This module is part of the Assessing Demonstration-Based Instruction Inclusion in an Online Cybersecurity Vulnerability Learning Module research project. A partial requirement for the author's course design degree.
This learning module was developed as part of a Master of Education in Instructional Design and Technologies. It is an introductory module that focuses on foundational knowledge and practical application to enhance learners' abilities to identify and manage common cybersecurity vulnerabilities that threaten digital environments.
The module consists of three lessons. An introduction to cybersecurity vulnerabilities, vulnerability management with an emphasis on vulnerability identification, and common challenges.
The content consists of a combination of text, videos, and video demonstrations. There is also a link to an optional, free, third-party lab, as well as lesson knowledge checks and reflections.
Hello. My name is Alan Bringardner. I have over 25 years of experience managing and administering IT environments and information security, primarily for MSPs and MSSPs. I have a Doctor of Science in Cybersecurity, and I am currently a cybersecurity course instructor. I am also a student, completing a master's degree in course design. This learning module/research project is part of my capstone. I hope it is a meaningful learning experience for you! Thank you for your interest!
Instructional Goals
To improve learners' critical thinking in identifying cybersecurity weaknesses and understanding their consequences in various digital contexts.
Research Focus
This study examines the core knowledge needed by learners to effectively detect vulnerabilities after engaging with the module.
Secondly, the study seeks to understand the learner experience with the module.
Impact Measurement
Assessment tools are integrated to evaluate the overall impact of the module on the learners' cybersecurity vulnerability identification skills' requisite knowledge.
A post module survey will be used to gather data towards the learner experience goal.
Eligibility
Participants can not have a WGU affiliation.
Participants can not have an advanced degree in cybersecurity.
Participants should not have accumulated 3 years in a purely vulnerability management role.
Participants
All participipation is voluntary.
Participants are free to leave the module/study at any time.
You can use the form below to request access or message me on LinkedIn. I will create a student account and provide a link to the learning management system. Learners will need to complete the short (6 question) preassessment to unlock the course content.
Data Security
No personall information shall be collected for this study. However, a valid email account is required to register with Canvas, which host the module and requires registration.
Assessment and Survey data will be stored on a dedicated encrypted USB drive for the minimum time required. This data will be associated with a student code.
The sole purpose of any data collected is this study/academic project. It will not be used beyond that.