- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of cybersecurity and privacy principles.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of specific operational impacts of cybersecurity lapses.
- Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain.
- Knowledge of the organization's core business/mission processes.
- Knowledge of emerging security issues, risks, and vulnerabilities.
- Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes).
- Knowledge of computer based training and e-learning services.
- Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne's Events of Instruction, Kirkpatrick's model of evaluation).
- Knowledge of learning levels (i.e., Bloom's Taxonomy of learning).
- Knowledge of Learning Management Systems and their use in managing learning.
- Knowledge of modes of learning (e.g., rote learning, observation).
- Knowledge of organizational training and education policies, processes, and procedures.
- Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.
- Knowledge of principles and processes for conducting training and education needs assessment.
- Knowledge of relevant concepts, procedures, software, equipment, and technology applications.
- Knowledge of Test & Evaluation processes for learners.
- Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.
- Knowledge of an organization's information classification program and procedures for information compromise.
- Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.
Cyber Instructional Curriculum Developer
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
- Skill in developing and executing technical training programs and curricula.
- Skill in identifying gaps in technical capabilities.
- Skill in talking to others to convey information effectively.
- Skill in applying technical delivery capabilities.
- Skill in identifying gaps in technical delivery capabilities.
- Skill in utilizing feedback to improve processes, products, and services.
- Ability to develop curriculum that speaks to the topic at the appropriate level for the target audience.
- Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
- Ability to prepare and present briefings.
- Ability to produce technical documentation.
- Ability to apply principles of adult learning.
- Ability to develop clear directions and instructional materials.
- Ability to develop curriculum for use within a virtual environment.
- Ability to apply the Instructional System Design (ISD) methodology.
- Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.
- Ability to operate common network tools (e.g., ping, traceroute, nslookup).
- Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.
- Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
- Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
- Ability to apply critical reading/thinking skills.
- Ability to evaluate information for reliability, validity, and relevance.
- Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
- Ability to tailor technical and planning information to a customer's level of understanding.
- Ability to think critically.
- Ability to monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.
- Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target.
- Ability to understand technology, management, and leadership issues related to organization processes and problem solving.
- Ability to understand the basic concepts and issues related to cyber and its organizational impact.
- Ability to conduct training and education needs assessment.
- Support the design and execution of exercise scenarios.
- Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.
- Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
- Research current technology to understand capabilities of required system or network.
- Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction.
- Conduct learning needs assessments and identify requirements.
- Create interactive learning exercises to create an effective learning environment.
- Develop or assist in the development of training policies and protocols for cyber training.
- Develop the goals and objectives for cyber curriculum.
- Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment in conjunction with educators and trainers.
- Correlate training and learning to business or mission requirements.
- Create training courses tailored to the audience and physical environment.
- Design training curriculum and course content based on requirements.
- Participate in development of training curriculum and course content.
- Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions).
- Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).
- Develop or assist with the development of privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations.