Skip to main content

Home/ NBISE Institute/ Group items tagged Development

Rss Feed Group items tagged

dhtobey Tobey

Time to Move to Competency-Based Continuing Professional Development « Educat... - 0 views

    • dhtobey Tobey
       
      A similar approach to GTED for teacher continuing education. Perhaps there is something to learn from this approach to competency modeling.
  • In 2008 UNESCO, in partnership with Microsoft, Intel, Cisco, and ISTE, formalized the UNESCO ICT Competency Framework for Teachers (ICT-CFT) with an aim to measure the ICT proficiency of teachers against a common international standard and to aid in their professional development
  • Often, the word competency and skill are used interchangeably. While they are related, they are not the same. A competency is a demonstrated ability to perform a particular job or task. A competency includes skills, but also behaviors and the ability to apply those skills in order to perform a job or task
  • ...1 more annotation...
  • In closing, effective competency-based professional development includes the following components: Adoption of a common set of competency standards defined by role. A computer science teacher may require different competencies contained in the ICT-CFT than a 3rd grade literacy teacher. Teachers identify areas where they need competency improvement. A rich and varied set of aligned resources is provided to teachers to fill those competency gaps which could include job shadowing, classes, workshops, or eLearning. Improved teacher competencies are verified through assessments, observation, or portfolio work. Peer support or mentoring is offered to help teachers carry forward ICT use to the classroom. Teacher competency development is refined and iterated in a continuous-improvement cycle.
dhtobey Tobey

Emulab.Net - Emulab - Network Emulation Testbed Home - 0 views

  • Emulab is a network testbed, giving researchers a wide range of environments in which to develop, debug, and evaluate their systems. The name Emulab refers both to a facility and to a software system. The primary Emulab installation is run by the Flux Group, part of the School of Computing at the University of Utah. There are also installations of the Emulab software at more than two dozen sites around the world, ranging from testbeds with a handful of nodes up to testbeds with hundreds of nodes.
  •  
    "Emulab is a network testbed, giving researchers a wide range of environments in which to develop, debug, and evaluate their systems. The name Emulab refers both to a facility and to a software system. The primary Emulab installation is run by the Flux Group, part of the School of Computing at the University of Utah. There are also installations of the Emulab software at more than two dozen sites around the world, ranging from testbeds with a handful of nodes up to testbeds with hundreds of nodes."
  •  
    Possible testbed for developing performance-based exams and simulated learning platforms. Emulab underlies DHS' DETER testbed for research and development.
dhtobey Tobey

AA-ISP selects BrainX On-line System for CISP® Accreditation Program | Press ... - 0 views

  • We felt a need to both identify and then test the set of competencies and skills required at the individual rep level”, stated Reeves. AA-ISP Founder and CEO, Bob Perkins goes on to note, “For years corporations have made significant investments in hiring, training, and on-boarding inside sales professionals. Yet there remains a need to, quantify, measure, and then test these skills to assure an individual was competent. We selected BrainX [www.BrainX.com] because their unique on-line learning system. If a salesperson doesn’t meet the required knowledge and skill level the BrainX on-line learning system builds a personal set of Sales Courses and simulations to help the salesperson master the required knowledge and skills so they can pass the accreditation requirements.
  • Bruce Lewolt the CEO of BrainX says he is proud that an organization that understands the world of sales training as well as the AA-ISP would recognize the value of personalized sales training that is mastery based
  • Lewolt agrees and added that it is only with this level of mastery that the conscious centers of the brain are freed up to really listen to what the customer is saying well enough to be able to read between the lines and figure out what it really driving the customer
  • ...2 more annotations...
  • The BrainX On-line Learning system is an intelligent system that uses a series of knowledge, skill and belief assessments and builds a cognitive learning profile on each learner. The BrainX Digital Tutor uses the first set of assessments to figure out just what each sales person should focus on and combines this with the personal cognitive profile to mold the delivery of the lesson content and simulations in a way that helps each individual master the required set of skills and competencies in the shortest amount of time so they can obtain their CISP®.
  • About BrainX BrainX is the next generation of online learning and Talent Management! BrainX is the first system to combine patented intelligent learning technology with mastery-based, learning strategies. BrainX participated in the landmark research on the neurobiology of effective sales training and used this research to design the BrainX system. The result is a system that accepts any type of content (e.g. product training, sales training, negotiation training) and stores the content in a way that allows the BrainX Digital Tutor to understand the content. The BrainX system figures out just what each person already knows along with what they need to learn. The system uses this information along with the understanding of the lesson content to build personalized lessons that teach each person just what they need: to know; to be able to do; and to believe about why something needs to be done in the correct way. With BrainX the days of one size fits all sales training courses are gone forever. The BrainX system also builds a cognitive learning profile on each learner and uses this information to customize the way lessons are taught and to determine how much post lesson reinforcement each sales person needs. This approach is so effective that when compared to traditional online learning, BrainX users achieve mastery in 50% less time. www.BrainX.com
  •  
    Brain-X appears to be a system worth investigating as we develop tools to support assessment-based development.
Michael Assante

Enhancing the Cyber Workforce - 1 views

  •  
    Our IEEE paper on workforce development
dhtobey Tobey

Skills Framework for the Information Age - 0 views

  • The Skills Framework for the Information Age (SFIA) provides a common reference model for the identification of the skills needed to develop effective Information Systems (IS) making use of Information Communications Technologies (ICT). It is a simple and logical two-dimensional framework consisting of areas of work on one axis and levels of responsibility on the other.
  • SFIA enables employers of IT professionals to carry out a range of HR activities against a common framework of reference - including skill audit, planning future skill requirements, development programmes, standardisation of job titles and functions, and resource allocation.
  •  
    European initiative to catalog and rank information technology skills
dhtobey Tobey

Cyber security certification program launches | ISA - 0 views

  • Sypris Electronics, LLC, a subsidiary of Sypris Solutions, Inc. partnered with Career Technical Education Foundation, Inc. (CTEF) and The MITRE Corporation to develop, establish, and host a cyber security curriculum for local and national high school students. The curriculum was co-developed by Sypris, MITRE, and CTEF, and it is under evaluation by (ISC)².
  • Students who successfully pass the program, along with a Systems Security Certified Practitioner (SSCP) certification exam, will become an Associate of (ISC)² toward the SSCP certification, an opportunity not currently available to any other high school students in the nation.
  • There is no other cyber security curriculum available for secondary education anywhere in the country, and we are the first to make it available,” said Paul Wahnish, president of CTEF
dhtobey Tobey

Cyberlearning: Transforming Education (nsf10620) - 0 views

  • NSF 10-620
  • Research supported by the Cyberlearning program will explore the opportunities for learning made possible by new technologies, how to help learners capitalize on those opportunities, new practices that are made possible by learning technologies, and ways of using technology to promote deep and lasting learning of content, practices, skills, attitudes, and/or dispositions needed for engaged and productive citizenship. Cyberlearning research will marry what is known about how people learn with advances in information and communications technologies to advance understanding of how to cultivate a citizenry that engages productively in learning both in and out of school and throughout a lifetime; and that possesses the knowledge, knowledge building, collaboration and reasoning capabilities to make informed decisions and judgments about problems ranging from their immediate lives to ethics, privacy, and security concerns to global challenges such as war and peace, economics, health and wellbeing, and the environment.
  • The goals of the Cyberlearning program are: To better understand how people learn with technology and how technology can be used productively to help people learn, through individual use and/or through collaborations mediated by technology; To better use technology for collecting, analyzing, sharing, and managing data to shed light on learning, promoting learning, and designing learning environments; and To design new technologies for these purposes, and advance understanding of how to use those technologies and integrate them into learning environments so that their potential is fulfilled.
  • ...18 more annotations...
  • Every project should therefore seek to answer questions about how to better promote learning, how to promote better learning, or how learning happens in technology-rich environments (including exploring relationships between people and technology that result in productive learning and access provided with technology to learning resources, such as data and scientific information). Each project should also focus, concurrently, on innovative technology design, ways of coherently integrating technologies for learning, and/or the integration of such technology into targeted learning environments. Especially sought are projects in which technology allows the tailoring of learning experiences to special needs and interests of groups or individuals, as well as ways in which technology allows expanding education beyond classroom settings
  • It is expected that all projects will advance understanding about how people learn with technology, how to use technology to help people learn, and/or how to use technology to enhance assessment or education practices
  • These projects may be of several different types:
  • Proposals should make clear the roles of all team members (PIs, supporting investigators, advisors, and others), why the proposed team is an appropriate one, and what expertise each team member brings. Teams should include members who have experience with the learners and environments being targeted and who are expert at relevant engagement and learning issues. Proposers should make clear the challenges associated with assessment and evaluation, robustness and broader usability that they anticipate, and the team members that will help with each of these.
  • Project proposers should also include on their teams people who can help them plan towards fulfilling the transformational potential of their work, including, as appropriate, those who can help them transition their technology to broad use and those from stakeholder groups who will need to be integrated into the project as innovations move towards scalability, broad dissemination, and continuation over time.
  • Integration and Deployment Projects (INDP Projects)
  • Since successful collaborative research depends on thoughtful coordination mechanisms, a Collaboration Plan is required for all proposals involving multiple investigators. The length of and level of detail provided in the Collaboration Plan should be commensurate with the complexity of the collaboration.
  • They may advance understanding of how to productively integrate a variety of established technologies to better promote learning or promote better learning in a target population and environment. They may provide guidelines on extending the usage of some promising technology or technologies over a larger variety of learner populations, advancing understanding of how to better address learning needs of different populations. They may provide guidelines on extending the usage of some promising technology or technologies over a larger variety of learning contexts, advancing understanding of learning processes that underlie disciplinary areas or the constraints and affordances (opportunities offered) of different environments for learning. They may combine advances in two or more of these areas.
  • It is expected that technologies will be deployed and evaluated in a large variety of learning environments, that by the end of the project, the technology will be ready for technology transfer and commercialization, and that the guidelines proposed will be broadly applicable beyond the particular technology being deployed. By later years of the project, facilitation of technology use should be done by those who would naturally be the facilitators in the chosen learning environment (e.g., teachers, scout leaders, parents, peers). Formative analyses: As for DIP projects, formative analyses should answer questions about usability, learning, effective and sustained use, as well as issues associated with scale-up, sustainability, workforce development, and long-term efficacy (as appropriate).
  • It will be appropriate for many proposals to include the development of innovative curricula or educational materials in addition to proposing technological innovations.
  • A successful research project should be potentially transformative; grounded in existing learning and education research; seek to answer questions about learning with technology; measure learning gains, take into account appropriate elements of the learning ecology in designing its innovation, evaluating its innovation, and answering research questions; include team members with all necessary expertise, including expertise for outreach and dissemination; be aware of potential scalability and sustainability issues; and use appropriate methodologies to evaluate innovations and measure learning gains. Our expectation is that many grants made by this program will seed long-term research enterprises. The transformative potential of proposed projects may be many years out, so proposers should make clear what that potential is and the predicted time horizon.
  • Collaborative Proposals. All collaborative proposals submitted as separate submissions from multiple organizations must be submitted via the NSF FastLane system. Chapter II, Section D.4 of the Grant Proposal Guide provides additional information on collaborative proposals.
  • Proposal Titles: Proposal titles must begin with an acronym that indicates the categories in which proposals are being submitted, as follows Exploration Projects - EXP Design and Implementation Projects - DIP Integration and Deployment Projects - INDP
  • The acronym should be followed with a colon then the title of the proposed project. If you submit a proposal as one in a set of collaborative proposals, the title of your proposal should begin with the acronym that indicates the project category, followed by a colon, then "Collaborative Research" followed by a colon, and then the project title. For example, if you are submitting an Exploration Project, the title of each collaborative proposal would be EXP:Collaborative Research: Project Title.   Project Summary:  The Project Summary must include an explicit description of both the Intellectual Merit and Broader Impacts of the activities proposed, preferably in separate paragraphs titled "Intellectual Merit" and "Broader Impacts".   
  • Project Description: Project Descriptions should include the following sections: Vision and Goals. Describe: The theories of learning investigators are drawing from. Learning objectives: what learners are expected to learn and how the proposed innovation or its integration into the learning environment is expected to promote that learning. The population of learners, including any needs, abilities or interests relevant to achieving the learning objectives. How the proposed innovation is matched to the needs, abilities, and interests of targeted learners. Because deep understanding and facile capabilities emerge only over long periods of time, how the proposed innovation or its integration into some learning environment is expected to sustain engagement.
  • Research Plan and Outcomes. With appropriate references to the literature, describe the research questions to be answered through your research and a comprehensive research plan to answer them. Make clear the learning domain to be explored (e.g., content, subject matter, topics, skills, practices), and make a research-based case for the promise of the particular technological innovation for promoting learning in this domain. Describe the data to be gathered and analytic approaches to be taken to analyze the data.   It is anticipated that technological innovations will be iteratively refined over the course of the project based on analysis of formative data.  Describe the formative evaluation methodology you will use, including means to assess learning and engagement.  Describe the project outcomes you expect to generate, including products. Discuss how you will collect and analyze data to supply evidence of learning outcomes. Innovation Outcomes (For DIP and INDP projects ONLY). Describe how the proposed innovations and ways of integrating them into the learning environment take into account the environmental and human factors important to learner success (e.g., the cognitive, developmental, affective, and social needs of learners, the cultural milieu in which the learning technologies will be used, and the capabilities and expectations of human agents in the environment).  All claims about the appropriateness of the proposed innovation should be supported with evidence from the literature.
  • A Collaboration Plan is required for all proposals involving multiple investigators. The length of and degree of detail provided in the Collaboration Plan should be commensurate with the complexity of the proposed project.  Collaboration Plans should be included at the end of the Project Description in a section entitled "Collaboration Plan", and up to 3 additional pages are allowed for Collaboration Plans. The Collaboration Plan should describe: the specific roles of the project participants in all organizations involved; information on how the project will be managed across all the investigators, institutions, and/or disciplines; identification of the specific coordination mechanisms that will enable cross-investigator, cross-institution, and/or cross-discipline scientific integration (e.g., yearly workshops, graduate student exchange, project meetings at conferences, use of videoconferencing resources or social media technologies, software repositories, etc.); and specific references to budget line items that support collaboration and coordination mechanisms.
  • What is the intellectual merit of the proposed activity? How important is the proposed activity to advancing knowledge and understanding within its own field or across different fields? How well qualified is the proposer (individual or team) to conduct the project? (If appropriate, the reviewer will comment on the quality of the prior work.) To what extent does the proposed activity suggest and explore creative, original, or potentially transformative concepts? How well conceived and organized is the proposed activity? Is there sufficient access to resources? What are the broader impacts of the proposed activity? How well does the activity advance discovery and understanding while promoting teaching, training, and learning? How well does the proposed activity broaden the participation of underrepresented groups (e.g., gender, ethnicity, disability, geographic, etc.)? To what extent will it enhance the infrastructure for research and education, such as facilities, instrumentation, networks, and partnerships? Will the results be disseminated broadly to enhance scientific and technological understanding? What may be the benefits of the proposed activity to society?
  •  
    Checklist of sections to be addressed in the proposal
dhtobey Tobey

Security Training, CEH, Ethical Hacking, Penetration Testing, Certified Ethical Hacker,... - 0 views

  •  
    Potential partner in developing and distributing assessments targeting the entry level of operational security testing.
dhtobey Tobey

GIAC Security Expert (GSE) - 0 views

  •  
    Potential source of Competency Model Development Panel members.
dhtobey Tobey

Outgunned: How Security Tech Is Failing Us -- InformationWeek - 0 views

  • "Years ago when we started writing checks, we might have been tackling five to 10 a day," says Paul Wood, a senior analyst with Symantec Hosted Services. "It's now well over 10,000 a day and growing." According to McAfee's 2010 Q2 Threat Report, the company identified 10 million pieces of malware in the first half of this year and is tracking close to 45 million in its malware database.
  • Vulnerability assessment products are also behind the curve, as Greg Ose and Patrick Toomey, both Neohapsis application security consultants, found when they recently set out to measure the relative effectiveness of various vulnerability scanners. "It's a question frequently raised by our customers," Toomey says. "They know the tools aren't going to catch all of the problems, but can they count on them to catch, say, 80% of the bad ones?" What Ose and Toomey discovered was far worse than even they had anticipated. Out of the 1,404 vulnerabilities accounted for by the Common Vulnerabilities and Exposures project during the sample period, there were only 371 signatures. In the best cases, the tools were in the 20% to 30% effectiveness range.
  • Toomey's observations are in line with those of security researcher Larry Suto, who earlier this year reported that Web application vulnerability scanners missed almost half (49%) of the vulnerabilities present during his tests.
  • ...5 more annotations...
  • But there's also a new twist to consider: With an increased number of attackers targeting and hijacking the credentials of IT personnel, the outsider can become the insider, at least from the perspective of our technology controls. Forward-thinking companies will move now to address this scenario. Think about how you'll detect large, anomalous query spikes against key tables in sensitive databases. Ensure you can spot large-scale document downloads from file shares and internal document management systems. If a hijacked credential is used to log into a large number of machines during a short time frame, you should have the ability to spot that activity.
    • dhtobey Tobey
       
      Investing in workforce development and professionalizatino of the infosec workforce may do more.. combat ingenuity with ingenuity, not automation.
  • investing even a small percentage of your security budget in only a few specialized systems to help here will go further than throwing good money at yesterday's outdated controls.
  • Stop rewarding ineffectiveness and start rewarding innovation. Maybe right now you're struggling with a scary realization: "The millions I'm spending on firewalls and antivirus technology is relatively worthless if my adversary is skilled."
  • Greg Shipley is an InformationWeek contributor and a former CTO
dhtobey Tobey

2011 DHS S&T CSRD BAA - Federal Business Opportunities: Opportunities - 0 views

  • The Department of Homeland Security (DHS) Science and Technology (S&T) Homeland Security Advanced Research Projects Agency (HSARPA) Cyber Security Division's (CSD) announce a Broad Agency Announcement (BAA) for Fiscal Year 2011 to improve the security in both Federal networks and the larger Internet. This Broad Agency Announcement (BAA) seeks ideas and proposals for Research and Development (R&D) in 14 Technical Topic Areas (TTAs) related to CSD.
dhtobey Tobey

SkillsNET - 1 views

  • We worked with a company called SkillsNET® because its algorithm is linked to the Department of Labor statistics and standards. When you are done doing the Job Task Analysis (JTA), you take that data and apply it to the algorithm and out comes a series of SkillObjects. SkillObjects are simply a way of bundling knowledge, skills, abilities and training into small, manageable, chunks of human resource data… Because of the SkillObjects we know what skills they [sailors] will need… and since we are more effectively utilizing our manpower, we can then optimally man our units.” Commander, Naval Education and Training Command, Vice Adm. J. Kevin Moran at the FORCEnet Engineering Conference briefing the Sea Warrior vision
  • “The SkillsNET approach gives the United States Navy flexibility in defining the skills necessary for particular positions and providing training and career development opportunities tailored to individual service members.” Spokesperson, Naval Air Warfare Center “The company’s software helps employers compare what skills their employees need to what skills they actually have, and then devises a plan for bridging any gaps.” Dallas Business Journal
  •  
    Could these SkillObjects be converted into SCORM definitions for TestLets, CourseLets, and SimLets?
  •  
    Wow.. this reads like something you wrote almost.. !! "manageable chunks of HR data" .. I'll look into this and see if they share their schema / data model.. SK PS I'm guessing you have a google alert set for JTA :)
dhtobey Tobey

Cyber Hiring to Surge by 2015 - Wired Workplace - 0 views

  • The federal cybersecurity workforce could grow to more than 61,000 employees by 2015, in part due to new demands, such as mobile computing, cloud services and social media, according to a new report. The federal government-specific results of the 2011 Global Information Security Workforce Study, conducted by (ISC)2 and Frost & Sullivan, indicate that federal information security professionals are being stretched too thin by their work to secure the increasing amount of critical information flowing through government networks. The new demands placed on cyber professionals as a result of the government's push for mobile devices, cloud computing and social media could result in a federal cyber workforce that is 61,299 strong by 2015, the report noted. The survey of 145 C-level federal executives also found that the most serious challenges facing federal IT departments are application vulnerabilities (73 percent), mobile devices (66 percent), viruses and worm attacks (64 percent), cyber terrorism (58 percent) and internal employees (58 percent).
  • Hord Tipton, executive director of (ISC)2, said
  • "We need new people, and we need younger people," he said. "The government needs defined career paths to help find the skills it needs, get them classified, evaluate what those jobs are worth and put good standards in place." The study also found that certification is far more important to the federal government than it is to other sectors. For example, 63 percent of CIOs and CISOs said security certifications were "very important," compared to 45 percent of worldwide survey respondents.
dhtobey Tobey

Beyond Camping, Canoeing, Boy Scouts Add Robotics : NPR - 0 views

  • The Boy Scouts of America, which offers more than 120 badges ranging from archery to wilderness survival, next week will unveil a robotics merit badge meant to promote science, technology, engineering and math, fields collectively known as STEM. In doing so, the 101-year-old Texas-based organization is trying to remain relevant and better reflect boys' interests, said Matt Myers, who oversees the Boy Scouts' STEM initiative.
  • Developing the robotics badge requirements took 14 months and involved help from more than 150 scouts, their leaders and industry professionals. Ken Berry, who led the effort, said the badge is a bit overdue given that hundreds of thousands of children and teens already are participating in robotics competitions around the country. "We're promoting stretching of the mind like athletics promotes stretching of the body," said Berry, assistant director of the Science and Engineering Education Center at the University of Texas at Dallas.
  • Officials expect at least 10,000 of the nation's 2.7 million Boy Scouts to earn the new badge in the next year, compared with the roughly 500,000 who earn the most popular badge — first aid — each year.
  • ...1 more annotation...
  • "One of the biggest problems we have for high school kids and Boy Scouts included, is that there aren't a lot of opportunities to tinker and experience what it's like to be an engineer, so when they get to the college level, students are often ill prepared to do an engineering degree," he said. NASA, which allowed its Mars rover to be depicted on the badge, also agreed to take 100 patches into space on the Endeavour shuttle mission. Those badges will be distributed through an online contest.
  •  
    Possible avenue to extend NBISE certifications to K-12 groups in collaboration with the US Cyber Challenge?
1 - 14 of 14
Showing 20 items per page