof-of-Work Learners
will demonstrate that they have advanced or expert awareness of… The NICE
principles The state of
cybersecurity in the federal government The “pain
points” of potential clients/customers Their
function in the workplace And
can do…with this mindset Maintain
contextual awareness of what’s going on Practice
empathy with clients/customers Seek out
information from varied perspectives Trust your
team Be decisive |
|||
Stage 2—Assessment Evidence
Assessment Measure (s) Tasks
to produce the evidence needed to determine learners’ beliefs and knowledge: ·
Knowledge tests ·
Decision assessment (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3817076/) ·
Lego Serious Play ·
Visual thinking (graphs) ·
Debate (verbal and written) ·
Social Media posts ·
Question Formulation Technique (QFT) ·
Decision Framework ·
Personal presentation by actual customers
(e.g., risk managers, employees) ·
Videos ·
Case Studies |
Evidence Provided
by the learner in response to learning opportunities and challenges. Measures
will illicit this evidence. ·
90% of learners will pass knowledge tests ·
100% of learners will represent ideas with
Legos (Lego Serious Play) ·
100% of learners will graphically represent
their growing/declining awareness of NICE principles ·
60% of learners will express their thoughts
about decision-making as it relates to the topics (verbally and in writing) ·
100% of learners will complete a decision
framework ·
50% of learners will share their work ideas
with their network (work and non-work) ·
100% of learners will formulate new questions
about the content and way forward ·
Case study analysis (Rubric) |
Stage 3
What
concepts, terms and relationships will they understand and remember? NICE
framework What concepts
and tools with they use/practice? NICE
framework The decision
about how to apply it support business/mission
decisions prioritize
cybersecurity activities, enabling organizations to make informed decisions
about cybersecurity expenditures Framework
uses risk management processes to enable organizations to inform and
prioritize decisions regarding cybersecurity enabling risk
management decisions, Cellular
devices/laptops decision
making about how to manage cybersecurity risk, as well as which dimensions of
the organization are higher priority and could receive additional resources What
concepts/subjects will they relate
to other concepts/subjects? The
relationship between cybersecurity risk and organizational objectives is
clearly understood and considered when making decisions What personal and social implications come
with the new awareness? Where will
the find instrumental value? How will they
know how to keep learning? |
Significant Learning Taxonomy
1.
Demonstrate expert awareness of core
cybersecurity theory that encompass standards related to NICE
2.
Gain access to
quality information for decision-making
3.
Gain employment in a cybersecurity
decision-making position
4.
Produce a portfolio of work as evidence of
learning and proficiency
M More courses I'm working on...
Also, if you create cybersecurity training, want better business outcomes, and better performance at work, come see me on my Everyone Deserves an Ypifany (pronounced "epiphany") Youtube Channel
Want Coaching?
If you would like phone coaching and other coaching opportunities with me, schedule time here
Comments
Post a Comment